Free Gift Card For Telling Us Where You Get Your Tech News!


Ok, are you ready for a great deal? All you have to do is send us an email with the names of the last 3 tech magazines you have read (specify if online or print), as well as the last trade show you attended. Of course, also include your name and mailing address so we can get a $15 Starbucks giftcard mailed out to you.

Please note giftcards will be limited to the first 50 replies so email us today! Put “My Tech News” in the subject line and send it to admin@apconnections.net.

Only one giftcard per household please.

Frontier Flyaway Contest Winner Announced!


Hopefully it’s no secret to you that we offer a fantastic Netequalizer Demo on our website. We were so confident that users would love the Netequalizer after demoing it that we announced our Flyaway Contest earlier in the year to reward a new user.

To be eligible, all you had to do was register on our demo site within the past four months. The winner was chosen at random and is rewarded a pair of roundtrip domestic discount tickets on Frontier Airlines – a $525 value!

Our last Flyaway Contest Winner of 2007 was DANIEL DUARTE of http://www.homex.com.mx/ who was announced in the Netequalizer December 2007 Newsletter released earlier this month. If you would like to subscribe to our monthly newsletter, please email us at admin@apconnections.net and we’ll get you our January 2008 edition.

If you want a chance to be our next Flyaway Contest Winner chosen in early spring 2008, then go to http://www.Netequalizer.com and register for our cool demo! You will be impressed!

What Can We Do To Improve NetEqualizer?


We are always looking for feedback on how to improve Netequalizer products. What features do you want to see in 2008? Some ideas we have in the works are:

  • CALEA Probe for VOIP
  • Shaping by Domain Name (Input a URL
    Instead of an IP)
  • Quieter Fan (Already Shipping This!)

This is your chance to tell us what you’d like to see in the Netequalizer for 2008!

Please send all ideas to admin@apconnections.net or give us a call at 303-997-1300, extension 102.

2008 Pricing Update


Wouldn’t it be nice if Santa would bring us a promise of no manufacturing or logistic cost increases for the new year?

Santa is magical but not quite that magical!

Our Finance guys are crunching the numbers now and will have our new 2008 Product Pricing List available the first week of January. You still have plenty of time, however, to get your order in before those new prices go into effect.

Don’t Delay – Check out our current Netequalizer Price List and get your order in today!

APconnections Field Guide to Contention Ratios


In a recent article titled “The White Lies ISPs Tell about Broadband Speeds,” we discussed some of the methods ISPs use when overselling their bandwidth in order to put on their best face for their customers. To recap a bit, oversold bandwidth is a condition that occurs when an ISP promises more bandwidth to its users than it can actually deliver. Since the act of “overselling” is a relative term, with some ISPs pushing the limit to greater extremes than others, we thought it a good idea to do a quick follow-up and define some parameters for measuring the oversold condition. 

For this purpose we use the term contention ratio. A contention ratio is simply the size of an Internet trunk divided by the number of users. We normally think of Internet trunks in units of megabits. For example, 10 users sharing a one megabit trunk would have a 10-to- 1 contention ratio. If sharing the bandwidth on the trunk equally and simultaneously, each user could sustain a constant feed of 100kbs, which is exactly 1/10 of the overall bandwidth.

So what is an acceptable contention ratio?

From a business standpoint, it is whatever a customer will put up with and pay for without canceling their service. This definition may seem ethically suspect, but whether in the bygone days of telecommunications phone service or contemporary Internet bandwidth business, there are long-standing precedents for overselling. What do you think a circuit busy signal is caused by? Or a dropped cell phone call? It’s best to leave the moral debate to a university assignment or a Sunday sermon.

So, without pulling any punches, what exactly will a customer tolerate before pulling the plug?
Here are some basic observations:
  • Rural customers in the US and Canada: Contention ratios of 50 to 1 are common
  • International customers in remote areas of the world: Contention ratios of 80 to 1 are common
  • Internet providers in urban areas: Contention ratios of 20 to 1 are to be expected
  • The numbers above are a good, rough starting point, but things are not as simple as they look. There is a statistical twist as bandwidth amounts get higher.

    Contention ratios can actually increase as the overall Internet trunk size gets larger. For example, if 50 people can share one megabit without mutiny, it should follow that 100 people can share two megabits without mutiny as the ratio has not changed. It is still 50 to 1.

    However, from observations of hundreds of ISPs, we can easily conclude that perhaps 110 people can share two megabits with the same tolerance as 50 people sharing one megabit. What this means is that the larger the ISP, the more bandwidth at a fixed cost per megabit, and thus the larger the contention ratios you can get away with.

    Is this really true? And if so, what are its implications for your business?

    This is simply an empirical observation, backed up by talking to literally thousands of ISPs over the course of four years and noticing how their oversubscription ratios increase with the size of their trunk.

    A conservative estimate is that, starting with the baseline ratio listed above, you can safely add 10 percent more subscribers above and beyond the original contention ratio for each megabit of trunk they share.

    Thus, to provide an illustration, 50 people sharing one megabit can safely be increased to 110 people sharing two megabits, and at four megabits you can easily handle 280 customers. With this understanding, getting more from your bandwidth becomes that much easier.

    Complimentary NetEqualizer Tech Training Seminar Is Coming to Monterey, CA


    On Wednesday, December 19 from 9:30 a.m. to noon, we will be hosting a complimentary seminar on
    the NetEqualizer technology at the Portola Plaza Hotel (http://www.portolaplazahotel.com/) in Monterey, CA. The seminar will be divided into two parts, with the first providing an overview of the NetEqualizer and the second focusing on advanced technical training. Since the Portola Plaza runs the NetEqualizer in its conference center and hotel, we’ll be able to examine live hotel traffic as part of the training session.

    This will be a great opportunity for existing and potential customers to see the full capabilities of the NetEqualizer. If you’re in the area, be sure to catch it!

    For more details, contact us via e-mail at admin@apconnections.net or give us a call at 303-997-1300, extension 102. We look forward to hearing from you & meeting you at the seminar!

    NetEqualizer playing key role in developing Iraqi and Afghan Internet industries


    Although best known for solving corporate and institutional bandwidth issues in the United States, APconnections’ NetEqualizer technology is now playing a major part in the developing Internet industries in Iraq an Afghanistan.

    The NetEqualizer is the bandwidth optimization technology of choice for Blackwater USA in Iraq and Afghanistan’s Afghan Wireless and Afghan Telecom.

    “Internet access has seen tremendous growth in both Afghanistan and Iraq over the past few years,” said Art Reisman, CEO of APconnections. “We’re pleased that the NetEqualizer has been able to help facilitate that growth.”

    In 2002, Afghan Wireless became the first provider of public Internet and telecommunication services in Afghanistan. They currently serve more than 95 cities and towns and are one of only a few Afghan companies to operate in more than 20 separate regions.

    Afghan Telecom is the official government-run telecommunications provider in Afghanistan, having been incorporated by the Ministry of Communications and Internet Technology in 2005. With their Afghan Telecom Air Cards, users now enjoy wireless Internet access throughout the city of Kabul.

    In addition to serving as one of the largest private security contractors in Iraq, Blackwater USA also provides Internet service to both its employees and Iraqi citizens. The company just went live this summer with their NetEqualizer to maximize its bandwidth and prevent network congestion.  

    UM Study: Password Protecting Your Wireless Network Is Not Enough


    From the news release issued today…

    UM Study: Password Protecting Your Wireless Network Is Not Enough

    COLLEGE PARK, Md., Aug. 22 /PRNewswire-USNewswire/ — College students do it. Coffee shop customers do it too. Your neighbor in Apartment 3C is probably doing it right now.

    Many computer users search for an available wireless network to tap into — whether at the mall, at school or at home — and whether they have permission to use that network or not. Knowingly or unknowingly, these wireless “parasites” may be doing more than filching a signal. When they connect, they can open up the network — and all the computers on it — to an array of security breaches.

    These problems are compounded when someone allowed to use an organization’s wireless network adds an unauthorized wireless signal to increase the main network’s signal strength. These unauthorized access points are especially vulnerable, often unprotected by any security measures that may exist on the main network.

    At home, people usually use passwords to protect their wireless network from unauthorized access. But a new study by the A. James Clark School of Engineering’s Michel Cukier indicates passwords alone may not provide enough protection for home wireless networks and are particularly inadequate for the wireless networks of larger organizations. Cukier is an assistant professor of mechanical engineering and affiliate of the Clark School’s Center for Risk and Reliability and Institute for Systems Research at the University of Maryland.

    At many organizations and locations around the country, thousands of users access widespread wireless network legitimately at any given time. But in turn, some of these users set up their own wireless networks, linked to the official network, to increase the signal in their office or home — what computer experts call an unmanaged wireless access point.

    “If these secondary connections are not secure, they open up the entire network to trouble,” Cukier said. “Unsecured wireless access points pose problems for businesses, cities and other organizations that make wireless access available to customers, employees, and residents. Unsecured connections are an open invitation to hackers seeking access to vulnerable computers.”

    Cukier recommends that wireless network owners and administrators take the following precautions to better secure wireless networks from “parasites” trolling for access and unsecured connections set up by legitimate users:

    Limited signal coverage

    Limit the strength of your wireless network so it cannot be detected outside the bounds of your home or office.

    Turn off SSID broadcasting

    A Service Set IDentifier (SSID) is a code attached to packets (bits of information) on a wireless network that is used to identify each packet as part of that network. When SSID broadcasting is enabled on a wireless network, this network can be identified by all wireless clients within range. Conversely when SSID broadcasting is disabled, the wireless network is not visible (to casual users) unless this code is entered in advance into the client’s network setting.

    WPA/WEP encryption

    Encrypted communication will protect confidential information from being disclosed. If the traffic over the wireless network is encrypted, an attacker must decrypt the password before retrieving information transmitted over the network. There are two encryption schemes available: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). In practice, only one of them can be used at a time. Regular changing of the encryption key may also help to protect the network. Whenever possible, WPA should be used as WEP can be decrypted by hackers equipped with special software.

    Key management

    Even if encryption is used, if the key to this encryption (generated by the network) is not changed often, a hacker might crack the key and decrypt the communication. Therefore, the key must be regularly changed.

    MAC address

    If a wireless access point only accepts connections from known MAC addresses (essentially a serial number unique to each manufactured network adaptor), a potential attacker will need to learn the addresses of legitimate computers in order to access the wireless network.

    AirEqualizer Hidden Node Solution Featured on ExtremeTech.com


    The Ziff Davis publication, ExtremeTech.com, recently published an article that Art put together on the problem with hidden nodes. Similar to the official white paper, the article dissects the hidden node issue and explains the potential for “equalizing” to solve the problem. Click here to read the full article.

    AirEqualizer and Hidden Nodes: A Real Solution to a Virtual Problem


    Below is our recently released white paper that explores the hidden node problem and how the AirEqualizer is a solution. More information about the AirEqualizer can be found at:  http://www.netequalizer.com/apeq.htm.

    AirEqualizer and Hidden Nodes: A Real Solution to a Virtual Problem

    Contents 

    1. Introduction
    2. What is a hidden node and why is it a problem for wireless networks?
    3. How does AirEqualizer solve the hidden node issue?
    4. Questions and Answers

    Introduction

    Of the numerous growing pains that can accompany the expansion of a wireless network, the issue of hidden nodes is one of the most difficult problems to solve. Despite your best efforts, the communication breakdown between nodes can wreak havoc on a network, often leading to sub par performance and unhappy users.1 Many times, the cost of potential solutions appears to outweigh the benefits of expansion, which in some cases may not be a choice, but a necessity. Yet, hidden nodes are a problem that must be addressed and ultimately solved if a wireless network is to achieve successful growth and development.

    What is a hidden node and why is it a problem for wireless networks?

    An 802.11 wireless network in a normal, simple configuration consists of a central access point (AP) and one or more remote users – which are the individuals utilizing the computers and devices that constitute a node. Wireless transmission technology is such that if more than one remote user transmits data back to the AP at the same time, it is difficult for the AP to distinguish between the two talkers.
     

    When the forefathers of 802.11 first designed the protocols for how a wireless network should prevent this problem, they assumed that all users and nodes would be in close proximity to the access point and could actually hear each other’s transmissions.For example, say node A and node B are wireless laptops in an office building with one access point. Node A starts sending data to the access point at the same moment as node B. By design, node A is smart enough to listen at the exact moment it is sending data in order to ensure that it has the airwaves free and clear. If it hears some other talker at the same time, it may back off, or, in other cases, node B may be the one to back off. The exact mechanism used to determine the back off order is similar to right of way rules at a four-way stop. These rules of etiquette are followed to prevent a crash and allow each node to send its data unimpeded.

    Thus, 802.11 is designed with a set of courtesies such that if one node hears another node talking, it backs off, going silent as to reduce the chaos of multiple transmissions at the same time. This should be true for every node in the network. This technology worked fine until directional antennas were invented and attached to remote nodes, which allowed users to be farther away from an access point and still send and receive transmissions. This technology is widely available and fairly inexpensive, so it was adapted by many wireless service providers to extend Internet service across a community.

    The impact of these directional antennas, and the longer distances it allows users to be from access points, is that individual nodes are often unable to hear each other. Since their antennas are directed back to a central location, as the individual nodes get farther away from the central AP, they also become farther apart from each other. This made it more difficult for the nodes to communicate. Think of a group of people talking while they stand around in an ever-expanding circle. As the circle expands away from the center, people get farther apart, making it harder for them to communicate. Since it’s not practical to have each node point a directional antenna at all of the other nodes, the result is that the nodes don’t acknowledge one another and subsequently don’t back off to let others in. When nodes compete to reach the access point at the same time, typically those with the strongest signals, which are generally closest to the AP, win out, leaving the weaker-signaled nodes helpless and unable to communicate with the access point (see image below). 
    Your browser may not support display of this image. 

    When a network with hidden nodes reaches capacity, it is usually due to circumstances such as this, where nodes with stronger signals steal the airwaves and crowd out nodes with weaker signals. If the nodes with the stronger signals continue to talk constantly, the weaker nodes can be locked out indefinitely, leaving certain users without access to the network.The degradation of the hidden node problem varies with time of day, as well as with who is talking at any moment. As a result, the problem is not in one place for long, so it is not easily remedied by a quick mechanical fix. But, fortunately, there is a solution.

    How does AirEqualizer solve the hidden node issue?

    The AirEqualizer solution, which is completely compatible with 802.11, works by taking advantage of the natural inclination of Internet connections to back off when artificially restrained. We’ll get back to this key point in a moment.
     
    Understanding the true throughput upper limit of your access point is key to the AirEqualizer’s efficiency, since the advertised throughput of an AP and its actual ceiling often vary, with most AP’s not reaching their full potential. Once you have determined the peak capacity of the access point (done empirically through busy hour observation), you then set the AirEqualizer effective trunk size to that value. This tells the AirEqualizer to kick into gear when that upper limit is reached.Once configured, the AirEqualizer constantly (every second) measures the total aggregate bandwidth throughput traversing the AP. If it senses the upper limit is being reached, AirEqualizer will then isolate the dominating flows and encourage them to back off.Each connection between a user on your network and the Internet constitutes a traffic flow. Flows vary widely from short dynamic bursts, which occur, for example, when searching a small Web site, to large persistent flows, as when performing peer-to-peer file sharing or downloading a large file. By keeping track of every flow going through the AP, the AirEqualizer can make a determination of which ones are getting an unequal share of bandwidth and thus crowding out flows from weaker nodes.

    AirEqualizer determines detrimental flows from normal ones by taking the following questions into consideration:

    1) How persistent is the flow?  
    2) How many active flows are there?  
    3) How long has the flow been active? 
    4) How much total congestion is currently on the trunk? 
    5) How much bandwidth is the flow using relative to the link size? 
     
    Once the answers to these questions are known, AirEqualizer will adjust offending flows by adding latency, forcing them to back off and allow potentially hidden nodes to establish communications – thus eliminating any disruption. Nodes with stronger signals that are closer to the access point will no longer have the advantage over users based farther away. This is done automatically by the AirEqualizer, without requiring any additional programming by administrators.
    The key to making this happen over 802.11 relies on the fact that if you slow a stream to the Internet down, the application at the root cause will back off and also slow down. This can be done by the AirEqualizer without any changes to the 802.11 protocol since the throttling is actually done independent of the radio. The throttling of heavy streams happens between the AP and the connection to the Internet.

    Questions and Answers

    How do you know congestion is caused by a heavy stream? 

    We have years of experience optimizing networks with this technology. It is safe to say that on any congested network roughly 5 percent of users are responsible for 80 percent of Internet traffic. This seems to be a law of Internet usage.2 

    Can certain applications be given priority?  

    Air Equalizer can give priority by IP address, for video streams, and in its default mode it naturally gives priority to Voice over IP (VoIP), thus addressing a common need for commercial operators. 

    How many users can the AirEqualizer support?  

    The AirEqualizer can support approximately 100 users. 

    Why hasn’t another radio manufacturer used your methodology already? 

    Radio manufacturers are not aware of the human factors of Internet behavior, so they try to solve the hidden node issue with different schemes in the RF spectrum. This usually involves a proprietary polling or time share algorithm. This is not to say that it can’t be done this way, but we believe the AirEqualizer method is the only way to solve the problem using the ingrained 802.11 technology as it stands. 

    What happens to voice traffic over a wireless transmission? Will it be improved or impaired? 

    We have mostly seen improvements to voice quality using our techniques. Voice calls are usually fairly low runners when it comes to the amount of bandwidth consumed. Congestion is usually caused by higher running activities, and thus we are able to tune the AirEqualizer to favor voice. 

    How can I find out more about the AirEqualizer?  

    Additional information about the AirEqualizer can be found at our Web site: http://www.netequalizer.com/apeq.htm.  

    How can I purchase an AirEqualizer for trial? 

    Customers in the U.S. can contact APconnections directly at 1-800-918-2763 or via e-mail at admin@APconnections.net. International customers outside of Europe can contact APconnections at +1 303-997-1300, extension 103 or at the e-mail listed above.  

    Customers in Europe can contact Aibridges at ++353 (0) 65 684 8768 or via e-mail at sales@aibridges.ie.


    1 Nodes are defined as any computer or device that is within a network. In this white paper, the term “user” will refer to the individual or group utilizing these computers or devices and could effectively be interchanged with the term “node”. In addition, the term “talker” will at times be used to refer to nodes that are sending data.

    2
    Randy Barrett, “Putting the Squeeze on Internet Hogs: How Operators Deal with Their Greediest Users.” Multichannel News. 7 Mar. 2007. Retrieved 1 Aug. 2007 http://www.multichannel.com/article/CA6439454.html

    APconnections Details Hidden Node 802.11 Solution in AirEqualizer White Paper


    APconnections, maker of the popular bandwidth control solution NetEqualizer, today announced the publication of a detailed white paper describing how their new access point technology, AirEqualizer, solves the hidden node problem widely found in wireless networks.

    “The AirEqualizer has proven itself to be a rock solid access point which completely eliminates congestion and slowness associated with hidden nodes,” said Art Reisman, CEO of APconnections.

    Entitled, “AirEqualizer and Hidden Nodes: A Real Solution to a Virtual Problem,” the white paper breaks down the hidden node issue and the complications it can cause for wireless networks. The paper goes on to document the technology behind the AirEqualizer solution, which uses latency to prevent more dominant nodes from blocking out those with weaker signals.

    The white paper in its entirety can be found at http://www.netequalizer.com/Hidden_Node_White_Paper.php.

    The AirEqualizer technology was first developed out of open source projects that APconnections started in 2004. Like the company’s NetEqualizer line, the AirEqualizer is designed to fit easily into any network with minimal setup time. In addition, the technology doesn’t require users to purchase products from any single equipment supplier, like many other hidden nodes solutions.

    When asked why APconnections openly explains and details their technology in a white paper, Reisman responded: “We found that customers don’t like getting locked into proprietary solutions where they’re forced to buy certain types of equipment, and we use that to our advantage. Anybody already using 802.11 technology can retrofit our AP’s right in without any re-design. We offer a value add by supporting and bundling the technology in an AP.”

    Also announced today is the availability of the AirEqualizer in Western Europe exclusively through APconnections’ distribution partner Ai Bridges (http://www.Aibridges.ie).

    NetEqualizer Technology Featured on ISP-Planet.com


    Below is an article written by Alex Goldman, managing editor of ISP-Planet.com, which highlights the NetEqualizer technology.

    Network Contention Specialist

    This company’s getting attention right now for its CALEA solution, but the wireless AP that’s in development may be the big story here

    By: Alex Goldman

    Lafayette, Colorado-based NetEqualizer has one product on the market right now, a bandwidth manager called the NE 200 (for NetEqualizer 200).

    “Our primary mission is to make ISPs more efficient,” says Art Reisman, CEO and co-founder of NetEqualizer.

    He and his colleagues tried to build a local WISP in 2002. In a wealthy, tech savvy suburb of Boulder, they thought they had the ideal market. He thinks it’s tougher to be a WISP than it is to do what he’s doing now. “It took us two years to get NetEqualizer to [profitability],” he says. “We don’t sell through channels. It’s all organic growth. We didn’t need a huge amount of money fast.”

    In contrast, an ISP needs to keep growing. “We pulled in a T-1 and ran an AP on the roof. Then DSL came along and killed our WISP. We talk to five or six WISPs every day, of all sizes, from 20 customers to 10,000. ISPs can put out flyers and get to 100 customers, but it’s very tough to go from there. We noticed that our talents were engineering, not RF.”

    Sharing is not a contest

    So the company built a box that helps dole out bandwidth on contested networks. It monitors each stream, and throttles streams that are bandwidth-intensive when there’s a conflict. “We can go after a user’s big download and leave their IM stream up,” explains Reisman. He says that allowing low-bandwidth transactions like e-mail, IM, and VoIP to go through while throttling the high cost streams—such as streaming video, file downloads, and P2P—will result in fewer angry calls to the ISP.

    CALEA

    Since the box already examines each stream, it’s easy to make this into a CALEA probe. Reisman admits that his box is not certified “CALEA-compliant” but says that since the law doesn’t say what is and what is not compliant, no other vendor can say they are either.

    Some vendors comply specifically with the ATIS specification, but not all Law Enforcement Agencies (LEAs) comply with it (though the biggest, the FBI, does).

    ISPCON attendees learned all about this when Maura Quinn, head of the FBI’s Electronic Surveillance Technology Section (Operational Technology Division) based in Quantico, Va., said, “the FBI cannot endorse specific equipment. TTPs and equipment makers can advise you as to what’s CALEA compliant. The FBI does not have a list. Service providers can obtain detailed documentation by contacting the FBI.”

    Reisman says he was reluctant to make the device a probe, but customers demanded it. “It’s not our goal to make money from fear or from government requirements,” he says.

    He says that the box has been criticized by his competitors because it lacks features. “People tell us we have to do it this way, but for our customers, the alternative is to do nothing or go bankrupt [buying expensive equipment]. Our device is just the first step to compliance. There’s no standards body that certifies that devices are CALEA compliant.”

    He understands that many ISPs will buy the more expensive equipment that’s out there (or go with a TTP). “I don’t want to embarrass anyone who bought the more expensive stuff,” he says. “This is a service to our existing customers.”

    Pricing and availability

    All boxes are able to handle up to 150 Mbps of throughput, but NetEqualizer sells products at different prices depending on the throughput needed. More throughput can be unlocked with a more expensive software key. Pricing is published online and starts at $2,050 with warranty and software upgrades for a 2 Mbps box, running to $6,750 for the top of the line box with warranty and upgrades.

    Reisman says he had a cheaper box for the low end of the market but could not guarantee manufacturing quality, and now ships only one model.

    Posted in News. 1 Comment »

    Live NetEqualizer Demo Available Online – Try It Out and Enter to Win Two Roundtrip Airline Tickets


    We wanted to remind everyone about the live NetEqualizer demo that’s available at our Web site.  It’s free and everyone who tries the demo will be entered into a drawing for two roundtrip domestic tickets on Frontier Airlines.  So, give it a shot – you may end up getting a trip out of it.

    APconnections Offers 802.11 Hidden Node Solution in Most Recent AirEqualizer Release


    LAFAYETTE, Colo., July 9, 2007 /PRNewswire/ — APconnections, a leading supplier of plug-and-play bandwidth shaping products, today announced that the capabilities of its AirEqualizer power-over-Ethernet wireless access point (AP) are expanding. The AirEqualizer now not only effectively controls network congestion and eliminates AP brownouts and lockups, but also serves as a proven 802.11 network hidden node solution.

    With the advent of this technology, AirEqualizer users worldwide have seen the near instantaneous drop in problems associated with hidden nodes, leading to significant improvements in QoS and customer satisfaction.

    “As we began to grow our client base, we discovered hidden node collisions were causing customer slowdowns. The more customers we put on, the more complaints we received,” said Chris McKay, director of British Columbia’s Airspeed Wireless. “Once the AirEqualizer was setup and configured to run optimally on our busiest site, the complaints immediately dropped off. We now have over 20 AirEqualizers in place at all of our WIPOP’s and very rarely get calls from upset customers. We give the AirEqualizer three thumbs up. It has saved our business and our sanity!”

    Through the equalizing technology found in APconnections’ NetEqualizer bandwidth shaping products, AirEqualizer allows organizations to control network congestion at the AP. This ensures high-quality connectivity for voice over IP (VoIP) and other priority users, thereby dramatically reducing help desk and service calls, without the need for any manual tuning.

    “We run a VoIP service over our wireless data network in Gunnison, Colorado and can’t afford to have customers with lower powered radio signals get crowded out of the RF spectrum,” said Jason Swenson, president of Internet Colorado. “With the unique QoS provided by the AirEqualizer, we have been blessed with the ability to run our network using less expensive 802.11-based equipment while maintaining first rate QoS.”

    In addition to the equalizing technology, AirEqualizer comes with standard commercial AP features, including authentication, billing, re-direction, routing, and firewall protection.

    APconnections partners with Aibridges.ie and the University of Limerick Ireland on a European version of the AirEqualizer.

    NetEqualizer Training Seminar to Be Held in California


    Net Eq SeminarsAfter two successful NetEqualizer training seminars in Minneapolis and Dallas, plans are in the works for a third seminar later this year in California. The seminar will be divided into two parts, with the first providing an overview of the NetEqualizer and the second focusing on advanced technical training. This will be a great opportunity for existing and potential customers to see the full capabilities of the NetEqualizer.

    The exact location of the California seminar has yet to be decided, but we are open to suggestions for potential venues. Please let us know if you’d be interested in attending or even hosting the event. We can be contacted at 1-888-287-2492 or via e-mail at admin@apconnections.net.