pointer

Category Archives: OmniPeek Network Analyzer

How Much Do You Really Know About Your Application Performance?

Oftentimes, when we think about network performance and reliability, downtime and its massive financial impact immediately spring to mind. But as executives and IT professionals understand, a network doesn’t have to crash completely to sap a company’s revenue. Sometimes it only takes one troublesome application to sap the bottom line.

Indeed, most business leaders are well aware of how important quality of service for applications is to customers. From online shopping carts to customer service chat, users simply won’t wait for an application that lags or stalls. In an era when consumers expect instant gratification, waiting is a thing of the past.

Unfortunately, many of the available tools for application and network monitoring are overly simplistic, reporting the application’s response time but offering no detailed analysis about what is causing the problem. In that regard, the difference between WildPackets’ solutions and other products is night and day.

The OmniPeek Network Analyzer allows network engineers to drill down through detailed analysis and reports to get to the heart of any problem and troubleshoot quickly. These detailed data views provide engineers an unprecedented understanding of how networks and applications are performing and how that performance is affecting end users. OmniPeek also offers application performance monitoring in the context of overall network activity with metrics like:

  • Round-trip network delay
  • Server responsiveness
  • Database transactions per second
  • Application vs. network response times

Even if your development team creates dynamic applications your competitors don’t offer, they can’t create value if they don’t perform optimally. Like any offering, applications are assets that should be protected—and with the OmniPeek Analyzer, yours will be safe and sound.

Click here to download our white paper, “Application Performance Index: Measuring the Quality of Experience.”

Wireless Field Day 5: What You Did and Didn’t See…

Last week, we participated in our second Wireless Field Day event and hosted 11 of the industry’s top wireless professionals at our headquarters to dive into demos of our Omni Distributed Analysis Platform 7.5. For those of you who missed the live stream of our presentation, we thought a quick wrap-up of what happened when cameras were rolling – and even when they weren’t – would help you feel like you were in the room with our delegates!

Want to know what went down? Read on, as we give you the inside scoop and what the cameras did and didn’t capture at Wireless Field Day 5.

Capturing 802.11ac Packets in Real Time
Demonstrating a live 11ac capture was one of our favorite parts of the day, as it’s something we’ve been working hard on, and we’re the first to deliver a solution. Although we weren’t using 802.11ac as the primary wireless network, we had a separate laptop connecting to a Linksys 11ac AP and sending traffic over an 11ac network.

We used a 1-steam 11ac WLAN adapter, the Cisco AE6000, to capture 11ac traffic for analysis in OmniPeek. We showed summary-level views of the 11ac traffic in OmniPeek’s Compass dashboard, and drilled into detailed views of the 11ac packets themselves. With OmniPeek’s new support for MCS and spatial stream reporting, all key metrics of any WLAN, including 11ac, are at your fingertips. And with support for 11ac USB WLAN adapters for capturing, you can continue to use OmniPeek as your go-to portable WLAN network analyzer and capture 11ac anywhere, at any time.

Here’s the video of us capturing 802.11ac traffic.

VoFi (Voice over Wi-Fi) Capture
In addition to capturing single-stream 11ac traffic, we also demonstrated packet analysis of a VoFi call, which you can watch us do below. With OmniPeek, we showed how users could capture an entire VoFi call, store it, and play it back to see where problems may have occurred.

By highlighting the specific call in our “calls view” interface, you can easily drill in to see detailed analysis of the call as a whole, including details like the number of control packets, control flows, signaling flows, and signaling packets. And in our “media” view we provide even more details regarding the call, including key metrics like MOS, R-Factor, jitter, and packet loss so you can determine exactly how each and every call on you WLAN is performing.

What you didn’t see…
Well, if you’ve checked out any of the videos, one thing you’ll notice is that there are a lot of Macs among the WFD delegates, and we’re demonstrating from a PC – clearly a technology mismatch. But before the delegates left our offices, many were already running OmniPeek on their Macs (either using Boot Camp or the VM of their choice) AND capturing 802.11ac packets with the very same Cisco AE6000 we used in our demonstration. Needless to say they left a very happy bunch.

In case you missed Stephen Foskett’s original stream of the event, you can catch the remaining videos here. As always, if you have any questions or just want to get some conversation going, leave us a comment on this blog.

The Challenges that Arise in Monitoring 802.11ac Equipment

In our last blog post, we wrote on the Wi-Fi Alliance’s 802.11ac certification program and how it helps both the consumer of wireless equipment as well as the distributor of wireless equipment.

This week, we want to focus on the process of monitoring your new 802.11ac equipment once it’s installed. Before you can monitor 802.11ac traffic, you need to be able to capture the traffic. This is true regardless of the monitoring solution used, and capturing 11ac traffic remains one of the biggest challenges with this new technology.

Let’s take just a moment and step back to see how this has been done with 802.11a/b/g/n. Wireless LAN monitoring did not come without its struggles in these bands either, but over time the industry settled into a comfortable solution using laptops with 802.11 USB WLAN adapters. This solution is highly portable, making on-site WLAN analysis easy, regardless of the location. Most solutions work with only a subset of available USB WLAN adapters, and some require a custom adapter. In either case, the key requirement is that the WLAN adapter be able to be put into “promiscuous mode,” sometimes called sniffing mode. If this capability is not exposed in the device, then it has no chance of being used as part of a WLAN network monitoring and analysis solution. This combination remains as the “go-to” solution for most WLAN analysts, both in the field and in corporate WLAN environments.

So, what’s changed in 802.11ac? Let’s take a look at a few key differences between 11ac and previous technologies that are making WLAN monitoring and analysis more difficult.

Timing/Availability
Let’s face it, 802.11ac is brand new, and with that comes all the issues of timing and availability that may not always coincide with a perfect and logical order. Hardware vendors need software to test the new devices. Software vendors need hardware to test their software before they can provide it to hardware manufacturers. It is a classic “chicken and egg” scenario. As we described earlier, WLAN analysis software needs supported WLAN USB adapters to collect data for analysis. Without supported adapters, the software cannot be developed and tested, at least not fully. This is starting to ease, as more adapters from more vendors are starting to hit the market, some of which are compatible with promiscuous mode and can be used for wireless packet capture. As with previous 802.11 specifications, the situation will improve, but it’s always a painful process at the beginning.

Breaking the “Gigabit Barrier’
802.11ac is the first wireless standard to break the “gigabit barrier,” delivering wireless connectivity at data rates in excess of 1Gbps (in some modes). If you recall, it wasn’t all that long ago (OK, at least for us old guys) that we were talking about 1Gbps wired speeds. Breaking through this barrier requires some adjustments in the way we capture and analyze wireless data. First, back to our USB WLAN adapters. The key word here is “USB.” The laptops most of us have probably support USB v2.0. That means a maximum theoretical throughput of 480Mbps, with a practical limit less than 300Mbps. The slowest typical 802.11ac connection will be at 433Mbps (1-stream and 80MHz bandwidth). So it’s pretty clear that USB v2.0 is not up to the task. USB 3.0 will do in most cases, but you need to make sure that both your laptop and your 802.11ac WLAN USB adapter (that is compatible with your analysis software) are USB v3.0 compliant. It’s looking like some hardware upgrades may be required soon…

And it’s not just about the devices. Network analysis at greater than 1Gbps can be very demanding in terms of CPU and memory, and the software itself must be up to the task. Many are not; we already know this. Fortunately our OmniPeek network analyzer is up to the task since it’s been doing multi-gigabit wired analysis for many years now.

There are alternatives to USB WLAN adapters for capturing data, and we highly recommend that users begin thinking in this direction. The best approach is to use an AP to capture wireless data. APs are typically more capable than USB adapters (think more streams and better optional feature support) so they are best suited to the task. If you use the same brand for capture that you plan to use to send data, then the feature set compatibility will be guaranteed. Again, just as with USB adapters, you need to ensure that the AP can be put into promiscuous mode. Most enterprise APs can (but not all), and most consumer-grade APs cannot. Remote Pcap support is the best bet for using an AP as a packet capture device. We know, this makes portability a bit more of an issue. You may need to find a plug and be a bit more stationary when capturing data, so you can plug in your AP “sniffer.”

Staggered Feature Roll-outs
The 802.11ac specification is still in draft form, and the biggest risk at this point is equipment that doesn’t yet support the feature set you expect, even if the feature is “required” by the spec. The Wi-Fi Alliance (WFA) has just started interoperability testing against the draft spec so this should help a great deal in eliminating the uncertainty, but until the specification is ratified any equipment you plan to buy to be used specifically as part of a WLAN analysis set-up should be carefully researched to be sure that it will meet both your immediate needs as well as those down the road after ratification.

802.11ac shows major promise in the industry, but getting yourself ready to be able to monitor and analyze the new equipment is a bit of a challenge. Patience is essential in this process, as is ensuring that the solutions and equipment you buy will be compatible with a long future of 802.11ac wireless analysis.