Tag Archives: networking

Wifi problems with TP-Link’s Powerline Starter Kit (WPA4220)

tplink 4220Summary: Powerline adaptors are better than they used to be but they aren’t without their problems.

I’ve recently moved house and didn’t want to go to the time and expense of wiring up my new house with CAT6 ethernet, so opted for some Powerline adapters instead. I’d used an early set of these (85Mbps) back in 2007 but standards have definitely advanced in this area and now we have 500Mbps adapters (well sort of) so I thought it was worth revisiting the technology.

My local computer store had a couple of TP-Link units in stock (WPA4220 Starter Kit) and I bought them on a whim. Plugging them in and getting them working took all of five minutes and voila – connectivity! The speeds weren’t great (around 80Mbps on average, so 5-6MBps on file transfers) but then my house was built in the 70s so it’s not especially modern and that does affect speeds. The bigger variable in my case was the fact I have a three phase power supply, rather than the more usual one. At first I thought this would prevent or greatly hinder my use of powerline networking but my powerline networking works just fine over multiple power phases (apparently a shared consumer unit is key). Speed is affected (my dropped to 60Mbps when crossing phases) but I’m really just using it for web browsing and streaming some video which seems to work fine.

UPDATE APRIL 2015 – I’ve now done some testing with iPerf and my speeds are lower than those reported by the TP-Link utility – often significantly. For example TP-Link reports 75Mbps when iPerf reports 25Mbps for the same link. Even allowing for protocol overheads there’s a significant discrepancy. I think TP-Link may be reporting ‘theoretical’ speeds achievable over my powerlines (using the PHY layer) whereas ‘real world’ transmission is impacted by many other factors. Still, I can stream HD without issue most of the time.

All said I was very happy with my powerline setup, until I’d been running the integrated wireless AP for a few days and started noticing connectivity problems. I’ve got a mixture of tablets (a couple of iPads, Nexus 7), smartphones, Sonos wireless speakers and the odd Google Chromecast and found that within a day or so they’d lose internet access. After further investigation and some Googling I found plenty of people in a similar scenario (here, here, here, and here) but with no acknowledgement or fix forthcoming from TP-Link. Sadly the logs for these units are hardly worth having as you can see in the screenshot below – over 20 hours after powering it on (and with Wifi failing) all that was logged was the initial startup event and even that didn’t have a timestamp;


The problem seems to be certain types of traffic don’t pass through the wireless AP, even through plugging into the wired http://premier-pharmacy.com/product/abilify/ powerline socket on the same unit works fine. I quickly identified that DHCP broadcasts weren’t being received by wireless clients so devices were failing to renew their leases and dropping off the network. A simple reboot of the TP-Link resolves the issue for a while but it recurs within a few hours. Interestingly setting a static IP seems to be a good partial workaround as the wireless AP is still working and sending most types of traffic, but some devices, like the Chromecast, only support DHCP. For my Chromecast I’ve therefore set my DHCP server to reserve an IP for about a year! To alleviate the issue even further I’ve now bought a mains timer switch and automatically reboot the unit twice a day – a horrible hack, but it works. When the wireless fails I can’t even ping the TP-Link’s IP address wirelessly, even though i can ping my router and other devices on my network, and I can ping the TP-Link via a wired connection. Frustrating.

Without much visibility under the hood (this can’t run the highly customisable DD-WRT as that doesn’t understand powerline networking) the best I can tell is that some types of traffic are not being bridged onto the wireless AP correctly. I’m sure a few Wireshark captures would confirm this in more detail but as I’m relying on TP-Link to fix it one way or another I haven’t drilled down to that level. Unfortunately I believe a software fix (ie firmware update) is required and so far nothing has been forthcoming from TP-Link. On one of the posts linked to above there’s a post from ‘Vincent’, who I believe works for TP-Link, claiming that they’re trying to replicate the issue – I’m not sure why that should be difficult as I’d imagine a software issue would be pretty consistent but I can give them the benefit of the doubt for a while longer. Judging by a blogpost from Alex Boschman it looks like the equivalent Devolo unit’s aren’t immune to problems either, so maybe I’ll have to try D-Link or Solwise instead. Or maybe I’ll just wire up the house after all and use a standard wireless device, it might still be the most quickest way to get reliable access… 🙁

UPDATE: 27th November – I’ve now also tried a TP-Link TL-WPA281 which is essentially the older variant which only offers 300Mbps for the wireless AP. Sadly this behaves the same way. I’ve also experimented replacing the wireless functionality of the TP-Link with an old Netgear unit (WGR614v9) (I plug the Netgear into the TP-Link, so I’m still using the powerline aspect) and that seems to work flawlessly so I still think the TP-Link devices are the cause of my wifi issues.

Further Reading

Google chromecast network traffic (via Cisco)

Why multicast doesn’t always work with Wifi

Google Chromecast router compatibility list

Thoughts on VMware’s NSX ICM course

Summary: My thoughts on the new NSX Install, Configure, Manage (ICM) course, based on sitting the beta course (the usual beta caveats therefore apply).

Back in June I sat the beta of the VMware NSX Install, Configure, Manage course at VMware’s head office (at Frimley in the UK) and I thought it would be worth detailing my thoughts and experiences now that the course is publically available. This post won’t describe the course agenda in detail as you can read the official course description (along with prices, booking info, schedules etc) but from a quick look at the agenda I’d say the content hasn’t changed much.

Do I need to be a network guru?

Before booking the course, my first concern was the target audience. For those unfamiliar with my background I’m a compute and storage guy, not a network guru, so I was curious how well I’d cope with the networking material. I spoke to the trainer in advance (Paul McSharry, who I knew from my Design Workshop a few years ago) who advised that CCNA equivalent knowledge would be fine, and even pulled a few strings to add an extra place and get me on the course after it filled up. Thanks Paul! 🙂

Although the intended audience is described as “Experienced system administrators that specialize in networking” we were told that VMware are targeting the course at vSphere admins, not network admins (apparently there will be a different course released in the future). This is borne out via the official, minimal,  prerequisites listed below which have very little network focus;

  • System administration experience on Microsoft Windows or Linux operating system
  • Understanding of concepts presented in the VMware Data Center Virtualization Fundamentals course for VCA-DCV certification

Despite meeting those quite happily I found some sections challenging, particularly around VXLAN. Knowledge of network overlay concepts, and VXLAN in particular, is essential. I’ve done lots of work with vSphere but not much with vCloud, so hadn’t really worked with VXLAN in any depth and there’s a lot of terminology to understand – VTEP, UTEP, MTEP, and LIF to mention a few. VXLAN is also used in Cisco’s competing ACI product (as explained by Gary Kinghorn from Cisco) so it’s well worth learning even if you’re not going down the NSX route. Some background knowledge of routing protocols such as OSPF and BGP etc would also be beneficial. If you’ve worked with the vCNS interface, you’ll have a good headstart as NSX looks very similar.

What does the course cover?

The course content is 50% instructor led and 50% lab time and in summary covers the following topics (much of the content is available publically, and for free, on various blog series – see my links at the bottom for more info);

  • NSX Manager/controllers/clusters
  • NSX Edge Gateway appliances (basically upgraded vShield Edge)
  • Logical switching, routing, VPNs, load balancers, and firewalls (including microsegmentation)

nsx-featuresFor me the biggest benefit was access to hands on experience with NSX – unless you’re lucky enough to work with it via your company the only option is the two online HOLs (NSX for vSphere and NSX for multi-hypervisors). I believe access will become more widespread soon but it’s been frustrating many people while they wait for access to a product that’s supposedly GA.

In my case I was very lucky to have an exceedingly well educated bunch on the course with me, including Michael Haines (who works for VMware and helped create the vCloud Architecture Toolkit among other publications) and some guys who were doing the bootstrap program towards the VCDX-NV. This stimulated some great debate and meant someone in the room could answer any question I threw at them (probably in their sleep). Most courses won’t benefit from this level of expertise but it’s always worth learning from other candidates on courses regardless.

The 17 labs do a good job of slowly building up an internal network, adding multiple networks with routing, integrating it with external networks and adding VPNs, firewalls etc. As you’d expect it showcases the flexibility enabled by virtualising networks, such as the ability to move L3 networks around and microsegmentation (a killer feature say VMware). I found the labs short on context and too focused on ‘click here, type this’ rather than scenerio based – you weren’t always encouraged to think about what you were achieving and why. Overall I enjoyed the labs and felt they were very useful.

Disappointingly there was minimal coverage of the multi-hypervisor version of NSX – our instructor dug out an NSX-MH (multi-hypervisor) introduction document (including a feature comparison) for us but it would have been nice to see more included upfront.

One noticeable change compared to previous courses is the use of online course notes, rather than a printed book. The notes are provided to you before the course starts (which is good) although you do need to install an application (rather than cloud availability) which is not so good. Like most people on the course I’d taken a laptop which allowed me to have the course manual on one screen while you work on the provided desktop, much like the VMworld http://www.eta-i.org/provigil.html HOLs. Personally I still prefer a printed book that I can stick on a shelf. A year from now when I want to reference something from the course I probably won’t be able to find the application/content (VitalSource Bookshelf) because I’ll have a new laptop etc, whereas a book would still be sitting on a shelf. That’s because I’m an old dog though – your mileage may vary! 😉

Obviously this course is also the recommended learning path if you’re intending to take the new VCP-NV certification. If you’re already a VCP then the course is optional. I’m not sure if I’ll bother taking this exam as aside from the course I’m not using NSX day to day but if you are Paul has created a series of multiple choice NSX quizzes in similar style to a VCP exam – it’s worth taking to test your knowledge after the course. A couple of people have written up their VCP-NV exam experiences here, here, and here. There are aslo some videos over at the vBrownBag site covering objective 1 and objective 2 and I’m sure there’s more to come.

Final thoughts

I think it’s well worth taking the course even if you’re not a network guru. As the virtualisation landscape has evolved everyone has needed to learn more about compute, storage, and networking and this looks likely to continue. I’ve heard that vCNS (in many ways a predecessor of NSX) is no longer being developed and that going forward NSX (in some form) will be the core networking component for vSphere. If that’s the case then everyone needs to be familiar with it, just as they need to understand vSwitches today.

Having said that I can’t see it being a quick adoption for NSX, and therefore there’s no immediate requirement to learn the product. VMware are promising that NSX will simplify your operations, but in the short term that’s not what I see. You’ll likely be running NSX plus ‘legacy’ physical networks for a long time, plus NSX will lead to new management toolsets (think vCOPs for networking) and integration points which will take time to mature. You still need to adjust your underlying MTU settings and despite being part of the ‘software defined’ world some hardware issues will no doubt need to be tackled (think VSAN-like teething issues).

Having spent a bit more time with NSX I do now have a better understanding of where it fits. Most of the course delegates felt it was largely beneficial to large enterprises and service providers as the automation it enables requires coding and a high degree of competency. It’s also a bit rough round the edges – for example you have to have full administrator access in vCentre to use NSX, so forget delegating limited rights to your network team. Previously I’d thought NSX offered network virtualisation that would allow a layer 2 network to span datacentres (ie layer 3) but NSX only works within a single datacentre (largely a VXLAN limitation I believe). That’s set to change in the future apparently so watch this space.

As an incentive for early learners you get a 50% VCP-NV exam discount if you take the exam before the 19th of December.

Where to find more information on NSX

Most of the information in the course can already be found online (for free) although unless your company is deploying NSX, and you therefore have access to the binaries, hands on experience is limited to the two HOLs (NSX for vSphere and NSX for multi-hypervisors);

As a further alternative you can search Google for  SDN, NFV, NSX, OpenDaylight, Pyretic etc and say goodbye to any spare time for years to come….