Difference between Device and Tower/Network failures?

I could not use the MiFi 4510L device last night. I tried multiple computers and each was assigned an IP address, correctly. The modem status appeared to be normal when I used the mifi.admin management console, but I could not ping and I could not load web pages. The same problem happened if I tried to use 4G (LTE only) or 3G (CDMA etc.).
I'm thinking the network was overloaded. I think the network failed. I restarted the MiFi 4510L device multiple times with the same scenario. I am accessing the Internet this morning (it's 6:15 am right now where I live). It appears to be ok. Until the device starts hanging up again.
Is it possible to know when the failures are due to the device versus when they are due to the towers? As far as I could tell, I had Internet and connectivity, but no traffic. Are there tools that can be used to determine whether this is the problem? I did not get in my car and start driving around to see whether I had connectivity elsewhere. Next time this happens, I will do that.

statdetective wrote:
Thanks for taking the time to reply. It's hard to know whether the problem is with the device because the device has intermittent failures as we all know.
On the other hand, I should have been more specific. Ping/ICMP did not work, either. This morning, I didn't have 4G connectivity, but I did have 3G connectivity. Speed test for 3G gave about 1.2Mbps download and about 0.10 MBps upload. The upload speed was especially painful.
It seems like one of the reasons the 4G problems have been so difficult to resolve are due to multiple failure points which include devices, towers, network, and probably Internet software (such as DNS lookup problems).
It would be helpful to be able to have scenarios of symptoms that could determine the failure point.
Keep in mind that this is no different a situation than any network/communications issue.  If you're on your corporate network, situations such as this could be the result of problems with firewalls, proxy servers, authoritative DNS, NAT rules, PAC files, core, distribution or access switches, border routers, choke routers, and the list goes on. 
In this case it "seems" as though the MiFi is acting as a combination of access/distribution switch, router, and firewall.  It's also I guess sort of a bridge router.  Because we have very limited access to any technical data around the network at large, we have a very limited ability to troubleshoot except for on the client side.  I would disagree that a "network problem should be resolved for you, where a device problem will not" to some extent.  I think BOTH "should" be resolved for you - the former without your participation, the latter requiring your participation in some fashion.  However, in this particular situation I don't believe Verizon is resolving either.
The bottom line here is that due to the very proprietary nature of the MiFi and its integration with the LTE network there is yet a further level of abstraction which makes troubleshooting difficult - and as a result I doubt we'll come up with any conclusive "test cases" which could really accurately point us in the right direction.  Until such time as Verizon actually SOLVES some of the recurring and systemic issues which have not been addressed or resolved since day one, we have no consistent functioning baseline to measure again.  In other words, since it's never worked properly so far, we really don't know how much of the issues are resulting from HW design issues with the 4150L for example, how much are from firmware issues loaded on the 4150L, and how much are in the design/implementation of the LTE network at large (including all of its components). 

Similar Messages

  • What is the difference between spiceworks and the network monitor

    ok thank you

    is there a difference between the two or is network monitor a subset of the spiceworks desktop?
    This topic first appeared in the Spiceworks Community

  • The Difference between Extending a Wireless network and WDS?

    I have an Extreme (n) and an Express (n).
    I want to make sure the signal is strong upstairs and share a printer (connected to the express) and use AirTunes. I also may add an external drive to the Extreme.
    What's the difference between Extending a Wireless Network and using WDS? Will there be a speed difference?
    Message was edited by: J. Christopher Edwards

    I think you don't get it
    If I have another draft N router that operates at 2.4G and I have only n devices I can still use WDS and it will connect using draft n in the 2.4G band.
    If one g device connects to the network will go in mixed mode.
    The AEBS will still report 130 Mbps for your n clients and 54 for your g clients.
    If the other router is g only obviously you can't connect between the two router at n mode but still the AEBS will be in mixed mode and not in g. The Extreme will still report 130 Mbps for the connected n clients.
    I can tell you that because I have actually implemented it am not taking off the documentation.
    The same device if I try to use the "extend n network" does not even see the AEBS but will happily keep the n in the WDS mode and though the bandwidth is halved it is still more than g.
    In any case enough for this!

  • Help me clarify: Difference between Joining and Extending Wireless Network

    I've eventually figured out how to get my AirPort Express to allow my Mac Pro access to the internet Via Ethernet cable by joining an existing wireless network. What's the difference between that and extending it? By extending it I loose my ability to use the ethernet to connect to internet on my Mac Pro. Odd thing is though when I initially used AirPort Utility to set up my AirPort Express, I went through all the options to get it configured to access my existing network and I checked option to allow internet access through ethernet. All is well, but then I still don't have access to the internet through the ethernet and I noticed that the setting is on Extended. Just curious why it would give me the option to use the ethernet, set it on extended and not even work.

    I've eventually figured out how to get my AirPort Express to allow my Mac Pro access to the internet Via Ethernet cable by joining an existing wireless network. What's the difference between that and extending it?
    When "joining a network," the AirPort Express Base Station (AX) acts just like any other wireless client (laptop, desktop, printer, etc.) You would want to configure the AX to join a network when you only want to use it to share a USB printer and/or stream iTunes.
    When "extending a network," the AX can perform as either a main, relay, or remote base station in a Wireless Distribution System (WDS). A WDS is primarily used to extend a network wirelessly.
    By extending it I loose my ability to use the ethernet to connect to internet on my Mac Pro.
    If the AX is configured as either a relay/remote base station in a WDS, you actually can use it's Ethernet port for Internet access. Of course, this relay/remote must be connected to a main base station, that itself, has Internet access.

  • Difference between WRV200 and WRV210

    Dear Cisco
    Can you tell me the main difference between WRV200 and WRV210.
    Another question
    The datasheet said that the WRV200 can run SSL VPN, is that rigth???
    Cisco WRV200 Wireless-G VPN Router: RangeBooster
    Downloads
    Cisco WRV200 Wireless-G VPN Router: RangeBooster
    Secure Wireless Network Access for Small Offices
    Highlights
    • IPsec and SSL VPN connectivity on a single device
    • Built-in 4-port 10/100 Fast Ethernet switch
    • Multiple SSIDs and VLANs provide separate secure networks
    • Simple, browser-based configuration
    Figure 1. Cisco WRV200 Wireless-G VPN Router: RangeBooster

    Do WRV200 support SSL. strange if yes a newer product do not
    Highlights
    • IPsec and SSL VPN connectivity on a single device
    • Built-in 4-port 10/100 Fast Ethernet switch
    • Multiple SSIDs and VLANs provide separate secure networks
    • Simple, browser-based configuration

  • Difference between ACS and ISE

    What is the big difference between the ACS and the ISE? We just purchased an ACS server to start locking down ports on our switches and use the Radius functions to better secure our wireless environment. It has been ordered but not yet arrived. I had a discussion with management today about preventing the IPads / IPhones / Smartphones / etc. of the world from accessing the network. If the user knows the credentials for getting their laptop onto the network then they can use these same credentials to get their IPad on the network. How do we detect and prevent is the current question.
    In discussing with others the ISE comes up. The questions now become what is the big difference between this and the ACS. Do they work together or independently since they both seem to have "radius on steroids". Can I configure the ACS to do the same functions? I figure this will have to be something on a MAC address level anyway. Oh and one other thing. My wireless infrastructure is not Cisco.
    Off to continue the research path ....
    Brent

    To put it simply I usually say ACS = RADIUS, ISE = NAC.
    ISE will do RADIUS functions as well as NAC functions. Eventually you'll probably see ACS go away and be simply replaced by ISE.
    ISE will do posturizing and profiling of a device to see if it truly meets requirements to be on a certain VLAN. For your example if you were to my credentials on my own smart device I would have access. ISE could profile this device to see if it truly is a corporate owned device or not. If it wasn't ISE can switch the network that the device connects to, say a guest network.
    ISE can also do captive web portals for wired/wireless guest access.
    I wouldn't rely on any type of MAC address authentication as I can easily spoof that.

  • Just purchased an Airport Extreme , what´s the difference between LAN and WAN

    just purchased an Airport Extreme , what´s the difference between LAN and WAN

    Check the Setup Guide for the AirPort Extreme to confirm that the WAN port accepts the signal from your modem or from another router on your network.
    Other Ethernet devices on your network connect to the LAN <-> ports.

  • What is the difference between PUSH and FETCH

    I am a little confused. I use my iphone for both my personal POP email accounts and my business exchange account. I am trying to save as much battery as I can so I turned off push and set everything to manual...but now when I try and get may mail....it either says "connecting" or "checking for new mail" at the bottom of the screen and nothing happens from there.
    What is the best way to setup this situation for the most battery life? I don't need it to automatically download emails just when I open the email accout would be nice.
    I also noticed that when I delete an email from my iphone on my exchange account, it also deletes is on my desktop at work...I need to turn this off...is it possible?

    Hi maxum25,
    The difference between push and fetch is that:
    When using push, the server sends a signal to the iphone and lets it know that an email is coming its direction. Kind of like receiving a call. The iphone does not need to do anything except receive the email.
    When using fetch, the iphone has to wake up every so often and send a request to the server to see if there is any new email waiting for it on the server to download. This takes more time because the iphone sends a request, the server says yes there is some, the iphone says ok give me the new email.
    Now the exchange email uses active sync to keep all changes on the exchange server and mobile device in sync. This is automatic and is the nature of exchange and active sync. In order to keep this from happening you would need to talk to your IT dept. and see if they have an imap or pop alternative. Even using imap reflects the changes back to the server.
    Hope this helps.

  • What's the difference between jsp and jsf?

    who can tell me what's the difference between jsp and jsf?
    I'm puzzled when I found some of the technology in jsp is so similar to the ones in jsp( javaserver page)

    Hi,
    Find the difference between JSP and JSF
    1. A developer has more control with JSP, but (should) get easier development with JSF
    2. Event handling is done differently in JSP (HTTP) and JSF (Java)
    3. The UI is designed differently (or should be at least) with JSP (markup) and JSF (components).
    4. The end product should also be defined differently - JSP page versus a JSF application.
    Is this the only thing that is need to make a decision for either or? Probably not. There are other pieces that need to be taken in account when deciding which technology to use - tools support, enough components, type of application etc.... At this point there are not enough JSF components (although there are some interesting projects underway - Ajaxfaces, Myfaces, ADF Faces, and WebChart 3d) and enterprise tools support is still limited to a few tools vendor. Looking at our ADF Faces components they are currently available as early access (not production) and demands for these components are stacking up, literally, outside my office doorstep. Although I would love to make them production - now! - it is not a viable solution since we are still checking features and fixing critical bugs.
    All this combined - not enough enterprise level components in production, lacking tools support etc... - leave customers in a vacuum where the decision is either to continue with JSP, since it is mature and has a wide developer base, or move forward with JSF not sure if the support, or the developers will be there. This is particularly sensitive to customers that need to get started now and be production by summer.
    If you are in this vacuum here are some key points promoting JSF:
    1. Fundamental unit is the Component
    2. Built in event and state management
    3. Component sets can be provided by any vendor
    4. Closer to ASP.Net or Swing development
    5. Choice of UI technology
    6. Scale up (rich clients)
    7. Scale down (mobile devices)
    8. Built into J2EE containers in J2EE 5.0 (tentative)

  • What's the difference between PNG and JPG for exporting .idea files from the Adobe Ideas app?

    What's the difference between PNG and JPG for exporting .idea files from the Adobe Ideas app?
    What situations are better to export to to .PNG or .JPG?
    J

    iPad apps are designed specifically for the iPad and will not run on the iPhone or iPod Touch. iPhone/iPod apps will run on the iPad, but will only take up an iPhone sized portion of the iPad screen (though you get a 2x button which effectively doubles each pixel in both directions so may appear pixelated). There are also 'universal' apps (which have a '+' symbol against them in the store) which have processing in them to recognise the device that they are on and will tailor the display accordingly (so will make use of the iPad's larger screen).

  • What's the security difference between WPA and WPA2 Personal?

    In order to get my G4 iMac (OS 10.4.11) onto my new AEBS(b/g/n) wi-fi network, I had to drop the network security down from WPA2 Personal to WPA/WPA2 Personal.
    What are the potential security risks in this mode? I know that WEP is no longer secure, so I'm concerned about WPA also being vulnerable.
    If there's a good online explanation of these security differences (not necessarily Apple-only), you just give me that link.
    Thanks

    Hi,
    Summary:
    1.WPA2 is the improved version of WPA
    2.WPA only supports TKIP encryption while WPA2 supports AES
    3.Theoretically, WPA2 is not hackable while WPA is
    4.WPA2 requires more processing power than WPA
    http://www.differencebetween.net/technology/difference-between-wpa-and-wpa2/

  • Difference between idoc and rfc

    what is the difference between idoc and rfc? when and where it is used? when there is idoc, why rfc vice versa?

    IDoc (for intermediate document) is a standard data structure for electronic data interchange (EDI) between application programs written for the popular SAP business system or between an SAP application and an external program. IDocs serve as the vehicle for data transfer in SAP's Application Link Enabling (ALE) system. 
    IDocs are used for asynchronous transactions:  Each IDoc generated exists as a self-contained text file that can then be transmitted to the requesting workstation without connecting to the central database. 
    Another SAP mechanism, the Business Application Programming Interface (BAPI) is used for synchronous transactions. 
    A large enterprise's networked computing environment is likely to connect many geographically distributed computers to the main database. These computers are likely to use different hardware and/or operating system platforms. An IDoc encapsulates data so that it can be exchanged between different systems without conversion from one format to another. 
    IDoc types define different categories of data, such as purchase orders or invoices, which may then be broken down into more specific categories called message types. Greater specificity means that an IDoc type is capable of storing only the data required for a particular transaction, which increases efficiency and decreases resource demands. 
    An IDoc can be generated at any point in a transaction process. For example, during a shipping transaction process, an IDoc may be generated that includes the data fields required to print a shipping manifest. After a user performs an SAP transaction, one or more IDocs are generated in the sending database and passed to the ALE communication layer. The communication
    layer performs a Remote Function Call (RFC), using the port definition and RFC destination specified by the customer model. 
    The IDoc is transmitted to the receiver, which may be an R/3, R/2, or some external system
    RFC
    Remote Function Calls (RFC) and data exchange through IDoc message documents. RFC makes direct and synchronous calls of a program in the remote system. If the caller is an external program it will call an RFC-enabled function in R/3 and if the calling program is the R/3 system it will call an RFC-function in another R/3-system or it will call a non-R/3 program through a gateway-proxy (usually rfcexec.exe). BAPIs are a subset of the RFC-enabled function modules, especially designed as Application Programming Interface (API) to the SAP business object, or in other words: are function modules officially released by SAP to be called from external programs.
    note:reward points if solution found helpfull.....
    regards
    chandrakanth.k

  • I understand the difference between imessage and SMS but when I text a friend who always got iMessages in the past, everything I send her is SMS (green) even if we both have wifi. She has an iphone.

    I understand the difference between imessage and SMS but when I text a friend who used to receive imessages (blue), my phone shows I'm sending her SMS (green) messages. No longer are they blue. She has an iphone and this happens when we are both connected to wifi. We have both recently updated to ios7. Thanks!

    Turn off iMessage
    Reset Network Settings
    Turn iMessage back on

  • Differences between WRT54G and WRT54GL

    Would anyone mind telling me the differences between WRT54G and WRT54GL, i have been looking around and is unable to get an answer. They look the same to me in terms of looks and the specs and functionality stated on linksys's webpage

    The GL is a rebadged WRT54G v4
    take a look see at out Autopsy here:
    WRT54G under the knife - AutopsyMessage Edited by linksysinfo on 07-05-2006 10:28 AM
    Regards Simon
    NAS: TS-459 Pro - 3.6.1 Build0302T - 4 x 1TB Samsung HD103SJ : EXT4 - APC ES 700VA UPS
    QPKG: WordPress 3.4, TwonkyMedia 6.0.39 QPKG - Zenphoto1.4.2.1 [7802] - phpMyAdmin v3.3.10
    Network: Netgear DG834G V4.01.40 - DGTeam Rev. 0849 -> Cisco RV220W 1.0.4.13, Cisco SLM2008, Dlink DSM-520, Xbox360

  • What are the differences between Logos and LogosXT?

    What are the differences between Logos and LogosXT?

     Logos XT is a networking middle-layer maintained by the LabVIEW Network Technologies and Security group. Logos XT provides a thin layer on top of TCP/IP to simplify some common network tasks.
    The underlying foundation for NI networking is called Logos.
    I believe that the basic idea is Logos is what is going on behind the scenes at the base level and Logos XT lets you build your own networking protocols on top of Logos.  Logos XT would be used if you want to make your own networking protocol instead of using TCP/IP or UDP.
    Scott A
    SSP Product Manager
    National Instruments

Maybe you are looking for

  • How do i delete previous router EA4500 from Cisco Cloud?

    Hi  I recently upgraded to the EA6500 from the EA4500, however under Linksys Smart Wifi i can still see "EA4500 (offline)". How do i get rid of this? The EA4500 is no longer being used - i will shorlty flog this on fleabay. Cheers

  • Copying iphoto titles to backup drive

    i've used the batch change function in iphoto to name and number a series of photos, but when i copy them to my external hard drive for a backup, the titles don't copy; i just have a string of IMG titles and no way of telling which photo is which. ho

  • TREX no more included in the SneakPreview??

    Dear SDN, we need to test TERX in order to understand how to use it inside an EP WebDynpro project. We dowloaded the NW 7.0 Java Trial SneakPreview because according to the installation packages content list/desription the TREX should be included. Un

  • How to STOP the IBM Websphere FAST

    Is there any way to restart or stop the IBM Webspehere FAST ?? It takes too long to stop. --Bhupendra Mahajan

  • Group Policy - Workstation Group

    Hello, I am trying to apply a windows group policy using a workstation policy package and associating it with a workstation group. When I go log in to a workstation that is a member of the workstation group after the policy has been setup and go into