As someone who does streaming all day to YouTube for severe weather warning and watch awareness purposes, and depneding on the day I'll sometimes be doing a bunch of port scanning and/or downloading weather models from the NCEP (and they are about 500 GB per model run, and typically download around 1 Mb/s) I never know when I'm throttled or have an ingress inverter placed on my line due to any of this high use of bandwidth.
Once in the past we did find out we had an ingress inverter, supposedly 'that orange thing' on your telephone pole wire which I still couldn't see but I clearly saw the technician who came out here with his bucket truck to take if off when I repeatedly complained.
My suggestion and question is whether Comcast could/should inform customers of changes to their own service which act to impede the customer's own speed. I'm still thankful Comcast hasn't implemented bandwidth caps though, at least as of yet. So don't want to sound like a whiner but it's just something I'd like to be able to know without calling customer support. Nevermind the fact that a lot of the level 1 or 2 techs I've spoken with don't even know what I'm talking about lol...
So it's hard to know really when is my Arris access point on it's way out and I should order a new one via the phone customer service....or when am I throttled/ingress inverted. Also, I'll make another thread on this sometime but the Arris APs that Comcast have people spending $10/month to rent basically ALL have serious security vulns. They're doucmented, well known, and have never been patched and probably never will be. Perhaps Comcast could start going with another vendor.
On SpeedTest.net the reason I think I'm throttled is that although I get about 28mbps as an end result it slowly creeps up to that over the test. Also, my up speed is like 1mbps or so and there's always this big delay between the start of the upload test and the actual transmission or appearance of any throughput visually. Anyone know what I'm talking about?
So this is a general thread about these issues anyway - with those couple of specific questions I asked. Thanks for your time.
... View more
Wow, that's what they are for? I know exactly what you're talking about. I just typed up in notepad what they all are and just for my own privacy I'll chance or block some digits of the actual MAC addresses. Things to note if they aren't made clear ahead of time: these all come in with a signal strength of 100 percent or so, or all are equal to my actual BSSID (2.4 and 5 Ghz for me are the same ESSID but ofc different BSSIDs)
Suspicious Wi-Fi Networks With BSSIDs Similar to Home Network and Signal Strengths all 100/100 5:31 PM 9/15/2019
[HomeNetworkName] Ch 11 AES N,G WPA2 Pre-Shared Key C8:5D:A0:88:2D:93
[Home Network Name] Channel 149 AES WPA2 Pre-Shared Key C8:5D:A0:88:2D:94
1) Channel 11 TKIP/AES N,G 1A:5D:A0:88:2D:93
2) WPA 802.1x/WPA2 802.1x *Ch 11*
3) [5 Ghz] All Channel 149
a) TKIP/AES |WPA 802.1x/WPA2 802.1x 3A:5D:A0:88:2D:94
b) TKIP/AES | WPA Pre-Shared Key/WPA2 Pre-Shared Key 1A:5D:A0:88:2D:94
c) (100 percent signal strength like the others but has the ESSID "XFINITY") AES WPA2 802.1x 2A:5D:A0:88:2D:94
If this was something malicious or to do with surveillance you'd expect it to be covered up more, and not some blatently obvious (to the moderately tech-savvy anyway) sequential differences in BSSID, haha.
Also notice they're all different in terms of whether they're AES or TKIP and AES and even WPA2 802.1x which as far as I know I've never used in my life, as it's a little more complicated to set up than plain old WPA2. Glad to have found your post and see that it's not old at all.
... View more