Answer the question
In order to leave comments, you need to log in
What is the volume of broadcast traffic in GPRS/3G networks?
Good afternoon. There is equipment that works like a VPN - the operator's default VPN, which, as it turned out, gives a static IP from the 10.0.0.0/8 subnet and disables access to the Internet. Through brainstorming and experimentation, I found that devices that are served by different companies communicate perfectly with each other in this VPN, although before I arrived, everyone thought otherwise.
Devices are not only pinged, but also during tracing it was revealed that the addressing is direct, that is, in one step. At the same time, I keep the mask 255.0.0.0 in my head, which says that all this, from the point of view of the network, is 16 and a half million potential generators of broadcast traffic. It is clear that mobile communication is arranged a little differently, but I would like to understand whether there are risks of large scale broadcast flooding in networks that are able to fit modem bandwidth to 20 kbps?
Answer the question
In order to leave comments, you need to log in
10.0.0.0/8 is the address pool.
However, each subscriber lives in a separate Point-to-point tunnel.
In general, there is no ip-broadcast on the mobile Internet as unnecessary.
There is something like multicast (MBMS, God forgive me), which is completely controlled by the operator and works strictly in one direction: from a special network node towards the subscriber.
Therefore:
1. The fact that several different corporate clients ended up not just in the same ip-subnet (that would be fine), but also saw each other - this, of course, is an outrage, shame and disgrace.
2. The fact that traceroute shows one hop is also normal: it is quite possible to transfer an ip packet from one ppp tunnel to another without reducing the TTL, and checking for a match between the source ip address and the actual ip address will not loop the ip packet, assigned to the subscriber.
3. It is theoretically possible to ping/flood someone to death, but provided that the sender's uplink channel is wider than the victim's downlink (for example, if you flood from a newer user technology to an older one: 3G -> GSM or LTE -> GSM). However, it will not work to spoil all at once, you will have to spoil one by one and with constant fear of getting hit by the ears for hooliganism from the operator.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question