Solved

How is data transferred from one site to another?

Posted on 2011-03-07
5
770 Views
Last Modified: 2013-12-09
Hello,

I do not understand how to troubleshoot a speed issue and how to maximize my connections to my headquarters. I first need help understanding how data is passed from a laptop on wifi or desktop wired in with cat 6 and how it would request/transfer data from a server over at my headquarters. I need a step by step process from PC/laptop to server. My physicians are complaining that their EMR application is slow sometimes on wifi and sometimes on a desktop connected with cat 6.

I've got a Sonicwall TZ210 W with interface settings:

X0 - LAN - Primary Bridge I/F - 1000Mbps Full-duplex
X1 - WAN - 100 Mbps Full duplex
X2 - WLAN - Secondary Bridge I/F - 100 Mbps Full-duplex

I've got Sonicpoint access points connected to a gig switch and mounted on the wall.

I've got XT2 Dell Tablets which has Wireless N and currently my connect rate is from 24Mbps - 54 Mbps with Tx Rate from 54mbps - 130 Mbps.

I have GiG swtiches with CAT6 cables ran through out clinic building.

I have DSL for internet

I have a point to point fiber optic circuit (10meg) from this office going to my headquarters and I use an Adtran 5000.

Thanks so much and I appreciate your help.

nimdatx
0
Comment
Question by:nimdatx
  • 3
  • 2
5 Comments
 
LVL 13

Expert Comment

by:kdearing
ID: 35058913
From your description, I see 3 pooosble choke points:
1. Wifi - remember this is a shared medium, all client devices connected to a single AP share the bandwidth.
      Also remember that if any of those devices are 802.11b or 802.11g devices, the AP's speed will drop down to the lowest common denominator.
2. 10Mbps fiber link
3. DSL circuit

The first thing to do is to find the choke point.
PRTG: http://www.paessler.com/prtg
It's one of the best network monitoring packages out there and it's free.

Next, find out what is causing the slowdown using a sniffer.
WireShark: http://www.wireshark.org/
Again, it's one of the best out there and it's free.

Once you've got everything running like it's supposed to...
SpiceWorks: http://www.spiceworks.com

0
 
LVL 1

Author Comment

by:nimdatx
ID: 35059282
Sounds good. Can you explain how data is retrieved/sent to headquarters via a wifi or hardwire connection from outside clinic? Considering what I have in place? I hope you understand my question, cause I can barely ask it, so it makes sense.

Thanks,

nimdatx
0
 
LVL 13

Expert Comment

by:kdearing
ID: 35059548
I'm not sure what you're asking.
I'm a network guy, I can explain the connectivity.
As far as how/what data is sent/received, that is up to whatever application you are using (EMR software).
0
 
LVL 1

Author Comment

by:nimdatx
ID: 35060327
What I'm trying to figure out is how speeds are calculated and sent/received as far as thourghput, for example;

I have desktops with 100/1000 nics connected to a gig switch which is connected to adtran with 10meg p2p into HQ and firewall connected to DSL. Now on my HQ side I have another adtran connected to gig switches which connectes to a gig nic on server. I cannot figure out how data packets are sent from host to server and how I would ensure that connection rate and transfer rates are maximized. The tools you mentioned are great to monitor and figure out the choke points, but if I don't understand how the data travels from host to server and server to host, then I'm just looking at numbers.

 
0
 
LVL 13

Accepted Solution

by:
kdearing earned 500 total points
ID: 35062243
The slowest link in the chain will determine traffic bandwidth between 2 devices.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now