Did you have noise floor threshold set on your AP or Clients?Hi,
I am using right now 5.07 with nstreme, that’s working very well for me (5 GHz)
Yesterday I try to shift my one tower nstreme to NV2, after shifting of 5 Clients (RB711-5Hn) on NV2 I see my Signal-To-Noise is 30% down and my Tx/Rx-CCQ is also 40%to50% down and Tx/Rx-Rate also become lower, I shifted that clients to back on nstreme, after shifting on nstreme they working fine like before.
So what is this I don’t understand
no!Did you have noise floor threshold set on your AP or Clients?Hi,
I am using right now 5.07 with nstreme, that’s working very well for me (5 GHz)
Yesterday I try to shift my one tower nstreme to NV2, after shifting of 5 Clients (RB711-5Hn) on NV2 I see my Signal-To-Noise is 30% down and my Tx/Rx-CCQ is also 40%to50% down and Tx/Rx-Rate also become lower, I shifted that clients to back on nstreme, after shifting on nstreme they working fine like before.
So what is this I don’t understand
Can't help you much then, NV2 package does some strange stuff with signal levels and noise levels when you have a value entered into the noise floor threshold.no!Did you have noise floor threshold set on your AP or Clients?Hi,
I am using right now 5.07 with nstreme, that’s working very well for me (5 GHz)
Yesterday I try to shift my one tower nstreme to NV2, after shifting of 5 Clients (RB711-5Hn) on NV2 I see my Signal-To-Noise is 30% down and my Tx/Rx-CCQ is also 40%to50% down and Tx/Rx-Rate also become lower, I shifted that clients to back on nstreme, after shifting on nstreme they working fine like before.
So what is this I don’t understand
Thanks for reply
I found this too. Once there is low or nearly no traffic the links are going down with CCQ and modulation speed too. Sometimes to 6/6mbit and ccq like 6-7%. once you just ping it 10/s it starts to climb to 90-100% ccq and 54-65Mbit (single chain or up to 130 dual chain). Also if i look at some link that is loaded 16/1Mbit it has 65/54Mbit, once you put more TX data it goes to 65Mbit.Can't help you much then, NV2 package does some strange stuff with signal levels and noise levels when you have a value entered into the noise floor threshold.
The other thing I notice about the NV2 package is that at idle the CCQ will show a very low number even in the teens and once you start moving data across the link you will get the actual CCQ.
great to see something good about NV2 being posted hereWe are running a real world multipoint trial of NV2 v4.16.
There is a single AP - an RB433 with an XR5 with 90deg sector antenna
The AP is using 20mhz channel width, locked to 18meg data rate with NV2 security enabled
There are 50 connected CPE's - a mix of 133's and 411's mainly running XR5's (there are some remaining R52H's lol but that's another story)
The 50 CPE's have been connected now for a week rock solid. Their distance from the AP varies from 2 to 12km
The CPE's all deliver a data service and most deliver at least one G729 voice service.
Call traffic peaks at 10 concurrent calls across this single AP
Summary: NV2 shines in a multipoint environment. Wow.
Highlights:
NV2 is by far the biggest milestone in MT history as far as we are concerned. WMM did the job but was inefficient.
The transition from 802.11+WMM went very smoothly. Gotta love that 802.11-nstreme-nv2 setting.
NV2 gives back all the AP capacity and says goodbye to the hidden node problem completely.
Typical AP capacity/throughput is 14meg actual when locked to a conservatively safe 18meg data rate
The overall capacity stays exactly the same no matter if there is 1 or 50 CPE's connected.
The overall capacity is nicely shared evenly amongst contending data users when busy.
With outdoor multipoint 802.11+WMM and hidden nodes the overall AP capacity drops dramatically as more CPE's are connected.
With outdoor multipoint nstreme you can not properly prioritise voice packets as there is no compatible 'over the air' QoS mechanism.
With outdoor multipoint vanilla 802.11 - you cant do anything, really. It's a horrible protocol to use outdoors.
TDMA is inherently the bullet proof foundation for an almost perfect 'over the air' QoS mechanism
Average CPU utilisation is a lot lower on all devices after migrating to NV2.
Single RB133 CPE up/down throughout is now ~6/10megs! It was ~2/6megs on a good day with WMM.
Round trip latency has increased by about 15ms but jitter has decreased. Jitter is way worse for voice than a little bit of extra latency, so we are happy.
Whilst we are not convinced QoS is implemented 100% properly yet, voice is completely flawless at all times even when the rest of the sector is saturated with data. Voice can still be knocked out intentionally but it's difficult to achieve.
Gripes:
None! ...ok, except maybe TDMA splatter from the AP side. But that's the nature of the beast.
Wish list:
1) This implementation of TDMA requires ideally at least 100mhz of separation between adjacent colocated AP's... or GPS sync
2) Just imagine how handy a 20-10-5mhz 'step down' channel width option in the CPE would be just like that brilliant new 802.11-nstreme-nv2 option?
Keep up the great work, MT. If this is 'beta' we cant wait to see what comes next!
Hello Folks!
Which Readio board is most suitable for NV2 ?
We have used low end 133's and high end units for CPE's and they all work fine. Only use High end RB for AP tho.
Our mainstream is RIC522C with RB411 and R52.
I dont know anything about the RIC522 but the 411's are just fine
My distributor does not keep XR2.
Any 'late model' Atheros chipset cards work with NV2
1. What is TDMA splatter ?
In a nice simple way to explain it:
802.11 mode ony sends a lot of radio waves when data is actually being exchanged.
NV2 (TDMA) mode sends a lot of radio waves all the time from the AP (clients only 'listen' unless they have data to send)
Because the TDMA AP sends radio waves at full power ALL THE TIME (even when not sending data), these radio waves tend to 'spread out' way past its defined 5 or 10 or 20mhz channel bandwidth. This 'spread out' is very low level but is enough to interfere with other colocated nearby AP's even though they are on different (adjacent) channels. I call this TDMA splatter because you can actually see it as splatter coming from the wifi card on a spectrum analyser about 100mhz wide in total with the 20mhz (or 10 or 5 depending what you are using) 'peak' in the middle where the AP is actually transmitting. Using 10mhz channel width as opposed to 20mhz you only see half the 'splatter' but its still about 50mhz wide in total!
NOTE: TDMA Splatter is NOT an MT fault, its NOT a WiFi card fault, it's not a fault at all - it is simply the nature of the TDMA protocol at the AP side.
Splatter is a lot lower with high end TDMA radios tho... we are working with $69 wifi cards here remember.
Most vendors generally mask the negative (self interference) effects of splatter by using the GPS sync method. Splatter can be filtered out completely using high end RF cavity equipment but this is generally never done because the cavity filter would effectively lock the AP to only be able to use ONE single channel.
2a. How does TDMA handle low signal and noicy environments ?
Personal experience has taught us that TDMA is generally the winner in a typical outdoor licence-free noisy environment. Google 'canopy vs 802.11' and read all the complaints about competetors' canopy gear knocking out 802.11 networks. Canopy is TDMA. The good old trusty (now EOL) Proxim MP20 system was also TDMA and that used to rule the airspace as well In fact, rumor has it that Canopy was designed by the origional Western Multiplex MP20 engineers after WM was acquired by Proxim.
Although we havent time tested MT's TDMA yet, it very much smells like the good trusty TDMA we have worked with before. Another first-hand experience with TDMA is that it's usually rather 'binary' - eg it either works at 100% capacity or it doesnt work at all. As opposed to 802.11 if you got a bit of noise it 'still kinda works' but with much less throughput. This is generally not the case with TDMA. 'Still kinda works' could arguably be a better design consideration in some scenarios, but in my opinion, he who runs TDMA generally wins
2b. Does client have problem to "syncronize" themself to the TDMA timeslots (their dwell times) if it is noicy ?
All clients are in the sync with their respective AP at all times, regardless if the AP is GPS sync'd or not [EDITED/ADDED FOR CLARITY]. The air most likely wont be noisy because your AP is already 'noise' to competetors so they likely would have never accidentally used your channel to begin with. Unlike competing 802.11 networks that are often provisioned in the middle of the night when the air was clean because 802.11 only sends (lots of interfering) radio waves when there is data to be sent. The TDMA AP sends radio waves 24/7 therefore even in the middle of the night its almost impossible for a competetor to successfully provision his AP on an already used TDMA channel.
He who's the first to operate TDMA on a particular clean unlicenced channel in a particular area generally ends up owning that channel
3. I have tons of questions, do you also lock the bitratio to some speed like 18Mbit/s or should it be maximized to 54Mbit or even higher if your boards support it ?
There are many variables to consider and there are always tradeoffs. Basically, higher rates = lower reliability. You need to perform your own evaluation of your particular scenario and make the call yourself
4. GPS syncronisation, is that also for Clients ?
Nope, in a GPS sync'd TDD-TDMA network only the AP's require the sync. Clients sync with the already sync'd AP. If all AP's on your network are GPS sync'd then your entire network is in sync meaning you can use adjacent channels on adjacent AP antennas and efficient re-use of frequency may be possible under certain situations [EDITED/ADDED FOR CLARITY]
Are we talking about just one sector using NV2 or multiple sectors on a mast using NV2You have your AP datarates locked at 18Mbps, I have each of the CPE locked at highest CCQ acheivable using either 12,18,24Mbps rates but AP is set to default?We are running a real world multipoint trial of NV2 v4.16.
There is a single AP - an RB433 with an XR5 with 90deg sector antenna
The AP is using 20mhz channel width, locked to 18meg data rate with NV2 security enabled
Of course if you are using XR5 on the AP at 18Mbps you will have a extra 5dBm giving 28dBm TX (as 54Mbps TX rate is 23 dBm)There are 50 connected CPE's - a mix of 133's and 411's mainly running XR5's (there are some remaining R52H's lol but that's another story)
The 50 CPE's have been connected now for a week rock solid. Their distance from the AP varies from 2 to 12km
The CPE's all deliver a data service and most deliver at least one G729 voice service.
Call traffic peaks at 10 concurrent calls across this single AP
Summary: NV2 shines in a multipoint environment. Wow.
Highlights:
NV2 is by far the biggest milestone in MT history as far as we are concerned. WMM did the job but was inefficient.
The transition from 802.11+WMM went very smoothly. Gotta love that
NV2 gives back all the AP capacity and says goodbye to the hidden node problem completely.
Typical AP capacity/throughput is 14meg actual when locked to a conservatively safe 18meg data rate
The overall capacity stays exactly the same no matter if there is 1 or 50 CPE's connected.
The overall capacity is nicely shared evenly amongst contending data users when busy.
It's just a simple and vanilla layer 2 config at AP and CPE. Basically all the wireless settings are mainly at their defaults with the exception of NV2 and NV2 security being enabled.great to see something good about NV2 being posted here
you would not mind posting your config of a client and the AP so that we may use it as a guide for future setups?
Interesting that you ask - this is hot off the press just today since experimenting with NV2 AP #2....Are we talking about just one sector using NV2 or multiple sectors on a mast using NV2
Have the other AP's the same SSID, and is the CPE's using NV2 or "any" wireless protocolThis issue appears to be triggered by CPE's who can 'see' more than one NV2 AP when they scan prior to association with the AP with strongest signal.
What happens is this issue sometime causes all associated CPE's to 'fall off' a particular AP at the same time but ONLY IF the CPE can 'see' more than 1 NV2 AP when it scans prior to association.
Not sure about that, I have good physical + frequency seperation of AP's on a mast had two sector AP's with NV2 issues one had daily disconnects and reconnects tweaked advanced setting in wireless and solved that one but another sector AP on same mast had hourly disconnects and reconnects tried same tweaks but no luck, my guess is when wireless sync is available for MK NV2 for co-located radio's then interference issues will disappear and performance will improve?
I guarantee most of the stability gripes about NV2 here on this forum come down to this same 'cpe triggered' bug.
I ask that everyone who has tried NV2 and failed to try again but this time only allow CPE to ever 'see' a single NV2 enabled AP at any given time. Eg enable NV2 on only a single AP at a tower and leave all your other AP's in 802.11 or nstreme mode and I'll bet my right ball your percieved NV2 instability problems will go away.
If you do still happen to find NV2 unstable then you probably have other underlying faults that need to be addressed regardless. Like AP antenna separation and frequency separation. Lots of both are required
Hmmm, good point. Yes, AP's have same SSID and CPE's are set to nv2-nstreme-802.11 for fallback purposes.Have the other AP's the same SSID, and is the CPE's using NV2 or "any" wireless protocol
Try beating this for separation: 300mhz and 10km between the 2 x NV2 sectors for an experiment - we can still trigger our faultNot sure about that, I have good physical + frequency seperation of AP's on a mast had two sector AP's with NV2 issues one had daily disconnects and reconnects tweaked advanced setting in wireless and solved that one but another sector AP on same mast had hourly disconnects and reconnects tried same tweaks but no luck, my guess is when wireless sync is available for MK NV2 for co-located radio's then interference issues will disappear and performance will improve?
Are we talking about just one sector using NV2 or multiple sectors on a mast using NV2You have your AP datarates locked at 18Mbps, I have each of the CPE locked at highest CCQ acheivable using either 12,18,24Mbps rates but AP is set to default?We are running a real world multipoint trial of NV2 v4.16.
There is a single AP - an RB433 with an XR5 with 90deg sector antenna
The AP is using 20mhz channel width, locked to 18meg data rate with NV2 security enabled
Of course if you are using XR5 on the AP at 18Mbps you will have a extra 5dBm giving 28dBm TX (as 54Mbps TX rate is 23 dBm)There are 50 connected CPE's - a mix of 133's and 411's mainly running XR5's (there are some remaining R52H's lol but that's another story)
The 50 CPE's have been connected now for a week rock solid. Their distance from the AP varies from 2 to 12km
The CPE's all deliver a data service and most deliver at least one G729 voice service.
Call traffic peaks at 10 concurrent calls across this single AP
Summary: NV2 shines in a multipoint environment. Wow.
Highlights:
NV2 is by far the biggest milestone in MT history as far as we are concerned. WMM did the job but was inefficient.
The transition from 802.11+WMM went very smoothly. Gotta love that
NV2 gives back all the AP capacity and says goodbye to the hidden node problem completely.
Typical AP capacity/throughput is 14meg actual when locked to a conservatively safe 18meg data rate
The overall capacity stays exactly the same no matter if there is 1 or 50 CPE's connected.
The overall capacity is nicely shared evenly amongst contending data users when busy.
I use "any" in the CPE which is great for quick switching between protocols on the test APHmmm, good point. Yes, AP's have same SSID and CPE's are set to nv2-nstreme-802.11 for fallback purposes.
We might do some experimentation with different AP SSID's and see what happens.
I had read to leave AP to default and tweak CPE data rates as the different distances from AP will result in different data rates, one CPE could have 24Mbit data rate and 90++% CCQ and another would have to be set at 12Mbit to achieve 90+% CCQNo! - Do the opposite, leave CPE's at default and make data rate changes at AP. CPE's will follow suit and will all be the same rate both up and down according to AP setting.
Good point, so apart from setting the data rates on the AP do you also set power level (TX power which setting, all fixed rates,card rates,default,manual)DONT ever run XR5's at 28db unless you have PERFECT VSWR, tested end to end with proper equipment, other wise the PA will go *pop*.
We choose to use XR5's at low power (19-20db max) purely for reliability. Think of a de-tuned chevvy V8 with a tiny carburettor. They do that for longevity and reliability
For this test you outlined had both AP's the same SSID as my AP's have different SSID and NV2 issues continue the only item common to the AP's is PPPoE secret connect list, which has to be there should i need to switch a CPE to a different AP.Try beating this for separation: 300mhz and 10km between the 2 x NV2 sectors for an experiment - we can still trigger our fault
1) Setup a little dummy NV2 AP at trial CPE site 10km from main NV2 AP on hill
2) Power cycle CPE and watch it's logs, sure enough it can now see 2 x NV2 AP's and so it associates with the close AP thats only 50metres away. So far so good.
3) Repeat 2) ten times and two of the ten times EVERY SINGLE OTHER 49 CPE's connected to NV2 AP on the hill 10km away all disassociated at the same time.
4) Switch off little dummy NV2 AP at trial CPE site
5) Power cycle CPE 20-30 times and try to repeat the fault. We cant.
6) Repeat 1-5 again. And get same results, again
Have you tried to set up access and connect lists on the client/AP to limit who they are allowed to connect to? I would think that would help out with the problem you are talking about. You could also setup a scan list in the CPE so it never tries to scan the AP you don't want it to register to.
COMPLETE stab in the dark: I reakon the CPE is sometimes acquiring it's TDMA timing from one AP and then accidentally applying this AP's timing to the other AP. Effectively freaking the **it out of everything and causing all CPE's to drop off immediately.
What is conclusive however is that physical and channel separation is NOT the culprit in the particular issue we are seeing with 2 or more co-located NV2 AP's
..thats next on the process-of-elimination-todo list for sureHave you tried to set up access and connect lists on the client/AP to limit who they are allowed to connect to? I would think that would help out with the problem you are talking about. You could also setup a scan list in the CPE so it never tries to scan the AP you don't want it to register to.
Yes, thats probably the best bet for 802.11 or nstreme etc.I had read to leave AP to default and tweak CPE data rates as the different distances from AP will result in different data rates, one CPE could have 24Mbit data rate and 90++% CCQ and another would have to be set at 12Mbit to achieve 90+% CCQ.
That is the bad thing about any TDMA product once you start moving to TDMA you lose your ability to mix and match equipment. I don't know of any TDMA based AP's that will let you mix match CPE's. 802.11 and TDMA are two totally different animals there is no way to make it backwards compatible. But if you are trying to run just vanilla 802.11 across the board then yeah there are some stability issues with 802.11 past 3.30.This may work for an ENTIRELY MT RB NETWORK - in real life this doesn't work. You have a mix of new and old - MT and UB and Tranzeo and Engenious and whatever really worked good at that time!
NV2 does NOT work outside the MT spectrum and any Routerboard running 4.16 or rc7 with NV2 activated will NOT handle 802.11 traffic at all!
We need a ubiquitous version to support ALL 802.11 effectively. Right now that is v3.30 - anything after will not!
Rod
Please use RouterOS v4.16 or RouterOS v5.0rc7 which has improvements for the Nv2 protocol.I tried NV2 on an rb411a with an xr9 yesterday and I had 4.15 software on it and all clients. There is only 1 900 mhz radio on the tower and it has 31 clients connected. The first thing I tried was enabling nv2 on ap and it did not work as well as the normal wireless package even when set to 802.11. Then I disabled the nv2 package and started enabling nv2 on clients. Once done with clients I once again enabled the nv2 on the ap. It worked horrible. I tried changing all different setting and channels only to be frustrated. Then I reset the wireless to defaults and tried again but to only have bad results again. They would disconnect frequently. I woke up this morning to find no one connected and then just reverted the ap back to the standard wireless package and it is working fine and this is with the clients set to any on the wireless protocol with nv2 packaged enabled. So from what I have established is the clients work fine with nv2 package but the ap doesn't. My 2 scents worth. I'm waiting for the next firmware to try nv2 again.
to debug the problem we need to have the latest release installed on the router, that is why I asking to upgrade to v4.16. Let us know by writing to support@mikrotik.com if you could give us remote access to that router.Uldis
I looked at change log and it doesn't show any wireless changes from 4.15 to 4.16. Am I missing something?
Thanks
Can you explain why radio waves from TDMA radio would ´spread out` more then legacy 802.11 radio waves? (Given we use same antenna, power and radio in both instances.)1. What is TDMA splatter ?
In a nice simple way to explain it:
802.11 mode ony sends a lot of radio waves when data is actually being exchanged.
NV2 (TDMA) mode sends a lot of radio waves all the time from the AP (clients only 'listen' unless they have data to send)
Because the TDMA AP sends radio waves at full power ALL THE TIME (even when not sending data), these radio waves tend to 'spread out' way past its defined 5 or 10 or 20mhz channel bandwidth. This 'spread out' is very low level but is enough to interfere with other colocated nearby AP's even though they are on different (adjacent) channels. I call this TDMA splatter because you can actually see it as splatter coming from the wifi card on a spectrum analyser about 100mhz wide in total with the 20mhz (or 10 or 5 depending what you are using) 'peak' in the middle where the AP is actually transmitting. Using 10mhz channel width as opposed to 20mhz you only see half the 'splatter' but its still about 50mhz wide in total!
NOTE: TDMA Splatter is NOT an MT fault, its NOT a WiFi card fault, it's not a fault at all - it is simply the nature of the TDMA protocol at the AP side.
Splatter is a lot lower with high end TDMA radios tho... we are working with $69 wifi cards here remember.
Most vendors generally mask the negative (self interference) effects of splatter by using the GPS sync method. Splatter can be filtered out completely using high end RF cavity equipment but this is generally never done because the cavity filter would effectively lock the AP to only be able to use ONE single channel.
Already any news on this?..thats next on the process-of-elimination-todo list for sureHave you tried to set up access and connect lists on the client/AP to limit who they are allowed to connect to? I would think that would help out with the problem you are talking about. You could also setup a scan list in the CPE so it never tries to scan the AP you don't want it to register to.
So you have set them? Any guideline? I never set these. Should I?Can't help you much then, NV2 package does some strange stuff with signal levels and noise levels when you have a value entered into the noise floor threshold.
Your doing apples to oranges here, UDP test's always show great speeds but hardly ever relate to real life traffic. Try rerunning this test with both tests being either UDP or TCP, never mix the two because they always vary wildlyHello Folks!
Half meter lab test bench:
From beginning tests Nstream was performing much better than NV2.
Link connect 150/150mbit and udp traffic up to 100Mbit/s vs TCP traffic 40-60Mbit (cpu went to 100% in rb433 and rb411 during TCP tests).
NV2 did not work well at short distances (half meter in lab), 12-15Mbit, 3-4Mbit.
If you are running the 4.16 NV2 package my advice is to not set them at all.So you have set them? Any guideline? I never set these. Should I?Can't help you much then, NV2 package does some strange stuff with signal levels and noise levels when you have a value entered into the noise floor threshold.
Steen from Sweden@steen
Ben je Nederlands? (Of Belg.)
I can second all that.OK, I eventually managed to login to RB133. As suspected CPU is stuck at 100%.
All I did was change standard wireless package to wireless-nv2.
I have the NV2 package running on several 133 boards, and although the are a bit slow I don't have any issues with lockups or management issues on them. You need to make sure you don't have any packages installed that you don't need because they don't have much memory.same results here. I did 18mbps and higher also in order for nv2 to work. Same results on the rb133's also. Once there online you really cant manage the rb133 to well but it works. You can NOT get full bandwidth with nv2 on the rb133 but however it is still very good.
I now quite myselfHello Folks!
I have problems with switching between wireless and wireless-nv2.
I did switch the lab AP to wireless-nv2 to test all nitty gritty there.
Then I did switch back to wireless, and disabled the R52n-m and enabled the second wireless board which is a standard R52H.
It was configured exactly as all our AP:s elsewhere.
The R52 based clients are configured exactly as the working ones elsewhere in our network.
No clients using R52 can connect to it anymore, I got over and over again:
15:24:57 wireless,debug wlan1: 00:0C:42:64:11:4C attempts to associate
15:24:57 wireless,debug wlan1: 00:0C:42:64:11:4C not in local ACL, by default accept
15:24:57 wireless,info 00:0C:42:64:11:4C@wlan1: connected
15:25:02 wireless,info 00:0C:42:64:11:4C@wlan1: disconnected, unicast key exchange timeout
15:25:04 wireless,debug wlan1: 00:0C:42:64:11:4C attempts to associate
15:25:04 wireless,debug wlan1: reject 00:0C:42:64:11:4C, banned (last failure - unicast key exchange timeout)
15:25:04 wireless,info wlan1: data from unknown device 00:0C:42:64:11:4C, sent deauth
15:25:16 wireless,debug wlan1: 00:0C:42:64:11:4C attempts to associate
15:25:16 wireless,debug wlan1: reject 00:0C:42:64:11:4C, banned (last failure - unicast key exchange timeout)
15:25:16 wireless,info wlan1: data from unknown device 00:0C:42:64:11:4C, sent deauth
15:25:28 wireless,debug wlan1: 00:0C:42:64:11:4C attempts to associate
15:25:28 wireless,debug wlan1: reject 00:0C:42:64:11:4C, banned (last failure - unicast key exchange timeout)
15:25:28 wireless,info wlan1: data from unknown device 00:0C:42:64:11:4C, sent deauth
15:25:40 wireless,debug wlan1: 00:0C:42:64:11:4C attempts to associate
15:25:40 wireless,debug wlan1: 00:0C:42:64:11:4C not in local ACL, by default accept
15:25:40 wireless,info 00:0C:42:64:11:4C@wlan1: connected
15:25:45 wireless,info 00:0C:42:64:11:4C@wlan1: disconnected, unicast key exchange timeout
15:25:45 wireless,info wlan1: data from unknown device 00:0C:42:64:11:4C, sent deauth
I do not know where to begin looking, all I know is checked against working APs and Clients, something is screwed up.
Swicthing between wireless packages, do you loose configuration or what is going on.
I am forced to postpone migration to NV2, again.
Anyone who knows ?
From other posts aes ccm is better for performance than tkip,Client:
WPA2 PSK
tkip
WPA Pre-shared Key:abc123
AP:
WPA2 PSK
tkip
WPA Pre-shared Key: abc123
Okey, I will look on that.From other posts aes ccm is better for performance than tkip,Client:
WPA2 PSK
tkip
WPA Pre-shared Key:abc123
AP:
WPA2 PSK
tkip
WPA Pre-shared Key: abc123
Thank you very much, it worked, performance increased most on small RB411 boards, less CPU and better throughput!Okey, I will look on that.From other posts aes ccm is better for performance than tkip,Client:
WPA2 PSK
tkip
WPA Pre-shared Key:abc123
AP:
WPA2 PSK
tkip
WPA Pre-shared Key: abc123
Original configuration of our network was several years ago by MT Engineers, we did leave it as is.
Okey, I will ask the Swedish authority for Radio Frequencies.great to know that Nv2 is working for you.
About the Sweden turbo mode. Can you forward some government document that says it support turbo band?
Yes that is true.This is not a Swedish requirement, "ETSI EN 301 893" (1.2.3 up to 1.5.1.) is a EU standard, and several of our products are compliant with it.
Hello WirelessRudy!Hi Steen,
Can you tell me, are you deploying your networks in a heavy use (spectrum) environment or are you the sole user.
I have 4.16NV2 deployed on some towers now and also some back hauls but have still some problems with regular, but random intervals, disconnection of some back haul units.
I also found that in my area where I basically use all 12 5Ghz channels before with normal 802.11 I had no interference problems. My problems were more many hidden node clients.
But now I found I have to separate most close proximity radio's by at least 40Mhz to keep stable.
Links that before were stable with only 20Mhz distance became unstable when one of the links started to use NV2. After separating freq's more problem disappeared.
With "unstable" I refer to the fact the links were regularly at random intervals, disconnecting to re-connect immediately again. Signals and CCQ's were perfect so the only reason I could think of is interference of the nv2 protocol with other links.
You have any experiences of this kind?
What type of sector antenna's do you use? "flattering out ...."; something you do? Or result of using this type of antenna?2. Well sectorized towers, good directional antennas with good gain, flattering out the opening window to horizontal plane. (4-8 sectors and one omni for failback).
What do you mean with this? A freznel is something that comes with a radio link. You can make it bigger or smaller by using type of antenna and off course freznel is result of frequency times distance. Nothing can be done about that last...3. Removing all freznel zones ..................
You started your network with HP? I have 125 antenna's on 5 AP's in urbanized area. It's going to be complicated to change their polarity fm V to H. Any advices on this..?4. Horizontal polarisation for r52 antennas,..
? Outdoor usable 5ghz band in Europe is only 200Mhz wide. (5500-5700Mhz)This way you can only use 3 basestations.. I have 5 AP's with all interconnected backhauls and some backhauls leaving this aera so I use all available 11 channels anyway. Some of my backhauls are ´n´ with 40Mhz channel wide so I already have to consider very precise where to use which freq's. The whole area is only 2km radius at max. Only because of topology I have to use 5 AP's5. Reduce impact of splatter: separate all basestations about 80-100MHz.
Even on client devices? This is very expensive! Clients have adapter and when it breaks they get first one for free, next ones they pay replacement costs. If they have a power failure, they won't use internet access anyway so no need for UPS on client side...6. UPS and power line filters on all basestations and client devices.
"ip-packing"? What is that? And it is bad? And what to do about it when it is bad?8. Disabled ip-packing, it was causing timeouts and strange communication lockups.
Routing is faster anyway under heavy traffic conditions.9. Routing no bridging, reducing junk traffic.
What do you consider to be "junk traffic"? Any examples of the firewall rules. I have still many 133C's in my network and with 4.16NV2 package they can't have any extra tasks like mangle and firewall and queuing..10. Queues and firewall settings in client devices to reduce junk traffic even more.
I am surpriced to read about the weather influences you have seen. I live in a very tranquil climate and apart from an occasional downpour in the summer and maybe some snow flakes in some winters it is always relatively reasonable weather here. My biggest concern is wind. It can be very gusty here at time with many whirls from the mountains around us. All outdoor equipments have to be very sturdy fit to withstand really severe gusts..So we are fine for now, we did have problems with snow and climate conditions, antenna polarization was "disturbed" by our weather, we had to tilt some antennas right and left during the winter, clients were dropping out and s/n levels ccq went down. Very annoying, circular polarization antennas would reduce this drawback.
Hello Veteran's!steen, airnet,
We are now in april and with v5.0 with nv2 embedded. Do you guys have some new updates for us?
Both mentioned some aspects where not 100% clear to you guys. You already learned more?
What are your experiances with nv2 now so far on this moment? (And with the new 5.0ros?)
I have it running now on some of my networks, not all.
I have had lots of issues with mixed PtMP networks but found some ´hardening´ procedures for stabilizing. (Fixe freq. scan, mentioning of both SSID and mac in ´connect to´ option) and by degreasing channel bandwiths whereever possible (ongoing process) from 20 to 10Mhz and limiting data rate to 18Mbps (which makes 9Mb in 10Mhz channels) I manage to get most issues under control.
In previous post I distilled two questions that are still not clear to me:
1. NV2 or TDMA makes AP sends at full power when transmitting 24/7 even on idle link while 802.11 would only do when really transmitting data? Would this not shorten the live of the radio and would it not consume lots more power? Important to know for battery powered installations. If capacity was calculated for 802.11 situation same might now prove to be short falling.
2. I have been learned on this forum and/or support/3rd party tutor, that in 802.11 you can set data rates (for AP, leave CPE at default) to fixed level but you always need at least two more data rates set. One as a fall back in case the set one can't sustain and the lowest one since that one is needed to allow the basic rate. Is this in NV2 now not the best scenario? I read in the posts of airnet that nv2 more asks for a setting of one and one data rate only? (And should the basic rate then be set to the same?)
I hope you guys can come up with a follow up on the nv2. Together we can then decide to edit the Wiki in such that it is more clear what the differences between the 3 protocols are and what is the best suggested configuration for nv2.
What is "ip-packing"?8. Disabled ip-packing, it was causing timeouts and strange communication lockups.
It packs/compresses IP packets before sending them away, all the time try to fill full the transport MTTU, and send them away.What is "ip-packing"?8. Disabled ip-packing, it was causing timeouts and strange communication lockups.
I am all with you. I am sailing in the same direction. But most probably I am in the same boat as many of us, plenty of 133C's (and even 122's?) in my network around. Just to replace them all at once to run nv2 and QoS is becoming a bit costly so it has to happen over time....Upgraded a live RB133 running nv2 from ROS4.16 to 5.2 for testing.
Before upgrading the bottom line cpu-usage was about 9%, and rised to about 11%. Opening "new terminal" still gives a cpu-load at 100% for a while but seems to calm down a little bit earlier than before. Don't try to open new terminal while Your customer is online!!
I compared one RB411(with running QoS) and this RB133 by sending ping from one location and running btest in both directions (50% of delivered capasity) from another. No difference in latency...
So it seems to work well, but maybe hard to manage if the customer is online. I still want to change to RB411 with QoS to set local priority for "important" traffic to get more happy customers and less service calls coursed by p2p. It works exellent in RB411/711.
AP'S are most effected by NV2 disconnections which all clients cannot have high SNR, PTP is less effected theory being narrower antenna TX/RX beamwidth less pickup of interference, single AP on a mast generally no problems but have a stack of sector AP's then disconnections could occur, one setting most important is on the clients is wireless protocol "nv2 nstreame 802.11" and not "Any" this way you can quickly switch between protocols should disconnections occur also to enable nv2 security.Hello Folks!
Now at ros5.6 we started to go live in production, leaving the lab.
Two sectors so far and no problems.
All settings is the default from factory, exept authentication.
Lets see now, there is a lot of fuzz in mikrotik forums about connection losses.
All our antennas have high SN and gain exept very few of them which we will build new sectors for later.
At 4.16 we did have success i lab, but breakdown in real world both with migration to 5.x and nv2.
Confirmed! We did exactly that and now in production, two sectors, 16 hours no disconnections.AP'S are most effected by NV2 disconnections which all clients cannot have high SNR, PTP is less effected theory being narrower antenna TX/RX beamwidth less pickup of interference, single AP on a mast generally no problems but have a stack of sector AP's then disconnections could occur, one setting most important is on the clients is wireless protocol "nv2 nstreame 802.11" and not "Any" this way you can quickly switch between protocols should disconnections occur also to enable nv2 security.Hello Folks!
Now at ros5.6 we started to go live in production, leaving the lab.
Two sectors so far and no problems.
All settings is the default from factory, exept authentication.
Lets see now, there is a lot of fuzz in mikrotik forums about connection losses.
All our antennas have high SN and gain exept very few of them which we will build new sectors for later.
At 4.16 we did have success i lab, but breakdown in real world both with migration to 5.x and nv2.
That is normal for NV2, i think ccq is calculated with actual traffic being passed so no traffic ccq will read very low and also it is advised for say antenna alignment to ping address of units beyond (ptp or Ap -Cpe) and not just the ptp (or AP) ip address's and with nv2 ccq responds much slower after adjustment so adjust and wait.As in lab, we also see the link speed varies, when antennas are silent they go down to 9Mbit/s and immediate at traffic they go up to 54Mbit/s. All CPE antenna's S/N is from 45 - 62, CCQ varies from 97-100 at traffic but goes down to very low values when no traffic is passed, around 20. When using nstreme it was rock solid 54Mbit/s at all time and CCQ was 98-99 all time. Anyway I have not had any complainments from customers but why this behavor ?
Is there any reason to "lock" speeds to 54Mbit ?
http://forum.mikrotik.com/viewtopic.php?f=3&t=52966We plan to start use 108Mbit to get more speed when the gitabit links arrives to central site, what about that ?
SXT is not yet an option here, it's antenna is to weak in our noicy environment.
You mean the RIC522C units?After that we need to migrate over to something faster than R52 boards and finalize it within one year.
I got them from Leo at Limmared, no discount 's and for Sweden it is good prices.Hi Steen,
I have been looking at these antenna's you refer too in your earlier posts. I can only hope you get some good discounts there. Their prices are very high...
Yes RIC522C rocks!You mean the RIC522C units?After that we need to migrate over to something faster than R52 boards and finalize it within one year.
I have some 120+ of these still in use. The old ones with 133c's I am replacing the boards for new 711's and the ones with 411 I am going to change the radio's for units that are able to work with ´n´ protocol.
I find these RIC units are still about the top CPE units I ever came across looking at Rx/Tx characteristics and resistance to interferences. Its obviously the engineers that designed these RIC's had more knowledge about delivering a good antenna than the ones that engineered the SXT!
(The early RIC series had problems with departing front covers. Out of the 130+ I bought in the last 5 years, only saw 2 early ones have that happening. But I know from other earlier users it was a bigger problem before.)
Since these RIC's are not available any more I now use SXT in locations where interference is not an issue or started recently to use groove's on mesh antenna's. Wrapped the groove with alu tape and together with 21 or 25dB gain mesh antenna's or similar gain reduced side lobs (http://www.elboxrf.com/EN/p14/TetraAnt_ ... _RSLL.html) they give me very good performances.
http://www.interprojekt.com.pl/jirous-j ... -1091.htmlI got them from Leo at Limmared, no discount 's and for Sweden it is good prices.Hi Steen,
I have been looking at these antenna's you refer too in your earlier posts. I can only hope you get some good discounts there. Their prices are very high...
But I would just love to get dual band directional antennas with 19-23dbi. Also I would like to get with circular polarization, H-Circ and V-Circ.
NICE antennas!http://www.interprojekt.com.pl/jirous-j ... -1091.htmlI got them from Leo at Limmared, no discount 's and for Sweden it is good prices.Hi Steen,
I have been looking at these antenna's you refer too in your earlier posts. I can only hope you get some good discounts there. Their prices are very high...
But I would just love to get dual band directional antennas with 19-23dbi. Also I would like to get with circular polarization, H-Circ and V-Circ.
Very good antenna! I use them already for over a year. They ship world wide. Is Sweden in EUU or fiscal unity? In that case purchase without VAT. Save even more!
Look at these too:
Reduced side lob: http://www.interprojekt.com.pl/tetraant ... p-101.html
Find many more of the RSLL stuff from them: http://www.interprojekt.com.pl/antennas ... 31_91.html
I am very pleased with these RSLL antenna's and you can hang the groove's directly on them. Wrap a little bit of alu tape around the groove after aligning and you have a very compact high interference resistant unit!
To reduce the visual impact even more where interference is a lesser issue a mesh antenna with that same groove is also very good.
But I still nurse my RIC's. After 5 years they have by far best price-perfomance rating build up so far
Confirmed! We did exactly that and now in production, two sectors, 16 hours no disconnections.AP'S are most effected by NV2 disconnections which all clients cannot have high SNR, PTP is less effected theory being narrower antenna TX/RX beamwidth less pickup of interference, single AP on a mast generally no problems but have a stack of sector AP's then disconnections could occur, one setting most important is on the clients is wireless protocol "nv2 nstreame 802.11" and not "Any" this way you can quickly switch between protocols should disconnections occur also to enable nv2 security.Hello Folks!
Now at ros5.6 we started to go live in production, leaving the lab.
Two sectors so far and no problems.
All settings is the default from factory, exept authentication.
Lets see now, there is a lot of fuzz in mikrotik forums about connection losses.
All our antennas have high SN and gain exept very few of them which we will build new sectors for later.
At 4.16 we did have success i lab, but breakdown in real world both with migration to 5.x and nv2.
If it stays like that for a week, then we will do all the other sectors to.
Directional antennas, horizontal polarisation.
Basestation has this antennas: http://www.routerboard.se/shop/products ... ntell.html and also this http://www.routerboard.se/shop/products ... 19DBI.html.
Client's are mixed lots of rb522c and some few http://www.routerboard.se/shop/products ... %A4nk.html Ric522c has been very very successful at our sites, never a problem.
Also we noticed a reduction in CPU load exactly at 16:00 when we changed the basestation protocol from nstreme to nv2, this was unexpected, see picture: As in lab, we also see the link speed varies, when antennas are silent they go down to 9Mbit/s and immediate at traffic they go up to 54Mbit/s. All CPE antenna's S/N is from 45 - 62, CCQ varies from 97-100 at traffic but goes down to very low values when no traffic is passed, around 20. When using nstreme it was rock solid 54Mbit/s at all time and CCQ was 98-99 all time. Anyway I have not had any complainments from customers but why this behavor ?
Is there any reason to "lock" speeds to 54Mbit ?
We plan to start use 108Mbit to get more speed when the gitabit links arrives to central site, what about that ?
SXT is not yet an option here, it's antenna is to weak in our noicy environment.
Another consideration about NV2 is while it was working flawlessly for me 4 sectors + 2 PtP links on one mast added 2ptp links and just like a house of cards NV2 just fell over with regular disconnects and the strange bit was even powering down the 2 PtP's that was added still had disconnects, so my theory is they were acting like passive radiators/reflectors and bouncing signals onto an AP which would in part explain why some sectors were more effected than others.Confirmed! We did exactly that and now in production, two sectors, 16 hours no disconnections.AP'S are most effected by NV2 disconnections which all clients cannot have high SNR, PTP is less effected theory being narrower antenna TX/RX beamwidth less pickup of interference, single AP on a mast generally no problems but have a stack of sector AP's then disconnections could occur, one setting most important is on the clients is wireless protocol "nv2 nstreame 802.11" and not "Any" this way you can quickly switch between protocols should disconnections occur also to enable nv2 security.Hello Folks!
Now at ros5.6 we started to go live in production, leaving the lab.
Two sectors so far and no problems.
All settings is the default from factory, exept authentication.
Lets see now, there is a lot of fuzz in mikrotik forums about connection losses.
All our antennas have high SN and gain exept very few of them which we will build new sectors for later.
At 4.16 we did have success i lab, but breakdown in real world both with migration to 5.x and nv2.
If it stays like that for a week, then we will do all the other sectors to.
........
Nice configuration. Have you tried to apply any kind of stress test on sectors in terms of data traffic.Hello folks!
All our sectors are now NV2, we did add the last sectors, so far not a single dissconnect from any cpe. I am crossing fingers now.
All CPE connects at 54MBit seconds after changing to nv2.
Each sector has 10-12 CPE:s.
Our Internet here is 100Mbit fdx dual lines, speed is limited to 24MBit/s down and 5MBit/s up on each CPE and central router.
Dual rb333 act central routers and dual rb450g, bases are rb600a, cpe's is rb411 (RIC522C).
Basestations with sectors is not limited, they act as pure router and bridge for the wifi boards.
Each basestation has 3 directional sectors and one omni for 2.4GHz classic 802.11b.
All configuration is out of the box regarding nv2.
rb450g missbehave by 100% cpu now and then, restart helps.
All is ros5.6 monitored by the dude 3.6
Load on our basestation was lowered a lot by introduce nv2, also cpe show same result, as average 40-60% lower cpu usage.
Here is steenbas2 right after changing to nv2 around 19:46 :
Since it is production I did not do any stress test by myself, need persmission from the business first I can tell, business was shaking knees and become swetty, when switching over to NV2. I did here the classic wording: dont change something that works etc.Nice configuration. Have you tried to apply any kind of stress test on sectors in terms of data traffic.Hello folks!
All our sectors are now NV2, we did add the last sectors, so far not a single dissconnect from any cpe. I am crossing fingers now.
All CPE connects at 54MBit seconds after changing to nv2.
Each sector has 10-12 CPE:s.
Our Internet here is 100Mbit fdx dual lines, speed is limited to 24MBit/s down and 5MBit/s up on each CPE and central router.
Dual rb333 act central routers and dual rb450g, bases are rb600a, cpe's is rb411 (RIC522C).
Basestations with sectors is not limited, they act as pure router and bridge for the wifi boards.
Each basestation has 3 directional sectors and one omni for 2.4GHz classic 802.11b.
All configuration is out of the box regarding nv2.
rb450g missbehave by 100% cpu now and then, restart helps.
All is ros5.6 monitored by the dude 3.6
Load on our basestation was lowered a lot by introduce nv2, also cpe show same result, as average 40-60% lower cpu usage.
Here is steenbas2 right after changing to nv2 around 19:46 :
For example, set 7-8 clients simultaneously downloading data.
Which is the maximum data rate per client on this case?
Looking forward for the test results!Next will be the stress test and then later increase bandwith from 20MHz to 40MHz and see how it works then. I will come back with the test results.
Which bug?I worked with Mikrotik to help fix the bug before releasing it.
Yes what bug are you referring to, is it NV2 disconnects or some other issue that was resolved by 5.17?Which bug?I worked with Mikrotik to help fix the bug before releasing it.
The way it goes is like this:What i don't understand if the "bug ?" was fixed and i assume MT gave 5.17 to others to test, why we haven't read such good news on the forum from others?
I agree but there is one important omission you have forgotten to mention about leaving them time to mature the changes and that is it should only apply to issues they can reproduce on the test bench, issues they cannot reproduce on the test require a totally different approach to achieving a solution.The way it goes is like this:What i don't understand if the "bug ?" was fixed and i assume MT gave 5.17 to others to test, why we haven't read such good news on the forum from others?
1. You've a problem with the actual release
2. You mail to support@mikrotik.com with .rif
3. They see it may be a bug, do a patch to their hot development source tree
4. They give you the hot shot of the moment
So then you may be lucky or you may step into a problem one of the developers
coded into last night. If another customer does the same he might get the
next hot shot including the fixes for your problem...
So let them some time to mature changes and dont urge them to release version
which are between the normal ones.
Yes. This could be done with a nv2_test package. They've done this with wireless testI agree but there is one important omission you have forgotten to mention about leaving them time to mature the changes and that is it should only apply to issues they can reproduce on the test bench, issues they cannot reproduce on the test require a totally different approach to achieving a solution.The way it goes is like this:What i don't understand if the "bug ?" was fixed and i assume MT gave 5.17 to others to test, why we haven't read such good news on the forum from others?
1. You've a problem with the actual release
2. You mail to support@mikrotik.com with .rif
3. They see it may be a bug, do a patch to their hot development source tree
4. They give you the hot shot of the moment
So then you may be lucky or you may step into a problem one of the developers
coded into last night. If another customer does the same he might get the
next hot shot including the fixes for your problem...
So let them some time to mature changes and dont urge them to release version
which are between the normal ones.
You're kidding. With 5.7 I'll do my next PTMP/nv2 tests. With all tests so farare you guys talking about actual problems you have, or only about theory?
we only have 2-3 people in support with open tickets about wireless nv2 issues. if you are not one of them, don't blame mikrotik for not fixing your issue. most people use nv2 without issues. the discussion about the "bug" is about very specific issues that affect very few people.
Instable data rates (going down into the kbit/s range) and instable latency.what is stability? did you get disconnections, inconsistent signal, changing data rates? what's the ticket number?
I think you have to give us a bit more info here. I am amongst others that persistently complained about NV2's issues in previous versions. I have been reading almost all post in this regard.Instable data rates (going down into the kbit/s range) and unstable latency.what is stability? did you get disconnections, inconsistent signal, changing data rates? what's the ticket number?
I did not send a ticket. I've heard the same problems here in the forum so
I waited for nv2 to mature. It looks like it is working now for some here so
I do my next try with the next release as it promises to increased routing
performance, too.
Thanks for your offer. I'll start doing tests again with the upcoming 5.7.I think you have to give us a bit more info here. I am amongst others that persistently complained about NV2's issues in previous versions. I have been reading almost all post in this regard.Instable data rates (going down into the kbit/s range) and unstable latency.what is stability? did you get disconnections, inconsistent signal, changing data rates? what's the ticket number?
I did not send a ticket. I've heard the same problems here in the forum so
I waited for nv2 to mature. It looks like it is working now for some here so
I do my next try with the next release as it promises to increased routing
performance, too.
I found that not only for me, but for several others too, 5.6 definitely improved the wireless a lot to an almost complete solution.
If you still have the kind of problems you tell us you should give us more info. Maybe you just have other issues that have nothing to do with NV2.
A fresh pair of eyes into your configs might give some answers?
Well, here we already have a clue. NV2 needs relative stably connected clients. Preferably in the -50 to -70 range.I've bad conditions as due to ETSI power restrictions I've customers with
weak signal even to a point where they drop off. Let's see how nv2
handles this compared to plain 802.11.
This might be the case. But keeping the signal in the -50 to -70 range is an ideal (lab) conditionWell, here we already have a clue. NV2 needs relative stably connected clients. Preferably in the -50 to -70 range.I've bad conditions as due to ETSI power restrictions I've customers with
weak signal even to a point where they drop off. Let's see how nv2
handles this compared to plain 802.11.
If some of your clients are in such a low signal range NV2 probably is not going to do it for you.
NV2 is TDMA which means every associated client is assigned with a sort of ´time slot´ to communicate. If now a client is disassociated because the link drops due poor signal, the AP has to acknowledge the disconnection and remove the timeslot it reserved for that CPE. Next time, if the client just got a bit more signal and wants to associate again, the AP has to arrange for a new timeslot in the sequence. It is clear that is not doing the whole TDMA process any good if this happens on a very regular base.
Under these situations legacy 802.11 (or nstreme) might indeed give better results.
Also because NV2 seems to be more prone to interferences than normal 802.11 and with low signals the link is prone to suffer more from interferences.
Hi steen,Hello Folks!
NV2 two weeks now, so far not a single drop if link. Whole system is rock solid at all loads, we use ROS 5.6 all over. Also much reduced load on all AP:s and CPE:s, less than 1/3 than before. And yes, I am in middle of city like environment, much noice and obstacles, freznel links etc. Also I noticed som few distant CPE which had problems with dropouts before when using nstreme, now never dropout. Their Signal is about -68 to -87.
Hello Dzieva!Hi steen,Hello Folks!
NV2 two weeks now, so far not a single drop if link. Whole system is rock solid at all loads, we use ROS 5.6 all over. Also much reduced load on all AP:s and CPE:s, less than 1/3 than before. And yes, I am in middle of city like environment, much noice and obstacles, freznel links etc. Also I noticed som few distant CPE which had problems with dropouts before when using nstreme, now never dropout. Their Signal is about -68 to -87.
You are using dual chain, or only chain0?
Regards,
Dzieva
Can you give us some tips regarding these out of the box settings gave you two weeks uptime without single drop on nv2?Hello Dzieva!Hi steen,Hello Folks!
NV2 two weeks now, so far not a single drop if link. Whole system is rock solid at all loads, we use ROS 5.6 all over. Also much reduced load on all AP:s and CPE:s, less than 1/3 than before. And yes, I am in middle of city like environment, much noice and obstacles, freznel links etc. Also I noticed som few distant CPE which had problems with dropouts before when using nstreme, now never dropout. Their Signal is about -68 to -87.
You are using dual chain, or only chain0?
Regards,
Dzieva
All is out of the box settings exept the authentication part and frequency.
We use only Wireless (Atheros AR5413) 20MHz BW, not yet 40MHz.
We do not have any "n" boards in production with chains.
In lab tests we used dual chains, not a problem for the month we were testing.
This is due to we have rebuild out entire infrastructure to do it, not an option at moment.
Hello Folks!
Yet all working 100%, also during a heavy thunderstorm this weekend.
Probably because he uses the units ´out of the box´ as he calls it with minimum config settings.Hello Folks!
Yet all working 100%, also during a heavy thunderstorm this weekend.
Just curious why you have Adaptive noise immunity set to client mode on the AP and don't have it set at all on the client?
Chadd
As told, settings is out of the box, our distributor did configure our first devices (AP and CPE) years ago for nstreme, then we just cloned configuration.Hello Folks!
Yet all working 100%, also during a heavy thunderstorm this weekend.
Just curious why you have Adaptive noise immunity set to client mode on the AP and don't have it set at all on the client?
Chadd
I am very open to changes that can improve performance and security.Probably because he uses the units ´out of the box´ as he calls it with minimum config settings.Hello Folks!
Yet all working 100%, also during a heavy thunderstorm this weekend.
Just curious why you have Adaptive noise immunity set to client mode on the AP and don't have it set at all on the client?
Chadd
I have the same question in relation to the use of authentication. It is on both AP and CPE set to default. Meaning if the NV2 security is not enabled it is not difficult for an intruder to enter his network and abuse it.
And if somebody would know the NV2 security key his network is all open.
It would be better to have a second (mac authentication) or even a 3rd level of security (fixed ARP table). Special in a city like environment it is only a matter of time before some starts to develop an interest in hacking his network. Might be a kid, might be a real criminal.
He also has several other settings that are either not used, or set and of no meaning:
- default forwarding is enabled on both AP and CPE. Unless you want your customers to communicate with each other this is better to be switched off. It could bring another security breach (virus spreading!) but it can also flood his network when users start communication with each other outside any traffic limiting process that usually only takes place at the border of his network.
- several 802.11 legacy setting are not set, so if AP for any reason has to switch back from NV2 to 802.11 legacy his network has by far optimum settings.
- yet he has a security profile set. This only has a meaning in legacy mode. Not in NV2
There are probably more small items that can be tweaked, but he says his networks runs fine, so maybe its ok than? But I would definitely set a lot more....
You're sure on "Disconnect Time-out" and "On Fail Retry time"?802.11 legacy settings that have no meaning in NV2 are (not complete):
- security profile
- Hw. Retries
- Hw. Fragmentation Threshold
- Hw. Protection Mode (RTS/CTS)
- Frame Lifetime
- Preamble (this I am not 100% sure off. MT has't answered my questions about it.)
- Disconnect Time-out
- On Fail Retry Time
I asked MT and they told me all these settings were of no meaning in NV2.You're sure on "Disconnect Time-out" and "On Fail Retry time"?802.11 legacy settings that have no meaning in NV2 are (not complete):
- security profile
- Hw. Retries
- Hw. Fragmentation Threshold
- Hw. Protection Mode (RTS/CTS)
- Frame Lifetime
- Preamble (this I am not 100% sure off. MT has't answered my questions about it.)
- Disconnect Time-out
- On Fail Retry Time
I mentioned this before and one would assume MT would know how the NV2 proprietary protocol interacts with other wireless setting; they should have just greyed out setting having no effect when NV2 is enabled and stop all this unnecessary guess work?I asked MT and they told me all these settings were of no meaning in NV2.You're sure on "Disconnect Time-out" and "On Fail Retry time"?802.11 legacy settings that have no meaning in NV2 are (not complete):
- security profile
- Hw. Retries
- Hw. Fragmentation Threshold
- Hw. Protection Mode (RTS/CTS)
- Frame Lifetime
- Preamble (this I am not 100% sure off. MT has't answered my questions about it.)
- Disconnect Time-out
- On Fail Retry Time
In TDMA AP assigns stations time slots to communicate. How long, what order (compared to other stations) etc.
How this actually has effect on these two I am not 100% sure of. I haven't test it and in normal use I don't see a difference.
I can imagine both. It still has a meaning in NV2, or not.
I asked MT in the early days of NV2 and actually got the ´feeling´ they didn't fully have all the ins and outs of it covered. So maybe their answer at the time was not completely right.
Maybe somebody else can shine more light on this?
I can't agree more.I mentioned this before and one would assume MT would know how the NV2 proprietary protocol interacts with other wireless setting; they should have just greyed out setting having no effect when NV2 is enabled and stop all this unnecessary guess work?
Thank you very much! Very fine suggestions, we will start to fine tune our network with the suggested settings, at least the security parts and the onees that makes devices connect faster to AP:s. I have been thinking about several of them. Anyhow we did never change anything after our distributor helped us setting up our first basestations her years ago (2007), all has worked 100% to our satisfaction if we exclude some of my nice mistakes(2009) which is not MT fault. Our motto is do not change things that work.OK,
ANI (Adaptive Noise Immunity) is an Atheros AR5212 and later chipset add on. Google on it but here is a link I found with in it another link to the Atheros patent doc on the technology: http://gregsowell.com/?p=3129
Off course you set for client only in the client, and for `AP and client` in the AP.
Authentication:
It won't make the network more stable, it is more an level in security.
By setting the AP's mac address in the ´connect-to´ list of the CPE you make sure that the CPE is only trying to associate with that AP only. In your setting an abuser/hijacker/intruder only needs to setup an AP that sends in the same Freq. and with the same SSID as yours and if his signal is stronger there is a good change your client CPE will jump over to his AP and your client is basically connected to somebody else's network. This is a clear security breach.
In setting the ´connect-to´ with a mac address your offender also needs to clone the mac of your AP so he first needs to sniff it. Not complicated but just an extra step on the security ladder.
In setting the ´access list´ in the AP you make sure only these mac addresses of your clients that are known and allowed will associate to your AP . Off course again an offender can try to clone the mac. of the client, but yet again, you step up the security with another (small level).
If you now also in the ARP list make mac-IP combinations fixed, and disable the auto function, in case an offender would now clone a mac, he also needs to give his unit the proper same IP as your CPE. If now both your client's CPE and the offender's CPE try to use same IP because they are shown both with same mac, it will be obvious you get strange behaviours on the network and if the network operator not notices, the client will definitely do!
If you never intend to use legacy 802.11 any more all the settings belonging to them can be left behind. But at times you might want to revert back to it with your network. If in this case your legacy settings are wrong or poor it might give problems for units to stay associated to the network and due ´flickering´ CPE's trying to associate and losing it again your network might become very unstable.
802.11 legacy settings that have no meaning in NV2 are (not complete):
- security profile
- Hw. Retries
- Hw. Fragmentation Threshold
- Hw. Protection Mode (RTS/CTS)
- Frame Lifetime
- Preamble (this I am not 100% sure off. MT has't answered my questions about it.)
- Disconnect Time-out
- On Fail Retry Time
In case of working with 10 or 5Ghz bandwidth in 5Ghz band I also would set the ´wireless scan list´. This shortens the time a CPE needs to scan for the freq. his assigned AP is working in. When connectivity is an issue this helps a lot in keeping CPE's as short as possible disconnected fm. AP. Instead of scanning the whole band, which can take noticeable time, CPE is already tuned to the desired frequency and can associate immediately.
Although most of these tweaks won't necessarily increase your network's stability if it is already good, it will help it keeping more stable when the wireless interconnectivity has issues. Special when you for what ever reason have to go back to legacy or nstreme mode for a while.
More important, relying on one wireless network security level only (NV2 security) is marginal. If you have a fixed customer network you can step up security level more. Maybe you never will benefit from it, but that is the same as a country having an army while there is never a war.
One thing that might improve your network stability if appropriate could also be setting the data rates fixed in the AP. Under marginal circumstances where radio's could have difficulties maintaining highest data rates setting these lower and fix them keeps your network much more stable under these marginal circumstances (snow storm, heavy rain, electrical storm, magnetic storm, external source of radio disturbances etc.)
As long as your chosen rate is set to double or next step higher than double than what the contractual client max. speed is you are not creating a bottle neck.
I agree fully, all winbox bars and knobs are comfusing at least for me, and yes I am kind of beginner here since we did have MC consultants setting things up for us. Would be most helpful to grey out some of them dependent on what you pick.I can't agree more.I mentioned this before and one would assume MT would know how the NV2 proprietary protocol interacts with other wireless setting; they should have just greyed out setting having no effect when NV2 is enabled and stop all this unnecessary guess work?
It would help shorten the ´learning curve´ a lot for starters and avoids lots of confusion.
Both MT and users would benefit greatly from that.
Search for "disconnections" and NV2" in this forum and you'll find tons of posts about it and what to do to avoid them as much as possible.Hi All,
We've been using nv2 on 5GHz-only-N more. For some bizarre reason mode 5GHz-A/N created disconnection problems.
The have no effect on NV2.For Hw.Retries setting I've also read that this does not makes sense in nv2 but after setting to 9 or 10 then links become more stable.
ROS can handle up 2007 stations.In the current setup we utilize 12 clients per sector without congestion problems.
Is there any way to calculate and determine the maximum number of clients can be connected on a single sector??? (Without interference problems, data collisions etc)
OK.. RB800 is the absolute board if you can afford price.I use up to 35 clients with 4/5Mb assigned traffic on a rb800 and I've heard guys going up to 50 or even higher.
I think I'll go to 40-45 but I need to see the average max. sustained CPU load to see how far I can go. When CPU runs for prolonged times (due heavy traffic) in ranges of 50-70% I would start thinking of upgrading my network.
I also started with 433's and 433AH's. Lots of us start small and cheap. But when you grow and AP are being populated more and more you'll learn that re-investing your money is going to be worth it.OK.. RB800 is the absolute board if you can afford price.
We use 433 with R52Hn.
Which miniPCI adapter do you use?
And what type of sector antenna?
Where can i download 5.9?Steen and others. There are drastic improvements in Nv2 which many people are already confirming. Write to support to get the v5.9 version with new Nv2
Write to support to get the v5.9 version with new Nv2
I have two 'typical' situations. One is in an heavy congested area where many clients are around in a circle of less then 2000mtrs. They are served with 5 AP's and even so some of them are almost 'full'. Interferences have been an factor to work with from the beginning...Hi WirelessRudy! Back again....
Which is the typical distance between your clients and central AP? (Max?)
Can this distance affect total AP capacity in terms of clients count (if yes how?) or this is just depended on signal and noise levels?
(Of course as mentioned capacity affected by type of routerboard , type of antennas, type of clients etc...)
By all means talking about nv2 implementations...
Ok thanks, I wait till it is released officially I have learned not to be the first one and not be last one trying out the new. 5.6 work very well in our environments exept cpu goes 100% in some FLASH operations now and then in our routers.Steen and others. There are drastic improvements in Nv2 which many people are already confirming. Write to support to get the v5.9 version with new Nv2
Impressive!Trying Nv2 on our first AP. Version 5.14 and looks very promising... will probably migrate all our cpe's to mikrotik after seeing this. Went from being able to push about 10-12 meg with good latency through a single chain G-mode 2.4ghz AP in 802.11 to being able to push 18-20 meg with good latency. Signals range from 60-73 on client rx with 9 clients right now. TDMA period set to 4 and cell radius set to 10.
And where are you now? Still with MT? Still performing?One year plus later report!
All is still very stable!
We now got gigabit internet at basastations, our rb411 cpe:s devices is pumping data up to 20-25Mbit/s without any hassle, cpu 40%-45% and sxt goes up to 35Mbit/s and basastation with standard mt r52 radioboards. Pingtimes is less than 16ms all time.
Hello!And where are you now? Still with MT? Still performing?One year plus later report!
All is still very stable!
We now got gigabit internet at basastations, our rb411 cpe:s devices is pumping data up to 20-25Mbit/s without any hassle, cpu 40%-45% and sxt goes up to 35Mbit/s and basastation with standard mt r52 radioboards. Pingtimes is less than 16ms all time.
Ok, that's nice!Hello!And where are you now? Still with MT? Still performing?One year plus later report!
All is still very stable!
We now got gigabit internet at basastations, our rb411 cpe:s devices is pumping data up to 20-25Mbit/s without any hassle, cpu 40%-45% and sxt goes up to 35Mbit/s and basastation with standard mt r52 radioboards. Pingtimes is less than 16ms all time.
Yes, we are still going strong, all works to satisfaction. We also have introduced several SXT 5 ac, QRT 5 and SEXTANT to get higher speeds in ptmp. We achieve easily sustainable speeds of 80-90Mbit/s in such networks and yet everything is stable, peaks up to 150Mbit/s has been observed. We do indeed have many RB411 based devices at customer's, we swap them to newer devices as they fail or customer experiences any problem.
2/3 of the times customers complains, it is their home router like some old netgear or drink device, that needed to be upgraded to a newer model. The rest of cases is something we missed during a firmware upgrade or in some few cases (3 cases to be exact) a mikrotik device failed due to thunder strike.
So conclusion is: nv2 and mikrotik is a success story!
nv2 works reliable but dont scale. We dont see this 80-90MBit/s as soon there are more than 3-4 CPEs connected. And we dont see this with tcp. We always have a big difference between UDP and TCP Speeds with nv2. As you do backhauls with nv2 this sums up. We see this getting better with newer ROS releases.Ok, that's nice!Hello!And where are you now? Still with MT? Still performing?
Yes, we are still going strong, all works to satisfaction. We also have introduced several SXT 5 ac, QRT 5 and SEXTANT to get higher speeds in ptmp. We achieve easily sustainable speeds of 80-90Mbit/s in such networks and yet everything is stable, peaks up to 150Mbit/s has been observed. We do indeed have many RB411 based devices at customer's, we swap them to newer devices as they fail or customer experiences any problem.
2/3 of the times customers complains, it is their home router like some old netgear or drink device, that needed to be upgraded to a newer model. The rest of cases is something we missed during a firmware upgrade or in some few cases (3 cases to be exact) a mikrotik device failed due to thunder strike.
So conclusion is: nv2 and mikrotik is a success story!
How 'deep' is your network, seen from AC? Xms-tree alike, 2 levels, 3, 4?
How is you QoS made? At the AC only? Or also at AP and/or CPE level?
Reasons for asking is that we have a full MT network, up to 7 levels deep. Most of the AP's won't see no more than 60Mb aggregated client traffic in 20Mhz bands. Which is a bit disappointing if many other brands claim the be able to run many times more. 20 clients with 25Mb? We can only dream of something. 20 x 10 is already a problem for us......
OK. Thanks for the info.nv2 works reliable but dont scale. We dont see this 80-90MBit/s as soon there are more than 3-4 CPEs connected. And we dont see this with tcp. We always have a big difference between UDP and TCP Speeds with nv2. As you do backhauls with nv2 this sums up. We see this getting better with newer ROS releases.Ok, that's nice!
Hello!
Yes, we are still going strong, all works to satisfaction. We also have introduced several SXT 5 ac, QRT 5 and SEXTANT to get higher speeds in ptmp. We achieve easily sustainable speeds of 80-90Mbit/s in such networks and yet everything is stable, peaks up to 150Mbit/s has been observed. We do indeed have many RB411 based devices at customer's, we swap them to newer devices as they fail or customer experiences any problem.
2/3 of the times customers complains, it is their home router like some old netgear or drink device, that needed to be upgraded to a newer model. The rest of cases is something we missed during a firmware upgrade or in some few cases (3 cases to be exact) a mikrotik device failed due to thunder strike.
So conclusion is: nv2 and mikrotik is a success story!
How 'deep' is your network, seen from AC? Xms-tree alike, 2 levels, 3, 4?
How is you QoS made? At the AC only? Or also at AP and/or CPE level?
Reasons for asking is that we have a full MT network, up to 7 levels deep. Most of the AP's won't see no more than 60Mb aggregated client traffic in 20Mhz bands. Which is a bit disappointing if many other brands claim the be able to run many times more. 20 clients with 25Mb? We can only dream of something. 20 x 10 is already a problem for us......
We use different vendors and see how their promises come and go ). We're enthusiastic at the beginning and as time goes by most products dont hold up to their claims.
Esp. with backhauls we see wifi based products suffer somehow. So get rid of them in the center of your network. They are ok at the leaves. But 7 levels deep of wifi-based backhaul you'll never see good results regardless what vendor you use. There are some 5 GHz Products which are not wifi-based which do a very good job. But regardless what vendors claim. Full-Duplex Licensed links are far superior for backhaul. Reducing latency at the center links boosts your whole network.
OK. Thanks for the info.nv2 works reliable but dont scale. We dont see this 80-90MBit/s as soon there are more than 3-4 CPEs connected. And we dont see this with tcp. We always have a big difference between UDP and TCP Speeds with nv2. As you do backhauls with nv2 this sums up. We see this getting better with newer ROS releases.Ok, that's nice!
How 'deep' is your network, seen from AC? Xms-tree alike, 2 levels, 3, 4?
How is you QoS made? At the AC only? Or also at AP and/or CPE level?
Reasons for asking is that we have a full MT network, up to 7 levels deep. Most of the AP's won't see no more than 60Mb aggregated client traffic in 20Mhz bands. Which is a bit disappointing if many other brands claim the be able to run many times more. 20 clients with 25Mb? We can only dream of something. 20 x 10 is already a problem for us......
We use different vendors and see how their promises come and go ). We're enthusiastic at the beginning and as time goes by most products dont hold up to their claims.
Esp. with backhauls we see wifi based products suffer somehow. So get rid of them in the center of your network. They are ok at the leaves. But 7 levels deep of wifi-based backhaul you'll never see good results regardless what vendor you use. There are some 5 GHz Products which are not wifi-based which do a very good job. But regardless what vendors claim. Full-Duplex Licensed links are far superior for backhaul. Reducing latency at the center links boosts your whole network.
With 6 (I said "7" but in fact its "6") levels deep I mean to say that some client only get data if this data has travelled over 5 consecutive back hauls and the last wireless shot is the AP-CPE network. These are only a handful of clients though. The bulk of our clients are behind only 3 or less back hauls, so 4 or less wireless shots.
In deed we found the consecutive package losses en ping delays sum up making it hard to have the network perform well under heavy load of traffic. We have some AP's serving 30+ clients and some of these are entitled to get 20Mb to them (it that happens).
Recently we made 2 ospf simulated duplex links on two heavy used pipes (100 to 200mbps client traffic) and it did improve the latency.
Just last night I finished testing this new vendor's 60Ghz link for out main internal backbones that have to carry the bulk (90%) of our clients traffic and although there were several issues with the firmware I could have a sustained throughput of 550Mbps down and at the same 80Mb upload tcp traffic generated by 3 NetMetals connecting to 2 CCR's on the other end. Ping times were around 10-15ms but this was while the link was pushed to the max. Soon we dropped traffic to say 80% of these figures ping fell back to 1-2ms and if traffic falls back even further the ping went to 0-1ms.
The intention is now to replace the heavy used 5Ghz back hauls by these 60Ghz links for our 3 most important back-hauls that all connect directly to the core of our network. The idea is we should improve the rest of the more remote network's traffic a lot too since we sort of 'push' the fiber quality link towards the edge of our working core. Within this core (an urbanized area with 170+ clients, 5 AP's and 7 back hauls leaving) we will now free 180Mhz of spectrum (1 x 80, 3 x 40Mhz) which will then benefit the AP's in this urbanization.
The aim is to offer clients top speeds of 25Mb off these 5 AP's.
I have done one test on a AP with 4 clients simultaneously downloading from an Netmetal AP (omni antenna, all signals -50dBm max.) in a 20Mhz bandwidth. The AP itself still served 25 other clients (some of them using the internet).
I could push the aggregated throughput of the AP to just over 75Mbps. Cpu of the Netmetal stayed around 30% max and during this test I could just pull 150Mbps from the AC router towards this AP with the build in bandwidth test. (tcp traffic)
So I do not know what is actually withholding the AP from pushing more to its clients but so far not even that bad. But it could be much better imho. The question is only how....
Well, to be honest I am convinced there must be people out there that can have 20-40 CPE's to a NetMetal AP associated and at least 4 of these must be able to run at 20Mb download (=80Mbps) where we still can serve small traffic to the others..... if the 'pipe' serving the NetMetal is big enough. (Mine all can have 200Mbp in download session)Your ptmp numbers are ok but not good. With this signals >100MBit/s should be doable. Under ideal conditions >130MBit/s should be seen. I see this with another product with only 4 connected CPEs to one Test-CPE.
There are a lot of claims which dont work in real world. I know this 3-4 hundred claim. It is true but it is a very short range setup on a 80MHz Channel with no interference. And it uses plain 802.11ac with RTS/CTS. So there will be problems for sure. In the same situation you might consider to install 4 SXT SA AC and get a higher aggregated capacity using plain 802.11AC. 4 SXT-SA are cheaper than this one AP.Well, to be honest I am convinced there must be people out there that can have 20-40 CPE's to a NetMetal AP associated and at least 4 of these must be able to run at 20Mb download (=80Mbps) where we still can serve small traffic to the others..... if the 'pipe' serving the NetMetal is big enough. (Mine all can have 200Mbp in download session)Your ptmp numbers are ok but not good. With this signals >100MBit/s should be doable. Under ideal conditions >130MBit/s should be seen. I see this with another product with only 4 connected CPEs to one Test-CPE.
Still I have never been able to get more than 80Mbps at the cost of latency (NV2 slot time set to 10ms. On 'auto' or 1 -3ms the latency is better but throughput falls back to 50Mbps max....
The clue must be in the queues or QoS. But with all the theory around its hard to find the right info on what should be done to boost up the AP's.
Inho it can't be that all competition claims 40+ clients and 3 or 4 hundred aggregated on basically the same technology...
Or is MT's NV2 protocol really that bad?