Looking for a Good Web Hosting Company, Here Are Some Tips


We get asked all of the time for references for good Web hosting companies. This Ubuntu blog post by Inventa technologies is a great place to start.

Tips to find the right web hosting company

This article outlines the most important considerations one should keep in mind while looking for a website hosting service provider. Let’s take a look at some of them.

There are many things to consider when choosing a web hosting plan which suits your requirements. The 10 most important are listed below.

1. Types of Servers 2. Disk Space/Storage 3. Bandwidth or data transfer 4. Database support 5. FTP Access 6. Easy to use Control Panel 7. E-mail services 8. Cost 9. Customer Support 10. Added Features

To see the full original article click here.

World Wide Web Founder Denounces Deep Packet Inspection


Editor’s Note: This past week, we counted  several  vendors publishing articles touting how their deep packet inspection is the latest and best. And then there is this…

Berners-Lee says no to internet ‘snooping’

The inventor of the World Wide Web, Sir Tim Berners-Lee, has attacked deep packet inspection, a technique used to monitor traffic on the internet and other communications networks.

Speaking at a House of Lords event to mark the 20th anniversary of the invention of the World Wide Web, Berners-Lee said that deep packet inspection (DPI) was the electronic equivalent of opening people’s mail.

To continue reading, click here.

We can understand how DPI devices are attractive as they do provide visibility into what is going on in your network.  We also understand that the intent of most network administrators is to keep their network running smoothly by making tough calls on what types of traffic to allow on their wires.  But, while DPI is perhaps not exactly the same as reading private mail, as Mr Berners-Lee claims, where should one draw the line ?

We personally believe that the DPI line is one that should be avoided, if at all possible. And, our behavior-based shaping allows you to shape traffic without looking at data. Therefore, effective network optimization doesn’t have to come at the expense of user privacy.

NetEqualizer March 2009 Contest Winner


frontier

Every few months, we have a drawing to give away two roundtrip domestic airline tickets from Frontier Airlines to one lucky person who’s recently tried out our online NetEqualizer demo. The time has come to announce this round’s winner.

And the winner is…John Shoff of Reality Bytes Inc.

About John Shoff (Courtesy of http://www.realitybytesinc.com/)

I am a long term resident of Drumheller, Alberta.  I was born and raised in Drumheller and have lived in the town for most of my adult life.

At a fairly young age, I developed a huge interest in computers, and basically everything electronic in nature.  I was intrigued by a device that could do so much, yet is so commonly misunderstood.

I feel that my interest in computers was the main reason for starting this company, and first and formost our goal is to stay on the leading edge of what technology can do.  In this industry more than any other, a few months of neglect can lead to a significant loss in the understanding of what the industry is doing, and where the industry is heading.

I spend a large portion of my “free” time dedicating myself to research and development of the latest trend or gadget in the technology sector.

I do however have many other passions.  Growing up, I was very much into hockey and other sports.  I was involved in Drumheller Minor Hockey for many years, and I am glad to see Drumheller Minor hockey developing, especially now with Drumheller having a Junior A hockey team.

Travel is a huge interest of mine, and I have been to a lot of the globe already, but that still amounts to only a small percentage of where I still have yet to go.  I find the different cultures across our planet have a lot to teach us.  In North America in general, and specifically I find in Alberta, we are a very driven culture, set to push the limits of what our body can handle in terms of stress load, and work load.  It has been a real eye opening experience to see how some other very different cultures interact.

If I had to describe myself in a few words, I would say I am very driven, compassionate, and open minded.  In regards to the latter, it cannot be said enough that the more we learn, the more we realize that we truely understand very little.

John Shoff is a proud member in good standing of the Institute of Electrical and Electronics Engineers and has been involved with PCs and computer network design for over 10 years.

Tucson Unified School District Could Use a Bandwidth Controller


The excerpt below from the Arizona Star Daily sums up the network gridlock  situation at the Tucson Unified School Distirct.  The reason for posting this on our blog is the hope that other administrators will find us before they go out and commit to the recurring costs of additional expensive bandwidth.

At Fruchthendler Elementary School, one first-grade teacher was supposed to give an online assessment, only to find it took 10 minutes to load each question. She finally gave up and printed out the tests.

We are a 21st-century school running on 20th-century bandwidth,” Little said. “I feel like I’m back to what I had in high school, which is pretty much nothing.

Read the full Article from the Arizona Stqr Daily

Although we have no other details about the situation in Tucson  and their gridlocked Internet service, we are confident that an affordably priced 21st century bandwidth control solution could certainly make a difference.

NetEqualizer is being used in school districts across the country and has been largely effective in preventing many of the problems experienced in Tucson. Click here for feedback and reviews from just a few of the school districts that have deployed NetEqualizer.

Seventeen Unique Ideas to Speed up Your Internet


By Eli Riles
Eli Riles is a retired insurance agent from New York. He is a self-taught expert in network infrastructure. He spends half the year traveling and visiting remote corners of the earth. The other half of the year you’ll find him in his computer labs testing and tinkering with the latest network technology.  For questions or comments please contact him at
admin@netequalizer.com

Updated 11/30/2015 – We are now up to sixteen (17) tips!
————————————————————————————————————————————————

Although there is no way to actually make your true Internet speed faster, here are some tips for home and corporate users that can make better use of the bandwidth you have, thus providing the illusion of a faster pipe.

1) Use A VPN tunnel to get to blocked content.

One of the little know secrets your provider does not want you to know is that they will slow video or software updates if the content is not hosted on their network. Here is an article with details on how you can get around this restriction.

 

 

 

2) Time of day does make a difference

During peak internet Usage times, 5 PM to Midnight local time, your upstream provider is also most likely congested.  If you have a bandwidth intensive task to do, such as downloading an update for your IPAD, you can likely get a much faster download by doing your download earlier in the day. I have even noticed that the more obscure YouTube’s and videos,  have problems running at peak traffic times. My upstream provider does a good job with Netflix and popular videos during peak hours ( these can be found in their cache), but if I get something that is not likely stored in a local copy on their servers the video will lag during peak times. (see our article on caching)

3) Turn off Java Script

There are some trade offs with doing this , but it does make a big difference on how fast pages will load. Here is an article where cover all the  relevant details.

Note: Prior to 2010  setting your browser to text only mode was a viable option, but today most sites are full of graphics and virtually unreadable in text only mode.

  • If you are stuck with a dial-up or slower broadband connection, your  browser likely has an  option to load text-only. If you are a power user that’s gaming or watching YouTube, text-only will obviously have no effect on these activities, but it will speed up general browsing and e-mail.  Most web pages are loaded with graphics which take up the bulk of the load time, so switching to text-only will eliminate the graphics and save you quite a bit of time.

4) Install a bandwidth controller to make sure no single connection dominates your bandwidth

Everything you do on the Internet creates a connection from inside your network to the Internet, and all of these connections compete for the limited amount of bandwidth your ISP provides.

Your router (cable modem) connection to the Internet provides first come/first serve service to all the applications trying to access the Internet. To make matters worse, the heavier users, the ones with the larger persistent downloads, tend to get more than their fair share of router cycles.  Large downloads are like the school yard bully, they tend to butt in line, and not play fair.

Read the full article.

5) Turn off the other computers in the house

Many times, even during the day when the kids are off to school, I’ll be using my Skype phone and the connection will break up.  I have no idea what exactly the kids’ computers are doing, but if I log them off the Internet, things get better with the Skype call every time. In a sense, it’s a competition for limited bandwidth resources, so, decreasing the competition will usually boost your computer’s performance.

6) Kill background tasks on your computer

You should also try to turn off any BitTorrent or background tasks on your computer if you are having trouble while trying to watch a video or make a VoIP call.  Use your task bar to see what applications are running and kill the ones you don’t want.  Although this is a bit drastic, you may just find that it makes a difference. You’d be surprised what’s running on your computer without you even knowing it (or wanting it).

For you gamers out there, this also means turning off the audio component on your games if you do not need it for collaboration.

7) Test your Internet speed

One of the most common issues with slow internet service is that your provider is not giving you the speed/bandwidth that they have advertised.  Here is a link to our article on testing your Internet speed, which is a good place to start.

Note:  Comcast has adopted a 15 minute Penalty box in some markets. Your initial speed tests will likely show no degradation, but if you persist at watching high-definition video for more than 15 minutes, you may get put into their Penalty box.  This practice helps preserve a limited resource in some crowded markets.  We note it here because we have heard reports of people happily watching YouTube videos only to have service degrade.

Related Article: The real meaning of Comcast generosity.

8) Make sure you are not accidentally connected to a weak access point signal

There are several ways an access point can slow down your connection a bit.  If the signal between you and the access point is weak, the access point will automatically downgrade its service to a slower speed. This happens to me all the time. My access point goes on the blink (needs to be re-booted) and my computer connects to the neighbor’s with a weaker signal. The speed of my connection on the weaker signaled AP is quite variable.  So, if you are on wireless in a densely populated area, check to make sure what signal you are connected  to.

9) Caching — How  does it work and is it a good idea?

Offered by various vendors and built into Internet Explorer, caching can be very effective in many situations. Caching servers have built-in intelligence to store the most recently and most frequently requested information, thus preventing future requests from traversing a WAN/Internet link unnecessarily.

Many web servers keep a time stamp of their last update to data, and browsers such as the popular Internet Explorer will check the time stamp on the host server. If the page time stamp has not changed since the last time you accessed the page, IE will grab it and present a local stored copy of the Web page (from the last time you accessed the page), saving the time it would take to load the page from across the Internet.

So what is the downside of caching?

There are two main issues that can arise with caching:

a) Keeping the cache current. If you access a cached page that is not current, then you are at risk of getting old and incorrect information. Some things you may never want to be cached, for example the results of a transactional database query. It’s not that these problems are insurmountable, but there is always the risk that the data in cache will not be synchronized with changes. I personally have been misled by old data from my cache on several occasions.

b) Volume. There are some 100 million Web sites out on the Internet. Each site contains upwards of several megabytes of public information. The amount of data is staggering and even the smartest caching scheme cannot account for the variation in usage patterns among users and the likelihood they will hit an uncached page.

Recommended: Related article on how ISPs use caching to speed up NetFlix and Youtube Videos.

For information on turning off caching, click here.

 

10) Kill your virus protection software

With the recent outbreak of the H1N1 virus, it reminded me of  how sometimes the symptoms and carnage from a vaccine are worse than the disease it purports to cure.  Well, the same holds true for your virus protection software. Yes, viruses are real and can take down your computer, but so can a disk crash, which is also inevitable.  You must back up your critical data regularly.  However, that virus software seems to dominate more resources on my desktop than anything else.  I no longer use anything and could not be happier.  But be sure to use a reliable back-up (as you will need to rebuild your computer now and then, which I find a better alternative than running a slow computer all of the time).

11) Set a TOS bit to provide priority

A TOS bit  is a special bit within an IP packet that directs routers to give preferential treatment to selected packets.  This sounds great, just set a bit and move to the front of the line for faster service.  As always, there are limitations.

– How does one set a TOS bit?
It seems that only very special enterprise  applications, like a VoIP PBX, actually set and make use of TOS bits. Setting the actual bit is not all that difficult if you have an application that deals with the network layer, but most commercial applications just send their data on to the host computer’s clearing house for data, which in turn puts it into IP packets without a TOS bit set.  After searching around for a while, I just don’t see any literature on being able to set a TOS bit at the application level. For example, there are a couple of forums where people mention setting the TOS bit in Skype but nothing definitive on how to do it.

– Who enforces the priority for TOS packets?
This is a function of routers at the edge of your network, and all routers along the path to wherever the IP packet is going. Generally, this limits the effectiveness of using a TOS bit to networks that you control end-to-end. In other words, a consumer using a public Internet connection cannot rely on their provider to give any precedence to TOS bits, hence this feature is relegated to enterprise networks within a business or institution.

–  Incoming traffic generally cannot be controlled.
The subject of when you can and cannot control a TOS bit does get a bit more involved.  We have gone over this in more detail in a separate  article.

12) Avoid Quota Penalties

Some providers are implementing Quotas where they slow you down if you use too much data over a period of time.  If you know that you have a large set of downloads to do, for example synching your device with iTunes Cloud, go to a library and use their free service. Or, if you are truly without morals, logon to your neighbor’s wireless network and do your synch.

13) Consider Application Shaping?

Note: Application shaping is an appropriate topic for corporate IT administrators and is generally not a practical solution for a home user.  Makers of application shapers include Blue Coat (Packeteer) and Allot (NetEnforcer), products that are typically out of the price range for many smaller networks and home users.

One of the most popular and intuitive forms of optimizing bandwidth is a method called “application shaping”, with aliases of “deep packet inspection”, “layer 7 shaping”, and perhaps a few others thrown in for good measure. For the IT manager that is held accountable for everything that can and will go wrong on a network, or the CIO that needs to manage network usage policies, this at first glance may seem like a dream come true.  If you can divvy up portions of your WAN/Internet link to various applications, then you can take control of your network and ensure that important traffic has sufficient bandwidth, right?  Well, you be the judge…

At the center of application shaping is the ability to identify traffic by type.  For example, identifying between Citrix traffic, streaming audio, Kazaa peer-to-peer, or something else.  However, this approach is not without its drawbacks.

Drawback #1: Applications can purposely use non-standard ports
Many applications are expected to use Internet ports when communicating across the Web. An Internet port is part of an Internet address, and many firewall products can easily identify ports and block or limit them. For example, the “FTP” application commonly used for downloading files uses as standard the well-known “port 21”. The fallacy with this scheme, as many operators soon find out, is that there are many applications that do not consistently use a standard fixed port for communication. Many application writers have no desire to be easily classified. In fact, they don’t want IT personnel to block them at all, so they deliberately design applications to not conform to any formal port assignment scheme. For this reason, any product that aims to block or alter application flows by port should be avoided if your primary mission is to control applications by type.

So, if standard firewalls are inadequate at blocking applications by port, what can help?

As you are likely aware, all traffic on the Internet travels around in what is called an IP packet. An IP packet can very simply be thought of as a string of characters moving from Computer A to Computer B. The string of characters is called the “payload,” much like the freight inside a railroad car. On the outside of this payload, or data, is the address where it is being sent. These two elements, the address and the payload, comprise the complete IP packet.

In the case of different applications on the Internet, we would expect to see different kinds of payloads. For example, let’s take the example of a skyscraper being transported from New York to Los Angeles. How could this be done using a freight train? Common sense suggests that one would disassemble the office tower, stuff it into as many freight cars as it takes to transport it, and then when the train arrived in Los Angeles, hopefully the workers on the other end would have the instructions on how to reassemble the tower.

Well, this analogy works with almost anything that is sent across the Internet, only the payload is some form of data, not a physical hunk of bricks, metal and wires. If we were sending a Word document as an e-mail attachment, guess what, the contents of the document would be disassembled into a bunch of IP packets and sent to the receiving e-mail client where it would be re-assembled. If I looked at the payload of each Internet packet in transit, I could actually see snippets of the document in each packet and could quite easily read the words as they went by.

At the heart of all current application shaping products is special software that examines the content of Internet packets (aka “deep packet inspection”), and through various pattern matching techniques, determines what type of application a particular flow is. Once a flow is determined, then the application shaping tool can enforce the operator’s policies on that flow. Some examples of policy are:

Limit AIM messenger traffic to 100kbs
Reserve 500kbs for Shoretell voice traffic

The list of rules you can apply to traffic types and flow is unlimited.

Drawback #2: The number of applications on the Internet is a moving target.
The best application shaping tools do a very good job of identifying several thousand of them, and yet there will always be some traffic that is unknown (estimated at 10 percent by experts from the leading manufacturers). The unknown traffic is lumped into the unknown classification and an operator must make a blanket decision on how to shape this class. Is it important? Is it not? Suppose the important traffic was streaming audio for a webcast and is not classified. Well, you get the picture. Although theory behind application shaping by type is a noble one, the cost for a company to stay up-to-date is large and there are cracks.

Drawback #3: The spectrum of application types is not static
Even if the application spectrum could be completely classified, the spectrum of applications constantly changes. You must keep licenses current to ensure you have the latest in detection capabilities. And even then it can be quite a task to constantly analyze and change the mix of policies on your network. As bandwidth costs lessen, how much human time should be spent divvying up and creating ever more complex policies to optimize your WAN traffic?

Drawback #4: Net neutrality is comprised by application shaping.
Techniques used in application shaping have become controversial on public networks, with privacy issues often conflicting with attempts to ensure network quality.

Based on these drawbacks, we believe that application shaping is not the dream come true that it may seem at first glance.  Once CIOs and IT Managers are educated on the drawbacks, they tend to agree.

14) Bypass that local consumer reseller

This option might be a little bit out of the price range of the average consumer, and it may not be practical logistically –  but if you like to do things out-of-the-box, you don’t have to buy Internet service from your local cable operator or phone company, especially if you are in a metro area.  Many customers we know have actually gone directly to a Tier 1 point of presence (backbone provider) and put in a radio backhaul direct to the source.  There are numerous companies that can set you up with a 40-to-60 megabit link with no gimmicks.

15) Speeding up your iPhone

Ever been in a highly populated area with 3 or 4 bars and still your iPhone access slows to crawl ?

The most likely reason for this problem is congestion on the provider line. 3g and 4g networks all have a limited sized pipe from the nearest tower back to the Internet. It really does not matter what your theoretical data speed is, when there are more people using the tower than the back-haul pipe can handle, you can temporarily lose service, even when your phone is showing three or four bars.

Unfortunately, you only have a couple of options in this situation. If you are in a stadium with a large crowd, your best bet is to text during the action.  If you wait for a timeout or end of the game,  you’ll find this corresponds to the times when the network slows to a crawl,  so try to finish your access before the last out of the game or the end of the quarter. Pick a time when you know the majority of people are not trying to send data.

Get away from the area of congestion. I have experienced complete lockout of up to 30 minutes, when trying to text, as a sold out stadium emptied out.  In this situation my only chance was  to walk about  1/2 mile or so from the venue to get a text out. Once away from the main stadium, my iPhone connected to a tower with a different back haul away from the congested stadium towers.

Shameless plug: If you happen to be a provider or know somebody that works for a provider  please tell them to call us and we’d be glad to explain the simplicity of equalizing and how it can restore sanity to a congested wireless backhaul.

16) Turn off HTTPS and other Encryption

Although this may sound a bit controversial , there are some providers that,  for sake of survival assume that encrypted traffic is bad traffic.  For example p2p is considered bad traffic, they usee be able to use special equipment to throw it into a lower priority pool so that it gets sent out at a slower speed.   Many applications are starting to encrypt p2p , face book etc…. The provider may assume that all this is “bad”traffic because they don’t know what it is, and hence give it a lower priority.

17) Protocol Spoofing

Note:  This method is applied to Legacy Database servers doing operations over a WAN.  Skip this tip if you are a home user.

Historically, there are client-server applications that were developed for an internal LAN. Many of these applications are considered chatty. For example, to complete a transaction between a client and server, tens of messages may be transmitted when perhaps one or two would suffice. Everything was fine until companies, for logistical and other reasons, extended their LANs across the globe using WAN links to tie different locations together.

To get a better visual on what goes on in a chatty application, perhaps an analogy will help.  It’s like  sending family members your summer vacation pictures, and, for some insane reason, putting each picture in a separate envelope and mailing them individually on the same mail run. Obviously, this would be extremely inefficient, as chatty applications can be.

What protocol spoofing accomplishes is to fake out the client or server-side of the transaction and then send a more compact version of the transaction over the Internet, i.e. put all the pictures in one envelope and send it on your behalf, thus saving you postage.

You might ask why not just improve the inefficiencies in these chatty applications rather than write software to deal with the problem? Good question, but that would be the subject of a totally different article on how IT organizations must evolve with legacy technology, which is beyond the scale of the present article.

In Conclusion

Again, while there is no way to increase your true Internet speed without upgrading your service, these tips can improve performance, and help you to get better results from the bandwidth that you already have.  You’re paying for it, so you might as well make sure it’s being used as effectively as possible. : )

Related Article on testing true video speed over the Internet

A great article from the tech guy regarding tips on dealing with your ISP

Other Articles on Speeding up Your Internet

Five tips and tricks to speed up your Internet

How to speed up your Internet Connection Without any Software

Tips on how to speed up your Internet

About APconnections

Created by APconnections, the NetEqualizer is a plug-and-play bandwidth control and WAN/Internet optimization appliance that is flexible and scalable. When the network is congested, NetEqualizer’s unique “behavior shaping” technology dynamically and automatically gives priority to latency sensitive applications, such as VoIP and email. Click here to request our full pricelist.

The pros and cons of Disk (Web) Caching


Eli Riles an independent consultant and former VP of sales for NetEqualizer has extensively investigated the subject of caching with many of  ISPs from around the globe. What follows are some useful observations on disk/web caching.

Effective use of Disk Caching

Suppose you are the administrator for a network, and you have a group of a 1000 users that wake up promptly at 7:00 am each morning and immediately go to MSNBC.com to retrieve the latest news from Wall Street. This synchronized behavior would create 1000 simultaneous requests for the same remote page on the Internet.

Or, in the corporate world, suppose the CEO of a multinational 10,000 employee business, right before the holidays put out an all points 20 page PDF file on the corporate site describing the new bonus plan? As you can imagine all the remote WAN links might get bogged down for hours while each and every employee tried to download this file.

Well it does not take a rocket scientist to figure out that if somehow the MSNBC home page could be stored locally on an internal server that would alleviate quite a bit of pressure on your WAN or Internet link.

And in the case of the CEO memo, if a single copy of the PDF file was placed locally at each remote office it would alleviate the rush of data.

Local Disk Caching does just that.

Offered by various vendors Caching can be very effective in many situations, and vendors can legitimately make claims of tremendous WAN speed improvement in some situations. Caching servers have built in intelligence to store the most recently and most frequently requested information, thus preventing future requests from traversing the WAN link unnecessarily .

You may know that most desktop browsers do their own form caching already. Many web servers keep a time stamp of their last update to data , and browsers such as the popular Internet Explorer will use a cached copy of a remote page after checking the time stamp.

So what is the downside of caching?

There are two main issues that can arise with caching:

1) Keeping the cache current. If you access a cache page that is not current then you are at risk of getting old and incorrect information. Some things you may never want to be cached, for example the results of a transactional database query. It’s not that these problems are insurmountable, but there is always the risk that the data in cache will not be synchronized with changes.

2) Volume. There are some 100 millions of web sites out on the Internet alone. Each site contains upwards of several megabytes of public information. The amount of data is staggering and even the smartest caching scheme cannot account for the variation in usage patterns among users and the likely hood they will hit an un-cached page. If you have a diverse set of users it is unlikely the Cache will have much effect on a given day

Formal definition of Caching

Hotel Property Managers Should Consider Generic Bandwidth Control Solutions


Editors Note: The following Hotelsmag.com article caught my attention this morning. The hotel industry is now seriously starting to understand that they need some form of bandwidth control.   However, many hotel solutions for bandwidth control are custom marketed, which perhaps puts their economy-of-scale at a competitive disadvantage. Yet, the NetEqualizer bandwidth controller, as well as our competitors, cross many market verticals, offering hotels an effective solution without the niche-market costs. For example, in addition to the numerous other industries in which the NetEqualizer is being used, some of our hotel customers include: The Holiday Inn Capital Hill, a prominent Washington DC hotel; The Portola Plaza Hotel and Conference Center in Monterrey, California; and the Hotel St. Regis in New York City.

For more information about the NetEqualizer, or to check out our live demo, visit www.netequalizer.com.

Heavy Users Tax Hotel Systems:Hoteliers and IT Staff Must Adapt to a New Reality of Extreme Bandwidth Demands

By Stephanie Overby, Special to Hotels — Hotels, 3/1/2009

The tweens taking up the seventh floor are instant-messaging while listening to Internet radio and downloading a pirated version of “Twilight” to watch later. The 200-person meeting in the ballroom has a full interactive multimedia presentation going for the next hour. And you do not want to know what the businessman in room 1208 is streaming on BitTorrent, but it is probably not a productivity booster.

To keep reading, click here.

Net Neutrality Defined,Barack Obama is on the bandwagon


By Art Reisman, CTO, http://www.netequalizer.com

Art Reisman CTO www.netequalizer.com

Art Reisman

There continues to be a flurry of Net Neutrality articles published and according to one, Barack Obama is a big supporter of Net Neutrality.  Of course that was a fleeting campaign soundbite that the media picked up without much context.

I was releived to see that finally a politically entity put a definition on Net Neutrality.

From the government of Norway we get:

“The new rules lay out three guidelines. First, Internet users must be given complete and accurate information about the service they are buying, including capacity and quality. Second, users are allowed to send and receive content of their choice, use services and applications of their choice. and connect any hardware and software that doesn’t harm the network. Finally, the connection cannot be discriminated against based on application, service, content, sender, or receiver.”

Full Article: Norway gets net neutrality—voluntary, but broadly supported

I could not agree more. Note that this definition does not rule out some form a fair bandwidth shaping, and that is an important distinction because the Internet will be reduced to gridlock without some traffic control.

The funniest piece of irony in this whole debate is that the larger service providers are warning of Armageddon without some form of fairness rules, (and I happen to agree) , while at the same time their marketing arm is creating an image of infinite unfettered access for $29 a month. (I omitted a reference link because they change daily)

Bursting Is for the Birds (Burstable Internet Speed)


IMG_20170403_180712

Internet Bursting

By Art Reisman, CTO, http://www.netequalizer.com

Art Reisman CTO www.netequalizer.com

Art Reisman

We posted this article back in May 2008. It was written from the perspective of an ISP; however many consumers are finding our site and may find after reading this article that their burstable Internet service is not all its cracked up to be.  If you are a home internet user, and a bit of a geek,  you might find this article on burstable Internet Speeds thought provoking.

The Demand Side

From many of our NetEqualizer users, we often hear, “I want to offer my customers a fixed-rate one-megabit link, but at night, or when the bandwidth is there, I want to let them have more”. In most cases, the reasons for doing this type of feature are noble and honest. The operator requesting it is simply trying to allow his or her customers access to a resource that has already been paid for. Call it a gesture of good faith. But, in the end, it can lead to further complications.

The problem with this offering is that it can be like slipping up while training your dog. You have to be consistent if you don’t want problems. For example, you can’t let the dog lick scraps off the table on Sunday and then tell him he can’t do it on Monday. Well, the same is true for your customers (We’re not insinuating they are dogs, of course). If you provide them with higher speeds when your network isn’t busy, they may be calling you when your contention ratios are at their peak during times of greater usage. To avoid this, it is best to not to let them ever go above their contracted amount – even when the bandwidth is available.

The Supply Side

Now that we’ve covered the possible confusion bursting may cause for your end-customer, we should take a look at how bursting affects an ISP from the perspective of variable rate bandwidth being offered by your upstream provider.

Back in 2001, when the NetEqualizer was just a lone neuron in the far corner of my developing brain, a partner and I were running a fledgling local neighborhood WISP. To get started, we pulled in a half T1 from a local bandwidth provider.

The pricing is where things got complicated. While we had a half T1, if we went over that more than five percent of the time, the provider was going to charge us large random amounts of cash. Sort of like using too many minutes on your cell phone.

According to our provider, this bursting feature was touted as a great benefit to us as the extra bandwidth would be there when we needed it. On the other hand, there was also this inner-fear of dipping into the extra bandwidth as we knew things could quickly get out of our control. For example, what if some psycho customer drove my usage over the half T1 for a month and bankrupted me before we even detected it? This was just one of the nightmare scenarios that went through my head.

Just to give you a better idea of what the experience was like, think of it this way. Have you ever made an international call from a hotel because it was your only choice and then gotten nailed with a $20 fee for a two minute conversation? This experience was kind of like that. You don’t really know what to expect, but you’re pretty sure it’s not going to be good.

I’m a business owner whose gut instinct is to live within my means. This includes determining how much bandwidth my business needs by sizing it correctly and avoiding hidden costs.

Yet, for many business owners this process is made more complicated by the policies of their bandwidth providers, bursting being a major factor. Well, it’s time to fight back. If you have a provider that offers you bursting, ask them the following questions:

  • Can I have in writing how this bursting feature works exactly?
  • Is a burst one second, 10 seconds, or 10 hours at a time?
  • Is it available all of the time, or just when my upstream provider(s) circuits are not busy?
  • If it is available for 10 hours, can I just negotiate a flat rate for this extra bandwidth?
  • Can you just turn it off for me?

For many customers that we’ve spoken with, bursting is creating more of a fear of overcharge than any tangible benefits. On the other hand, the bursting feature is often helping their upstream provider.

For an upstream provider who is subdividing a large Internet pipe into smaller pipes for resale, it is difficult to enforce a fixed bandwidth limit. So, rather than purchase expensive equipment to divvy up their bandwidth evenly amongst their customers, providers may instead offer bursting as a “feature”. And, while they are at it, they’ll charge you for something that you likely don’t really need.

So, think twice about who’s really benefiting from bursting and know that a few questions can go along way in evening out the deal with your provider. Chances are bursting may be doing your company more harm than good.

In short, while bursting may seem harmless on the surface for both the ISP and the customer, over time the potential problems can significantly outweigh the benefits. Put simply, the best way to avoid this is to maintain consistency at all times and leave bursting for the birds.

More Resistence for Deep Packet Inspection


Editors note:

We come across stories from irate user groups every day. It seems the more the public knows about deep packet inspection practices the less likely it becomes. In Canada it looks like the resistance is getting some heavy hitters.

Google, Amazon, others want CRTC to ban internet interference

Last Updated: Tuesday, February 24, 2009 | 4:53 PM ET Comments49Recommend97

A coalition of more than 70 technology companies, including internet search leader Google, online retailer Amazon and voice over internet provider Skype, is calling on the CRTC to ban internet service providers from “traffic shaping,” or using technology that favours some applications over others.

In a submission filed Monday to the Canada Radio-television and Telecommunications Commission (CRTC) in advance of a July probe into the issue of internet traffic management, the Open Internet Coalition said traffic shaping network management “discourages investment in broadband networks, diminishes consumer choice, interferes with users’ freedom of expression, and inhibits innovation.”

Full Article

Is running an ISP/Wisp a recession proof business ?


February 24th, 2009

Lafayette Colorado

APconnections makers of the of the popular NetEqualizer line of bandwidth control and traffic shaping hardware appliances today announced results of their annual ISP  state of the business survey, below is the summary.

We have been asking our ISP/WISP customers  how their business is faring in the recession over the past several months and the answer is a resoundingly upbeat !

Out of the 25 ISPs ( Tier 2 providers) only two had seen  a decline in subscribers, 18 were holding their own, and 5 were seeing strong growth.  Here are some other tidbits.

1) Many Households will cancel their cable TV before giving up their broad band

2) Cancellations  for one provider mainly occured with foreclosures, again this supports the notion of people holding their broadband right up to the end of their finances.

3) Laid off workers are signing up for broad band as they see this as a needed for job searches and also in looking for ways to start small home businesses

4) We have seen an increase in inquiries for our services across the US and Canada

5) We have not heard of anybody foregoing food as of yet , but I would not put it past some of the gamers.

How to set up a computer for network monitoring – for free!


By Art Reisman, CTO, http://www.netequalizer.com

Art Reisman CTO www.netequalizer.com

Art Reisman

Editors note:

We often get asked where to find a simple network monitoring tool.  Well, you can get more economical than this!   All you need is some elbow grease and perseverance.  Note: We are not the original authors of this idea and have adopted it to our blog, unfortunately I was unable to trace back to the original to give credit.

How to set up a computer for network monitoring – All for free!

This is not as hard as it looks, once you have done it a time or two you can be up and running in less than 5 minutes, assuming you have high-speed access to the Internet.

Do you have a computer with the following?

  • 2 network cards installed or two on-board LAN ports
  • 1 CDRom drive
  • 256 to 1,024 or more Meg of RAM
  • monitor
  • keyboard
  • mouse (optional — it is necessary if you boot into the graphics mode, though)


If so, you can be minutes away from having a network monitoring machine up and running that you can insert in your network and see what is going on.  If you follow these instructions it will act as a transparent bridge so no other machines or routers will know the difference.

The Knoppix CD is a live CD distribution which does not need a floppy or hard drive to run. It is all self contained on the CD. It uses your RAM as a read/writeable area so you can still install a few programs if need be and edit most of the configuration files.

You can get the Knoppix iso image from http://knopper.net/knoppix/ or the English version at http://knopper.net/knoppix/index-en.html

The download page for English reading when this article was written is at http://knopper.net/knoppix-mirrors/index-en.html

Download a CD image of 4.02 or better. A typical file name will be:

KNOPPIX_V4.0.2CD-2005-09-23-EN.iso

The filename ends in -EN and if you speak english then get that one. If you speak German, then get the -DE one.

Now burn that .iso file to a CD using your program of choice (burning the CD image to make a bootable CDRom is not covered here).

You should insert your machine into the network so it is between the Router and the switch, assuming you want to monitor traffic going from or to your network and the Internet. You may have to use a crossover cable from one of your machines LAN ports to the router and a standard network cable from the other LAN port on your machine and the switch.

Internet or Router or ???
_________
| |
| | eth0
_____| |_______________________
|     Monitoring Unit                          |
|_____________________________|
||
eth1  ||
_______________________||______
|     Internal Network Switch                |
|_______________________________|
|| || || || || || || || || || ||
Your internal network users or whatever you want to monitor

Once that is done you can run Knoppix by placing it into your machine and booting up. If you have a limited video card or an old monitor then you can hit the appropriate key when Knoppix boots up and find the option to boot into text mode only. You may also want to do this if you have limited RAM.

Once you are booted up and running Knoppix you can do the following:

If you booted to an XWindows look then click on the little computer screen icon next to the house on the bottom tool bar. If you booted into text mode you do not have to do that.

Now gain root access by typing the following and then Enter:

su

Now that you are root you can run the following commands to start up your transparent bridge and get traffic flowing through the machine from one lan port to the other. The IP 192.168.1.153 below was use as an example along with the default gateway being 192.168.1.1 so change those if your network is on a different IP range. You will want to give it an IP so that you can get into the machine from another machine on the network. In some cases you might want to be able to get to it from the Internet so in that case you would have to give it an IP that can be reached from the Internet and not a 10.x.x.x or 192.168.x.x number.

ifconfig br0 down
brctl delbr br0
ifconfig eth1 down
ifconfig eth0 down
ifconfig eth0 promisc 0.0.0.0 up
ifconfig eth1 promisc 0.0.0.0 up
brctl addbr br0
brctl addif br0 eth0
brctl addif br0 eth1
ifconfig br0 192.168.1.153 netmask 255.255.255.0 up
route add default gw 192.168.1.1

It may take a half a minute for traffic to start flowing through the transparent bridge br0.

Once you can do something like:

ping http://www.yahoo.com

and it comes back with ping times then you are ready to continue. BTW: hit CTRL C to stop ping.

apt-get update
apt-get install ntop

Say Y or hit enter to install ntop. When it is all done do the following:

mkdir /var/log/ntop/rrd
chmod -R 777 /var/lib/ntop
chmod -R 777 /var/log/ntop

warning: the chmod commands above allow anyone to read/write to those directories that can get to the machine so keep your machine safe with firewalls or passwords accordingly.

You can now run ntop. You need to run ntop from the console or via SSH first by just running the command:

ntop

It will ask you for an admin password and then again to,verify it. This is for the admin interface in ntop.

Once ntop is up and running in  a window you can leave that up and just go to your web browser and put in the URL of:

http://192.168.1.153:3000/

The :3000 is the special port that the ntop web server runs on.

If you choose the menu item Summary and then Network Load you should see a graph of your traffic. Not all ntop menu items are used on every system. Most of the time you will only be using the items under Summary or All Protocols.

You now have a running bandwidth monitoring system. ntop is the only application mentioned here but there are others installed on the default Knoppix CD already too.

Related post

The systems I have installed this routine on vary from a system with a Celeron to one with a P4 CPU Running on 10/100 Realtek chipsets to 10/100/1000 Intel chipsets. From 256 Meg of RAM to 2 GIG. Knoppix runs very well on a variety of hardware but your mileage may differ.

Created by APconnections, the NetEqualizer is a plug-and-play bandwidth control and WAN/Internet optimization appliance that is flexible and scalable. When the network is congested, NetEqualizer’s unique “behavior shaping” technology dynamically and automatically gives priority to latency sensitive applications, such as VoIP and email. Click here for a full price list.

What our French Speaking Customers are saying.


Nous sommes un fournisseur Internet sans-fil de la rive-sud de Montréal au Canada. Plusieurs communautés étaient totalement dépourvues de service haute-vitesse avant le lancement de notre projet Internet en région rurale.  Le service connu tellement de succès que les demandes pour un service de téléphonie IP se multiplièrent.
Nous avons dû faire des analyses pour évaluer la qualité de la voix sur notre réseau. La qualité sonore se dégradait très fortement en heure de pointe car des utilisateurs de P2P monopolisaient la majeure partie de notre bande passante. Ceci rendait pratiquement impossible l’utilisation du service de téléphonie IP durant ces heures.

Nous avons donc cherché une solution à ce problème afin de limiter le P2P et de prioriser la voix. Nous avons enfin trouvé la solution de NETEQUALIZER sur google.
En premier lieu, nous pensions à installer la version gratuite, Bandwidth Arbitrator, sur une machine existante. Nous sommes finalement arrivé à la conclusion que la machine vendue et supportée par NETEQUALIZER serait une option plus avantageuse. En achetant le NE2000, nous évitions les frais d’intégration par un techniciens Linux et avions confiance de ne pas rencontrer de problème de pilotes et de compatibilité lors de l’installation et des mises à jours subséquentes. Dès que nous avons branché l’appareil tout a …naturellement…fonctionné. La machine fonctionne de façon totalement transparente. Hormis les bienfaits, les clients ne s’aperçoivent de rien.

Nous avons maintenant près de 2000 clients, une centaine de lignes IP et la progression continue. Nous devons cette qualité de service en partie à NETEQUALIZER. Nous tenons à remercier toute l’équipe de NETEQUALIZER, en particulier Art Reisman, pour l’excellent service après-vente. Toutes nos questions furent répondues instantanément et habillement.

Louis-Paul Bourdon
Président
TARGO Communications

NetEqualizer February Newsletter


NetEqualizer
February 2009 NetEqualizer Newsletter

Valentine’s Day Special and URL-Based Shaping
Greetings!

Enjoy another issue of the NetEqualizer Newsletter. This month, we’re kicking off our Valentine’s Day special and introducing our plans for the NetEqualizer’s URL-based shaping. As always, feel free to pass this along to others who might be interested in NetEqualizer and AirEqualizer news.

In this issue:

  • NetEqualizer Valentine’s Day Special
  • Interested in NetEqualizer URL-Based Shaping? Let Us Know
  • Couldn’t Make the Latest NetEqualizer Tech Seminar? Check Out the Video!
  • Managing Your Network Getting You Down? Extensive Networks Can Help
  • Tips & Tricks

NetEqualizer Valentine’s Day Special
Garmin, Marriott, CCF

Due to the popularity of our recent Garmin promotion, we’re not only extending the offer, but we’re making it that much sweeter. Now, in addition to the option of a complimentary Garmin GPS system, we’re offering NetEqualizer purchasers our special Valentine’s Day package.Beginning February 9, 2009, all customers who purchase a NetEqualizer NE2000-20 model and above will have the choice between a $200 Marriott gift card or the Garmin nuvi 200 (Part Number: 010-00621-10). In addition, all purchasers of NetEqualizer models NE2000-10, NE2000-4, NE2000-2, or any NetEqualizer Software Subscriptions (NSS), can choose between a $100 gift certificate to The Cheesecake Factory or the Garmin eTrex H (Part Number: 010-00631-00).

To receive the hotel or dinner package, or the Garmin GPS systems, customers should send both the serial number and purchase date from the qualifying NetEqualizer via e-mail to admin@apconnections.net.

Requests must be received by March 31, 2009. Only NetEqualizer models and NSS packages purchased between February 9, 2009, and March 15, 2009, will qualify. The offer is good only while supplies last. Standard mapping software as provided by Garmin is included. All other accessories and mapping software must be purchased separately.

For more information on terms and restrictions, please contact us at 1-800-918-2763 or via e-mail at admin@apconnections.net.

Interested in NetEqualizer URL-Based Shaping? Let Us Know
We are currently looking into offering a module that will allow our customers to shape traffic going to a particular URL. As you know, currently we can set rate limits by MAC, IP, VLAN, SUBNET. However, we have not done anything to date for URL-based shaping in the main product line.If you are interested in this feature, let us know as this will influence our release date. Give us a call at 1-800-918-2763 or shoot us an e-mail at admin@apconnections.net. We look forward to hearing from you.

NetEqualizer Tech Seminar Video Is Up!
NetEq. Seminars

For those of you who weren’t able to make it to our most recent Tech Seminar at Eastern Michigan University, we’ve posted a short video on our blog that highlights some of the major points.In the video, we’ll cover:

  1. Basic traffic shaping technology and NetEqualizer’s behavior-based methods
  2. Internet congestion and gridlock avoidance on a network
  3. How peer-to-peer file sharing operates
  4. How to counter the effects of peer-to-peer file sharing
  5. Providing QoS and priority for voice and video on a network
  6. A short comparison by a user (a university admin) who prefers NetEqualizer to layer-7 deep packet inspection techniques

While the video doesn’t replace the experience of an actual seminar, it gives an informative overview of the NetEqualizer technology. Please let us know if you have any questions or comments.

And, as usual, we’re always planning future seminars. So, if you’d be interested in hosting a NetEqualizer Seminar in the months to come, let us know at either admin@apconnections.net or 1-800-918-2763.

Managing Your Network Getting You Down? Extensive Networks Can Help
Ex-Net

Over the past several years, Extensive Networks has been making the lives of many of our customers much easier.They provide complete turnkey management of on-premise voice, video and data services for apartments, condos, hotels and student housing, offering hassle-free telecom services that ultimately add value to the properties they serve.

So, if your network is getting you down, or you’re just looking for an upgrade, Extensive Networks can help. For more information on their services, visit http://www.ex-nets.com/.

Tips & Tricks
Did you know that some of our users use two configurations and switch them out by time of day?

Although it is always best to keep your configuration simple, here is how you can change a configuration over at 5:00 every day:

First, you must be logged in via the console or SSH to the NetEqualizer.

Second, assuming you have a daytime configuration already in use, you will need to save your current NetEqualizer configuration so that it can be put back at a later time. You can do this with:

  • cp /etc/arbdefault.conf /root/daytime.conf

Next, you should change the NetEqualizer settings to how you would want them at night and then save that away with:

  • cp /etc/arbdefault.conf /root/nighttime.conf

Now, create a shell script that can be run at 5:01 p.m. If using nano, enter:

  • nano -w /root/nightconfig.sh

And then insert the following four lines:

  • cp /root/nighttime.conf /etc/arbdefault.conf
  • /etc/init.d/arbitrate stop
  • sleep 5
  • /etc/init.d/arbitrate start

Now, create a shell script that can be run at 7:01 a.m. If using nano, enter:

  • nano -w /root/dayconfig.sh

And then put in the following four lines:

  • cp /root/daytime.conf /etc/arbdefault.conf
  • /etc/init.d/arbitrate stop
  • sleep 5
  • /etc/init.d/arbitrate start

To make these two shell scripts executable, use:

  • chmod +x /root/nightconfig.sh
  • chmod +x /root/dayconfig.sh

Next, create a crontab file in the roots home directory. You can do this with nano. If using nano, then use:

  • nano -w /root/crontab_entries

In the /root/crontab_entries file you’ll next enter:

  • 01 17 * * * /root/nightconfig.sh
  • 01 07 * * * /root/dayconfig.sh

Now, to make NetEqualizer start using different configurations at different times of day, you will use:

  • crontab /root/crontab

Then, in the /art/autostart file, enter:

  • crontab /root/ crontab_entries

That should do it!

NOTE: When using nano, you use CTRL-o and enter to save and CTRL-x to exit. There is a menu at the bottom if you forget. The “-w” means don’t wrap lines.

NetEqualizer rolling out URL based traffic shaping.


February 10th, 2009

Lafayette Colorado

APconnections makers of the of the popular NetEqualizer line of bandwidth control and traffic shaping hardware appliances today announced a major feature enhancement to their product line. URL based shaping.

In our recent newsletter we asked our customers if they were in need of URL based shaping and the feedback was a resounding YES.

Using our current release, administrators  have the ability to shape their network traffic by, IP address , Mac Address, VLAN or subnet. With addition of URL shaping, our product line will meet the demands of Co-location operators.

A distinction we need to make clear, is that URL based shaping is not related to DPI or content based shaping. URLs are public information as they travel across the Internet, and are basically  a mapping into human readable  form of an IP address; therefore URL based shaping does not require opening private data for inspection.

If you are interested in details regarding this feature please contact APconnections directly.