Nile’s Networking Has Real Advantages, But Is it TOO Exotic?

Having spent almost eight hours with Nile’s senior technical leadership to get more familiar with the company’s unique approach to LAN and WLAN, I can say upfront that I appreciate the ambition and effectiveness of the solution. You will not find a framework that more effectively tackles design challenges like VLAN management and network security and makes it look easy if you can get there. But can you “get there”? Not all environments will be able to. And if you do get there, expect a different kind of daily network management experience.

A Geezer’s Take

For those of you who don’t know me well, a quick intro is in order. I’ve been in networking for almost thirty years now, following over a decade spent doing electronic warfare for Uncle Sam. I’ve also worked as a freelance analyst and writer with lots of opportunities to look at a range of different networking companies, products, and strategies. I don’t know it all, but I have done and continue to do enterprise networks big and small. I’m a certified expert in some things, a qualified professional in others, and then there are technical areas where I’m an utter buffoon but have the wisdom to yield to my betters. I was an early cloud-managed networking adopter, but I also understand the pros and cons versus on-prem. This all shapes my perspective on the cloud-managed, As a Service delivered Nile solution.

A New Lexicon

In learning about Nile, I found myself needing to hear many things twice and then to have them explained to me with simple words. There’s just so much the starts off feeling differently, even if underneath it’s really not that far from what we’re used to in legacy networking. This effect made locking on to Nile’s methodology harder for me, but it is what it is. Let’s consider the Nile Service Block as an example.

Um, what the hell is a service block?

Sounds odd to the trained networking ear at first, yes. But the Service Block is just switches and access points. That’s it. Well, kinda/sorta. There are different sized service blocks for networks of varying sizes, and to migrate to Nile is to use both their switches and access points from Day 1. This is not optional- you must use 100% Nile switches and APs within the Nile framework. Sounds easy in small environments, and potentially impossible in larger ones where switches and APs are numbered in the thousands- especially given that switch lifecycles may be much, much longer than AP lifecycles.

UPDATE: Nile reminds me that on the topic of needing to use all Nile APs and switches- This is right but our customers can migrate one floor or one building at a time. One doesn’t need to forklift the entire network at once. I accept that, but I don’t see it as scalable for other than a complete, rapid migration.

A Different Philosophy

One of the things I struggled with learning about Nile was the voice in my head that kept saying stuff like “this isn’t how I do it now… these are radical operational changes…” But finally that all melded into a Grand Realization. For most network solutions, you buy bits and pieces and shape their configs to meet your networking operational philosophies and goals. With Nile, you are buying an operational philosophy, and your networking approach and team dynamics will need to adapt to that philosophy.

Is that bad? No, not at all- especially given that most of Nile’s vison is impressive. But’s a pretty radical departure, from “normal” networking. It’s also something that not all customers will like the feel of. After I got a deep look at some of Nile’s key advantages like Layer 2 issues being completely eliminated and zero-trust security that will not be topped by any other solution, I started to realize the payoff to accepting the Religion of Nile. But as I said, that won’t be for everyone. Especially given that some simple-to-me changes need to be asked for from Nile- as in you need support to make certain changes to the environment that today would be commonplace engineering tasks.

Where Does Nile’s Approach Work Well?

Though my mind does not yet accept Nile as a big environment player (unless that big environment has endless time and money and is very, very thin on networking staff), I can see myself potentially loving the solution in small to medium environments up to dozens of switches and a few hundreds of APs. Why does my mind cap it there? It just does- my personal frame of reference sees that as a natural boundary to the Nile story. Nile will disagree, and I don’t claim to be right on this- just telling you how I see it.

Nile’s management and monitoring views are fantastic, I must say.

UPDATE: Nile reminds me that despite my trepidation “We have very large campus deployments – 40 building campus; 200K people conference center where an event hosted 55K people on our network; 2M Sqft Distribution Center. In terms of scale, you may have an opinion but we have proven to scale to large sites and large concentrations of people.” I’m sure the solution scales, but my opinions about the complexities of getting there in other than greenfield deployments remain. But I do thank Nile for their input.



What About Wi-Fi, Specifically?

First the good- after seeing Nile’s AI-enabled wireless management framework, I have no doubt that they are solid. Solid for client access. Solid for security. Solid for radio management in general. Solid for smooth integration between the LAN and the WLAN.

But again, it’s the getting there that may be a bit thorny to accept.

As mentioned, you will need Nile’s APs AND their switches. There are no wallplate APS offered. There are no external antenna APs offered. There are no Wi-Fi 7 APs on the roadmap yet as of today. And… before you can deploy Nile APs, every space where they will be used needs an Ekahau survey done and design verified by Nile. Why? They can’t guarantee excellent performance if they haven’t approved the design. I get it, but I don’t… In that this gets into the waters of what Nile is “responsible for” versus what the end user’s IT team (if there is one) is responsible for. To me, as a 20 year WLAN design professional, I don’t want a vendor’s approval as a rule. I know my spaces better than they do. But, I do somewhat get the “why” of the requirement- but I also strongly disagree with Ekahau-only.

UPDATE- Nile has informed me that both Wi-Fi 7 APs and APs with directional antennas are in fact in development. (Not so with wallplate APs.)

What if I want to disable legacy data rates? That’s the kinda thing you need to ask Nile to do, you don’t have the administrative freedom to do it yourself. There are enough examples of this “you have to ask” stuff that it can feel offensive as a WLAN professional. Again, just my opinion.

Nile shows sensors as part of the solution, but I struggle to see the value of the additional cost if everything else is controlled and engineered so tightly. They are an optional aspect of the solution. Maybe they have an operational value that I can’t grasp but I can’t say I’m warm on them.

As a Service Messaging, Messaging in General

Also my opinion- Nile is different enough as a solution that they need to be careful in their messaging. Throw too many “we’re different because of THIS” at us, and it gets overwhelming and can be a turn-off. Zero Trust alone is enough to ask people to swallow when they haven’t gone down that road before, as is totally replacing all APs AND ethernet switches as a requirement. Then throw in the “you MUST do” and “you CAN’T do” bullets, and your head might start to hurt. It can be a lot to process, even before you get to the question of what does “As a Service” mean.

Just as I now accept that the Nile solution is technically compelling (if you can live with the what it takes to get there), I also accept that As a Service doesn’t necessarily mean that in-house network engineers are no longer needed and that jobs will be lost. Nile needs to really, really be careful about saying things like “oh, that’s OUR responsibility” when marketing to mature IT teams. My network, my responsibility. Nile and their partners work for their customers, and not all customers are ready to relinquish control and design authority to Nile.

I have learned that the Nile solution does have a fair amount of use-case flexibility that starts with rigid Zero Trust but then adapts. To me, Nile really needs to do a better job of touting their flexibility versus their rigidity. To make those adaptations, you will have to work with their support team. How smooth is that process? I can’t say that I know as I have never gone that path.

Also on the topic of messaging, Nile needs to catch up with competitors in some regards- by now, Wi-Fi 7 has to be a declarable road-map item. And to go after bigger, more risk-adverse customers, any mention of “we’re a startup” needs to be stowed.

Final Impressions

Nile has some pretty big Silly Valley names in play that run the company and who have developed the solution. And the solution is impressive. But it’s also different enough on many levels that those same big Silly Valley names need to realize that the rest of us are slow to lock onto things that shake our reality and introduce too many changes at once. Many potential customers will never make it to the good part of the story if they get lost along the way trying to understand all that feels confusing and maybe a little threatening up front. I wish them the best, and truly appreciate the time I spent with Nile getting educated.

Meshtastic- Kinda Boring, Yet Utterly Fascinating

For various reasons, I’ve found myself bumping into LoRaWAN as a wireless networking construct over the last couple of years. If you’re not familiar, this is IoT-oriented low power, long range (sometimes), low bandwidth kind of stuff that integrates with the larger connected world if needed via Ethernet, Wi-Fi or cellular backhaul. (Read more on the general theory and state of LoRaWAN here). In my professional world, I turn to LoRaWAN as an option when Wi-Fi just isn’t the right situational fit. Outside of work, I’m one of those nerdy radio hobbyists who frequently has a radio scanner or amateur radio station on in the background and who gets excited about topics like shortwave radio, SDR, and all kinds of things with antennas sticking off of them.

Which brings us to Meshtastic.

Described thusly:

An open source, off-grid, decentralized, mesh network built to run on affordable, low-power devices

Meshtastic has captured my fancy, at least for a little while. It is based on LoRa technology and devices. It’s really neat stuff, until you hit it’s current limits. Then it’s kinda just there. But just there is often the demarcation line between casual geekery and those who refuse to believe that there isn’t always more to discover.

So what it is Meshtastic supposed to really BE? It promises to be both decentralized and off-grid, allowing you to have a private means to message (as in text message) other devices in a secure fashion without the use of the Internet. That’s really it. Internet goes down. Cellular goes down. The proverbial Shit Has Hit The Fan moment has arrived. As long as Meshatastic nodes stay powered up (and there are lots of ways to keep them powered up), those on the mesh can stay in touch.

Aside from that basic premise, you can also do utility type applications with sensors via Meshtastic, like triggering a notification if someone opens a gate kinda stuff. There CAN be an optional Internet tie-in with MQTT if you want more activity through your node than is happening on just the local mesh, but MQTT can be kinda polarizing given that it is at odds with the philosophy of off-grid.

Gotta Have Nodes to Make a Mesh

I currently have three nodes (there are a couple of dozens out there to pick from, between complete units and kits) , each bought with a different purpose in mind.

  1. RAKwireless WisMesh Tap– being lazy, I didn’t want to build anything for my first node, and I’m a sucker for touchscreens. I also like fully self-contained and weather-proof so I can play in the elements. Currently, this is serving as my solar-powered, always-on outside node.
  2. LilyGo T-Echo– I wasn’t getting a lot of mesh activity from my WisMesh talking to local nodes, so I picked up a second node to have my own send/receive test environment. The T-echo is quite popular among the Meshtastic crowd, despite it’s toy-like feel. And it’s cheap for a complete node.
  3. Sensecap T-1000E– this little card-sized gem was bought to be highly portable. Put in on a lanyard and get out on my bicycle. Or hang it from the rear view mirror of the truck on road trips. Or hang it from the drone and get up a few hundred feet for 10-15 minutes. Yes, it’s a compromise when it comes to antenna options (you git what you git and don’t throw a fit) but this thing travels well with long battery life and could be fantastic on the trail etc for people to stay in touch and share locations.

Almost all pre-built nodes out there will come with native GPS. Of my three, they all are easier to use with my Android phone as the interface to the mesh, with the Meshtastic app via Bluetooth- but the WisMesh TAP doesn’t NEED the phone- you can send and read messages on the screen but the phone app is much easier and more feature rich.

Here’s what a partial node view looks like when monitoring Meshtastic:

And some traffic among nodes:


What to Do, What to Do?

To me, you do the following when it comes to Meshtastic:

  • Learn the basics, before you deploy anything
  • Get or build a node
  • Make a quick contact or two
  • Realize “um, OK… that was mildly satisfying”
  • Let the batteries die and get on with life- or figure out what else you can do to keep going with Meshtastic (this point may play out often over time)

The learning part is easy- besides the Meshtastic web pages there are a lot of good videos out there, like from The Comms Channel. What your starting node strategy will be is up to you to decide. Will you even make a contact? That depends… if you live out in the middle of nowhere or just don’t have many other Meshers round you, your efforts to make contact may be fruitless. Like all things radio, increased height and a better antenna may increase your chances. For me, it took several attempts over a number of days before I got a courtesy “your node is working” reply.

And THIS is where you’ll either lose interest or dig deeper into your geekery.

Meshtastic isn’t like ham radio or even GMRS where you can easily find someone at the other end of the string to yap with. Sure, I have had some quick and cordial exchanges with other nodes on the mesh, but generally its far more purpose-specific. Like a private group setting up a private channel for private comms while ignoring the primary public channel. No one owes you a response.

What Next?

If you do advance past the Been There, Done That stage, things can get interesting. For me, this was where I put my solar-powered node together.

And where I started to take my T-1000E everywhere to gather mesh info and maybe make a little traffic in new places. I played with different antennas, and exercised my various spectrum analyzers to watch the RF side of things- it’s nice to have a reason to get out of the Wi-Fi bands and look at other RF space.

But day to day, unless I’m actually inventing some reason to do something with Meshtastic, it’s pretty static. If I had a close-by group of fellow geeks that were all into it, I’m sure my own Meshtastic journey would be more exciting. I do see some flickers of that in a couple of Facebook groups where people talk about what they have going on. In my local area there’s not much activity in the public channel from nearby nodes, and so Meshtastic for me is an interesting technology that’s just kinda there in the background. Which arguably it’s supposed to be, until it’s needed- which gets us back to the original Meshtastic mission statement.

Like I said- boring, yet fascinating.

Synology Introduces Company’s First Wireless Security Camera

In the past few years, Synology has upped their game when it comes to video surveillance. Long established as a NAS leader, Synology’s Surveillance Station and companion apps have been expanding the company into the IP security video space with the same well-designed approach that has made their network storage solutions extremely popular. Now, a wireless camera joins their surveillance line card, and I can say that I’m impressed.

The CC400W joins the Synology camera lineup as their first Wi-Fi-connected CCTV camera. It’s an outdoor-rated 4 MP camera in a cube form factor, with max resolution of 2560×1440 @ 30 FPS. The CC400W is USB-powered, and you can record to microSD when the link back to your DiskSstation or Synology NVR is out. Complete hardware specs are here. Synology calls it AI-enabled

I have been putting the camera through it’s paces in a number of scenarios. It adopts to the Surveillance Station fantastically quickly, and has been a very good dual-band wireless client on Wi-Fi networks built from Meraki, Mist, and Ubiquiti. I run a DS1618+ DiskStation, with a mix of Synology and third-party cameras in the Surveillance Station package. It may have taken 90 seconds if that to get the new CC400W onto the WLAN and adopted by Surveillance Station.

Even if you don’t do any of the fancy stuff, the new camera is quite nice in it’s imaging in both day and night scenarios.

I found all images in the various lighting scenarios to be at least very good, and usually great. Night vision in my environment was more effective inside than out, but I have a lot of ground lighting in the vicinity to torture cameras with. For the price point and technology involved, the digital zoom performance is quite acceptable.

One area where Synology shines in it’s approach is in ease of configuring advanced settings- like people and motion detection and geofencing for intrusion detection:

These settings are the “AI-enabled” part of Synology’s video magic. If I settle on a permanent location for the CC400W then I will enable detection and set up zones as applicable. Right now I’m still testing various capabilities as I relocate the wireless camera around the different buildings on my property.

There is a lot to appreciate with the Synology CC400W. It really is a nice addition to the Synology surveillance video environment, and I may even end up paring this with a solar powered battery pack at some point where I don’t have an AC outlet available.

Let’s close this out with how it looks in the DS Cam companion app.

Wi-Fi XXV Book Reflects on 25 Years of Doing Wi-Fi

I was hanging out at Eagle Creek Reservoir near Indianapolis, doing some birding. I had my beloved Canon 90D set up with a big lens and I was waiting for anything interesting to fly over as I stood on the deck looking out over the water. Out of nowhere this huge clap of thunder sounded, then the sky opened up with a hellacious downpour. I headed into the nature center building fast to get out of it, along with maybe half a dozen other people.

As I walked past the front desk, I noticed an older lady kinda staring at me, like maybe I did something wrong. I gave a polite how are you? and then things got weird.

“I recognize you”, she said. “You wrote that book.”

I’ve written a handful of books, and she must have noticed my confusion before I could ask her which book she was talking about.

“You wrote that book about Wi-Fi. That Wi-Fi XXV book… You’re Wirednot aren’t you? I recognize you from the back cover.”

This was a bit surreal, given the odd weather and the fact that she looked very un-technical in her park uniform handing out pamphlets and maps. I didn’t know what to say, so I just acknowledged that she had the right person and waited for her to continue. In my wildest imagination, I couldn’t predict what came next.

“I’m just here on work release. Got mixed up with some bad peyote when I was setting up the wireless network for a heavy metal festival up in Muncie. Evidently I stole a forklift and trashed the local Cracker Barrel. Whatever… I read Wi-Fi XXV when I was in the joint.”

I asked her what she thought of it.

“I gotta say, I felt like you were telling MY OWN story after all these years of doing Wi-Fi. Crazy client-side stuff, goofy crap from the vendors… over the top promises of fantasy features with each new standard. Yet Wi-Fi itself is awesome. I didn’t feel like I was ALONE in prison when I was reading XXV.”

I thanked her for the kind words and asked her how long she had been in jail. She said she really had no idea because of the peyote.

“That was some bad Devil’s Root, boy. I was trippin’ bad. Anyhow, like you I was in the military before I got into Wi-Fi. I was a door gunner on helicopters, when I wasn’t in confinement somewhere for kickin’ someone’s ass. I kinda got a bit of rage, I guess.”

This lady could have written her own book, was all I could think.

“It was good seeing that a lot of things that always bothered me about the way Wi-Fi evolved also ticked you off. Misery loves company, eh? But it’s been an interesting run for sure. And you give some good guidance on a bunch of stuff. Hey, I gotta go go clean the crappers before Fran calls my parole officer again… see you later, Wirednot- you keep them jigabits flying…”

Then she was gone, off towards the restrooms with a toilet brush in her hand. The rain had stopped, so I headed back out to see the birds.

Available on Amazon

Available here.

The Cisco #MFD12 Slide That Overloaded My Brain

There it is. It’s just another marketing slide in the grand scheme, yet it kinda spun my mind out. Why? Let’s just explore WHY, shall we?

There is a LOT under the hood

All of the Mobility Field Day 12 videos are here, by the way. Watch them. They are worth watching for a number of reasons. But back to that one slide… As I watched the Cisco presentation being made, this introduction to their latest APs hit me like a big ol’ wave washing up hard against the rocks of my enormous cranium. You got your ACCESS radios (This is an ACCESS POINT after all), you got your AI/ML SCANNING radio, you got your 802.15.4 IoT radio, and you got GPS. But wait- there’s more! Whatever “CONTAINER HOSTING” amounts to in this context, you got that, too. And Ultra Wideband. And a couple of 10 Gig Ethernet ports.

Shazam.

Back in the day, an access point was a simple bridge betwixt 802.3 and 802.11. How very far we’ve come. And that’s where the internal tension for me, as a WLAN professional of a certain vintage, started as I tried to process it all.

What if I don’t need or want it all?

I sincerely applaud Cisco wireless product managers for what they are packing these days, alongside with Wi-Fi 7. As a technologist, I can’t help but get all aflutter over that rich feature set shown on the slide. But there are many voices in my head, and the realists and cynics in that group get their say, too.

What if I just want simple client access? And maybe some spectrum health mojo? I have to buy all the other stuff, I would imagine… or is it all licensed separately? But I still gotta buy the whole hardware platter just to get the specific enchiladas I want, yes?

And let us not forget that we’ve got many, many years doing “old” Cisco wireless on WLCs… Cisco isn’t exactly shy about making sure their customers get plenty of bugs on occasion as they play Code Roulette. All those AP features gotta equal more bug opportunities, no?

License, license, license… (This was a chorus of lunatics, kinda chanting like something out of a Pink Floyd song.)

OK- shut up , you voices.

Will it all fit in a single glass of pain?

Again, I have been a looooong time Cisco WLAN customer, back before LWAPP, CAPWAP, give a dog a bone became fashionable. I watched Aironet APs become AireOS APs after Cisco bought their way into lightweightedness, and then feared for the worst when they also bought my beloved cloud networking company. I’ve watched WLSE become WCS and then that become Prime Infrastructure on the management side, and have often marveled at Cisco’s ability to both increase costs from one management platform to another while also bloating it up with stuff I don’t need, want, or trust. (I speak for me and me only here, if you like PI and Spaces and DNAC, etc- more power to ya).

So I can’t help but wonder how all of this feature goodness gets effectively managed as it gets bigger in scope. I have no doubt that Cisco has a good answer to that, but we just didn’t get there in the allotted time at MFD12. Maybe for current Cisco wireless customers, it’s already all known. I admit my ruminations on the topic come from a place of ignorance, as I capped my Cisco WLAN journey at the 8540s and opted not to press on with 9800s, DNAC, etc. (I remain a Meraki branch customer and cannot speak highly enough about that. And yes, I still fear that Cisco will somehow take Meraki down an unpleasant path even a dozen years after the acquisition.)

Wouldn’t it be nice if standards were like… standard?

Ever buy a Mist AP and connect that to a Ubiquiti switch? Someone has… and it worked. And so did the Aruba switch connected to the Extreme router. And the Extreme switch connected to a Fortinet firewall. On the wired side of networking life, you can get away with all sorts of inter-vendor connectivity stuff. Ethernet is Ethernet, routing is routing, blah blah blah. I remember when Cisco’s LWAPP morphed into standard CAPWAP and naively thinking “woo, woo. Now it gets interesting. This new standard is gonna let me put Vendor A access points on vendor B’s controllers if I want because STANDARD.” Then my dad came in the room and told me the truth about the Easter Bunny and wireless “standards”.

So let’s say I’m not a Cisco wireless customer. But I watch the MFD12 videos and I get all fuzzy about wanting in on that weapons-grade feature goodness. It’s not like I can just get an AP and plug it into my existing system. The WLAN industry is built on vendor-lock and hyper-proprietary business models and architectures (no slight intended to those freedom fighters in the OpenWiFi trenches). Which means… as cool as those new Cisco APs are, your choices are to switch vendors to use them or to admire them from afar. That’s just the WLAN world we live in.

For me, even though I won’t be buying those new APs (unless one of them finds it’s way into my Meraki branches, but then I have no idea if I get all the features), I can honestly say that I was blown away by that slide.

Cisco Questions After Mobility Field Day 12

I found my self transported back to Field Days gone by when Cisco started their presentation at Mobility Field Day 12. They dug right in talking about access points and under-the-hood technology and the whizzybangy that is Wi-Fi 7. This was nice… I expected to be hit hard with the now-normalized AI Hype-apalooza that has become almost every vendor’s lead in the mobile space. What Cisco showed off in their Wi-Fi 7 AP offerings was impressive indeed:

As I digested the specs and the various technologies inside these APs (you HAVE to watch the recorded session, there’s just so much here), I found myself thinking damn, I can see why these things are getting so expensive, and the new APs here might actually justify their hefty list prices. Those list prices will likely be in the $2,500 -$3,000 range- and yes, that is per unit. But volume discounts, blah blah blah. My point being that I was impressed by the new models.

The latest models have the the smarts to be Meraki cloud-managed, or to go find a 9800 WLC and be old-school thin APs (that is soooooo yesterday to me, but I get that a lot of networks are still living there). The hardware is impressive. What it can do is also impressive. But as frequently happens, I felt tension building in my brainpan as the excellent Cisco reps regaled us with Wi-Fi 7 knowledge and topics like Ultra Wideband (UWB) and super-duper Ultra Reliable Wireless Backhaul (URWB) . Couple all of that with glimpses of what’s going on with the Meraki and Cisco business units combining, and questions took root in my head. But there was no way to get out all my ruminations during the MFD12 time allotted. So… here it all is for you to ponder along with me.

  • What about the low end?
    These APs are obviously Cadillacs. They came to play, and are dressed to impress. But what happens at the other end of the product line? Cisco and Meraki are combined now on the data sheets, which still seems a bit weird. I have sites that don’t need half of what these new APs offer with their many technologies onboard… will I still be able to order modest, cost-conscious APs from the MR line, or will the Meraki stuff be displaced by high-end models?
  • Licensing
    I have a long history as both a Cisco and Meraki customer, so I have a real-world frame of reference on this. topic. Meraki licensing has always been rather simple. Cisco’s licensing has always been a convoluted and frequently-changing Mongolian clusterfork. (I have sat in a room where Cisco reps stopped presenting to me and started bickering amongst themselves over what licenses and bundles were needed for various features, and they never quite agreed after a half-hour of sparring- which makes perfect sense for this wacked-out paradigm).

    So it goes under the Cisco sun. Smart licensing has long been the punchline to a very unfunny joke at the customer’s expense, regardless of which blue-suit guy tries to pass it off as INNOVATION. So where does licensing shake out to use all of the cool things these APs are capable of? I have to imagine it’ll stay interesting on the controller-based side. But will the famous Cisco licensing lunacy find it’s way to the Meraki dashboard? (Please, God- no.) I guess we’ll see in time.
  • How Messy, Bessie?
    The Meraki dashboard has always been pretty clean, and in my esteem quite effective. Systems like DNAC and Prime Infrastructure have always struck me as quite the opposite. Like somehow being overwhelmed with visual bloat and features you never use are equated to value because the trend is just to get more and more complicated over time. The same basic question applies here as with licensing- will the Cisco-side trend for hyper-complexity in the UI find it’s way to the Meraki dashboard either in general or to take advantage of multi-technology features from the new Cisco APs? Or will the dashboard stay clear of endless footnotes and things that most of us could give two figs about?
  • UWB, huh?
    I found the UWB presentation to be fascinating, as I am well familiar with the basics of the technology but somehow didn’t realize how far it had come for tracking and location stuff. I’ve also not heard any other vendor mention using it in their APs. BLE seems to be the default in this direction, but UWB is fascinating. I have much to read on this, including what the additional radio technology does to PoE requirements on the various AP models.
  • URWB, huh?
    It’s ool to see this application being brought into the new APs instead of needing stand-alone models that do URWB. But is there enough use to warrant making it something you have to pay for at the development level when you buy one of the new APs if you don’t use URWB? How nichey is URWB in the grand scheme? I understand it’s use cases in manufacturing and such, but am curious how that is quantified against the overall WLAN landscape. I’m throwing no dirt here, just showing my ignorance and declaring an area where I need to learn more about it.

I thoroughly enjoyed Cisco at Mobility Field Day 12. It was informative, educational, and fairly unpretentious. That’s refreshing among the tidal wave of AI-oriented marketing that is the current trend when vendors start talking.

What’s Bothering Me About Nile After Mobility Field Day 12

I have no beef with AI- except when it’s overhyped. I have no issue with cloud-managed networking- I’ve been using it for years, with multiple vendors. Let’s get those points out of the way before I lay out a couple-few concerns rattling around in my brain after attending Mobility Field Day 12 and hearing what Nile had to say.

Now before Drew Lentz launches into an orgasmic rant about how delightfully wonderful it is that Networking as a Service (NaaS) seems to be trying to gain traction with the likes of Nile, Meter, and Ramen, let me say that I’m not outright panning the concept on principle at all. A lot of what Nile presented was fascinating, and I will likely do another blog just on the technical side of their presentation. But for now, this is just about how I see potential issues with NaaS (as Nile presented it- I have yet to really see a Meter or Ramen presentation) in some scenarios.

TCO Pitches Are An End-Around to the C-Suite

I’m approaching 30 years in the networking space, and have worn almost every hat imaginable along the way. I’ve been in many, many “lower your TCO!” meetings. and most of them were targeted canned pitches aimed at getting the bean-counters’ attention while not really examining the realities of the environment in play. It’s no secret that those who control the budget in many ways control the network regardless of their own savviness on the finer points of IT operations. I’ve also seen the results of a few independent audits that sought to determine whether outsourcing IT support that I was part of would save money, but it was proven that our in-house team was a significant value in each case.

Would that apply to all settings and IT teams? Of course not. But it certainly applies to many, where good managers have hired good technical people and solid choices in solutions have been made. We are not all interchangeable out here on the network playa. YOUR TCO story is different than MY TCO story. The overall quality of your skill pool is different than my own. Count on it. But Nile seems to be going for the whole-hog, no exceptions, WE WILL SAVE YOU MONEY tactic.

What’s that old saying? If it sounds too good to be true… I have no doubt Nile is a reasonable fit for SOME environments. I also have no doubt that it’s not a great fit for OTHER environments.

Surrender Your Network Operations to AI and a Nile Partner?

I think this is what is really bugging me when I contemplate Nile in my own sphere of operations. I’m all for AI making analysis better and identifying problems. I’m not keen on having to consult a partner who might have to run it by Nile when I want to change something in the network. Or for waiting for the finger-pointing to settle out between me, the Nile partner, and Nile when tricky issues come up.

And about that partner thing…

Part of the Nile pitch is that “your IT staff gets freed up to do other projects”… like maybe being unemployed or sending resumes to Nile partners when that staff are no longer needed because a large swath of the operation has been outsourced. Maybe shrinking the headcount is the right thing for a given enterprise- especially if they have the wrong heads in the overall count. But what about responsiveness and effectiveness when it comes to buying into the partner-as-your-network-team approach? I heard at #MFD12 that your networking success as a Nile customer is ultimately between you and your new BFF Nile Partner… I’ve done the limited outsourcing thing at times, and it’s been a mixed bag for results. It has been nice to have additional labor doing the grunt work of networking, but too often something that is supposed to be “turn-key” ends up needing frequent local in-house expertise or parallel monitoring to solve issues fast. When phones are out or cameras in sensitive spots are down, being in the partner’s queue while important systems being out are disrupting business continuity is not fun. So we occasionally end up doing what we also pay others to do because we have to- out of expedience and crisis avoidance. There’s some TCO for ya, Bunky…

But if our C-suite has “freed us up to work on other projects” and we’ve moved to a model where the partner is the crisis resolver, then we better have a damn solid partner or our TCO actually goes up while we lose money waiting for them to figure out our issues. We have no control over their skillsets, work ethics, or understanding of what makes each one of our environments unique. We have no insight into what their relationship with Nile REALLY is like. We’re talking grand-scale LEAP OF FAITH stuff here. (Leap away, Drew- you magnificent bastard.)

It’s Not Either/Or

I did find the Nile approach to be quite interesting and even compelling in spots. I can easily see them being a potential fit for my branch locations scattered around the US and in Europe. (But even as I type those words I realize that doing that would require me to find partners in multiple states and countries- as opposed to me just configuring everything in the Meraki dashboard and having the network components drop-shipped to someone on the far end that can follow directions on hooking it up.) I can see the potential appeal of Nile where I don’t have an established, effective network team- like in my branch offices where my topology needs and network sophistication tend to be pretty simple on balance. But for “the big network” where new requirements might pop up weekly, with the unimaginable-to-some mix of client devices I have in play, and where response is usually measured in minutes or hours, I have a really hard time contemplating placing the fate of tens of thousands of clients in the hands of a partner. I also cannot imagine needing to negotiate a desired config change in my environment with a partner or even Nile. God forbid the AI overlord doesn’t agree with my request.

More to come on Nile from me.

And Drew knows I love him.

Something Old, Something New- A Geezer Looks at Mobility Field Day 12

I’m a delegate for Mobility Field Day 12, and am writing this a week ahead of the event. There are two vendors presenting, but both have an interesting connection. As I contemplate just the companies as I think I know them, I’m struck by the notion of Legacy versus New Approach. Read nothing into that- Legacy isn’t always bad and New Approach sometimes isn’t great. I’m certainly looking forward to what Cisco and Nile each have to say at MFD12. but pre-presentation contemplation is inevitable. Here’s where my head is at right this second.

Something Old in this case is Cisco. They have been in the wireless (and therefor mobility) game since way back in the day when they bought Aironet and this thing was new and sexy:

That was right about when dirt was invented. Cisco would go on to produce new access points for every 802.11 standard as they rolled out, and they made the jump to “lightweight” and controller-based WLAN with the acquisition of Airespace in 2005. Then in 2012, Cisco bought Meraki to get cloudy when all the cool kids realized cloud was the shizzle. Now today, we see see Cisco is set to End of Everything their once-flagship WLC controllers and the AireOS-based products while they also try to shoehorn their current generation Cisco-side wireless products into the Meraki framework. There’s a lot going on, and has been with wireless at Cisco for many, many years. While trying to leverage the Meraki Magic for full-stack cloud-management, they are also still trying to get revenue from the controller crowd where they can while perpetually coming up with new and innovative ways to license the holy bajeezuz out of everything and anything. I’m looking forward to what is new and exciting from Cisco.

Then there’s Nile. Something New in my narrative, Nile is pretty fresh to the network industry scene and is trying to push Networking-as-a-Service (NaaS) as The Next Big Thing. It’s interesting to me, being a network geezer, that the Nile product web pages are far more about saving you TCO costs with NaaS than they are about product specifications. I *think* that you are supposed to be buying “don’t sweat it, we’ll bring in the right stuff and you don’t need to worry about what that stuff is” and eliminating the need to scrutinize data sheets and find the right models for yourself. If you dig, you’ll get to the models in play, but they aren’t the lead story. And Nile appears to not just be wireless but maybe full-stack with “service blocks”. I’ll know more when I hear their presentations, but I can maybe see why this model is threatening to network architects and engineers if that’s the angle.

Now here’s the interesting part- if you look at the Who’s Who at Nile, you’ll find many People of Title that used to be at Cisco. I have sat through several Cisco “lower your cost of TCO!” meetings through the years, where those looking to lower my TCO never bothered to ask what my TCO actually was- the whole premise was built on canned assumptions that made for nice marketing but generally fell apart in spots pretty quick when examined through the lens of reality. Is the drumbeat of “Lower your TCO!” by Nile just being played by ex-Cisco players who were fond of the same marketing strategy at the Big C? Or is Nile truly onto something new and valid? I suppose white box hardware might help with lower costs, but now I’m speculating. The Nile presentation should be interesting, and even maybe provocative.

Did I mention that I’m a geezer? Almost thirty years in the industry makes you think about things maybe a bit differently than the vendors would like, but us geezers have our own frames of reference and we’re stuck with them.

Quality Access Point Mounts From WiFi-mount.com

When it comes to accessories that sperate excellent WLAN deployments from lesser ones, access point specialty mounts are at the top of the list. I have learned of a new vendor in the space of late, and I’m glad I did. The company may be based in Europe, but they also do business here in the US. (Look for the toggle in the upper right of the web page to see dollars versus euros pricing as you browse the various mounts available from Wi-Fimount.com.)

I was recently contacted by a rep from CODE MASCHINE GmbH- the Hamburg, Germany company behind the Wi-Fi-mount brand. A few weeks later, I have samples in hand for evaluation here at Wirednot HQ. Though I have a variety of wireless and LAN hardware making up my home office and test network environments, I opted to use Mist AP41 and AP43 models to get a sense of the Wi-Fi Mount offerings’ usability.

In play specifically:

The first two are installed and doing their thing, the third one has been a victim of my getting COVID and not feeling like doing much. But it will go into service in my barn at some point, where as the other two are each in a different garage at my humble compound that serves as my real-world lab.

First impressions after unboxing the mounting brackets? Well-made. Good fit and finish. Sturdy. Easily paintable. Lighter than some I have handled in similar form-factors, but no less robust. The three I have are just a few from the bigger product line, so it’s worth perusing the company’s web pages.

Here’s my custom-wrapped AP43 on the Industrial light ceiling bracket. (Don’t judge my technique, everything here at my place is “temporary” with frequent moves, adds, and changes.)

Installation of the bracket itself and the AP on the bracket is quick and slick, Daddy-o.

The horizontal wall mount bracket was set up fast to make the point, but it also proved itself with little effort. The installation screw/bolt holes are well-configured for flexibility, and its very easy to work with the AP and the uplink cable with the bracket as it opens nicely for access after it’s mounted. I can picture any number of use cases for this bracket as I use it here among the disorder of my test environment

I’ve learned through the years that AP orientation is important even when using “built-in omni antennas”. Some access points are far more omni than others, and getting the APs off of the wall with the right bracket can make a big difference in WLAN cell performance, especially where the environment isn’t particularly densely covered.

It’s always nice to have another supplier to choose from, and I’m pleased with what I see in this product line. It’s also interesting to read where the parent organization sees it’s place in the Wi-Fi world:

netMeter- A New Network Analyzer Hits the Market

That little blue cube-looking thing may be modest in appearance, but it is pretty robust for network performance testing. It comes from a Korean company called NEXTLab, and the product name is netMeter. (Also see the Korean product page here.) I’ve been kicking tires on the netMeter in pr-release here at Wirednot HQ deep in the heartland, and have found it to be well-designed, easy to master. and pretty useful for common wired network analysis tasks.

Comes in Two Flavors

I’ve been testing the 1 Gig model, which is pretty small- like two Raspberry Pi’s stacked on top of each other kinda small. There is also a 10 Gig model available UTP-interfaced model- like so:

Features and Functionality

The short answer to “What does it do?” is it connects to the LAN then on out to the Internet, where you control it via a web page that looks like this (at the time of writing) on a laptop:

The netMeter UI also plays well on mobile devices:

From there, anyone involved with networking can grasp the navigation options. I didn’t have cause to exercise the IPTV testing. I’m also freely admitting that I was not familiar with TWAMP after 27+ years in networking, but I did run through pretty much the rest of it repeatedly. In NEXTLab’s own words:

Whether you need to ensure that your network connection complies with Service Level Agreements (SLA) or need to collect all measured data, netMeter is a precision network measurement device designed to support you throughout your network tasks.

That is a pretty fair description of how I would quantify the tester as well. It has a nice history function of past tests that is easily viewed, and I did suggest that it would be nice to schedule tests at specific times or intervals. The company seems receptive to feedback so we’ll see where that goes over time.

Pricing Model

Remember that it’s early in the platform’s rollout, but the early pricing on the website shows some innovative thinking on the part of NEXTLab beyond the base cost of $299 per individual 1 Gig tester:

Impressions

Whether the envisioned use is for a tester that you can take with you as roam from environment to environment in your support duties or as a long-term in-place tester (like put one in every branch site), I found the netMeter to “feel” professional and consistent in it’s performance. The UI is effective and complete, yet easy to use. As mentioned above, some interval-based testing or test scheduling would add value, but at this price point the lack of those features isn’t a show-stopper.

The netMeter is generally a WAN/high-level network tester and does it’s job very well. It would be a nice compliment to a more granular LAN-oriented portable tool like the Netool.io which gets down into the nitty-gritty of individual switches, VLANs and switches and such.

I’m assuming that purchase price gets you some sort of hardware warranty on the netMeter, but I did not discuss that with NEXTLab specifically.

More Information

Public release is scheduled for July 1 of this year. NEXTLab can be reached here for more information.

See a video review from Network Advisor here.