SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Bandwidth Management
                      and Control
                           “Who Cares? BW Is Cheap.”
Jim MacLeod                Jay Botelho                       Show us your tweets!
Product Manager            Director, Product Management         Use today’s webinar hashtag:
WildPackets                WildPackets
jmacleod@wildpackets.com   jbotelho@wildpackets.com
                                                                  #wp_bandwidth
                                                          with any questions, comments, or feedback.
Follow me @shewfig         Follow me @jaybotelho                    Follow us @wildpackets
                                                                         © WildPackets, Inc.   www.wildpackets.com
The Problem
•   Bandwidth limitations
•   Slow response
•   Angry users
•   Angry customers




                                  © WildPackets, Inc.
The Choice
• Blindly throw money at it
   ‒ Demand increases to fill supply
   ‒ Bandwidth is not always cheap
• Modify the demand!
   ‒ Control the traffic
   ‒ Allow access that enforces your priorities




                                                  © WildPackets, Inc.
The Process
•   Audit
•   Analyze
•   Modify
•   Measure




                            © WildPackets, Inc.
Audit
•   Understand your business needs
•   Businesses run on data
•   Data is carried by networks
•   Your organization needs enough bandwidth




                                           © WildPackets, Inc.
Analyze
• Check what's on your network now
• Decide:
  ‒ What to protect
  ‒ What to block
  ‒ What to allow




                                     © WildPackets, Inc.
Modify
• Make policy changes
• Start small
  ‒ Defined scope
  ‒ Measurable results




                                  © WildPackets, Inc.
Measure
• Evaluate the change
• Are the controls working?
• Make the change work before adding another change




                                         © WildPackets, Inc.
Repeat in Measurable Steps
• You wouldn’t:
   ‒ Re-number without planning
   ‒ Replace your firewall carelessly
• QoS, blocking, and bandwidth changes:
   ‒ Change how traffic flows
   ‒ Best done in discrete, measurable steps
• The goal:
   ‒ Assure the business
   ‒ Reduce the cost




                                               © WildPackets, Inc.
Auditing: What Do You Need?
• Business-critical traffic
   ‒ If it went down, your business would stop
   ‒ SaaS, Inter-site WAN, VPN, email
   ‒ This is the traffic that needs to be QoS protected
• Business-enabling traffic
   ‒ If it went down, some employees would be inconvenienced
   ‒ Research sites, social media, industry-specific
• “Harmless” traffic
   ‒ If it went down, your business would not be affected
   ‒ Personal email, sports scores, etc.
• “Toxic” traffic
   ‒ Traffic that hurts your business
   ‒ Bandwidth hogs, illegal downloads, etc.

                                                          © WildPackets, Inc.
Analyzing: Find the Pain Points
• WAN
   ‒ Connection to the Internet
   ‒ Higher cost than LAN
   ‒ Lower bandwidth than LAN
• Equipment
   ‒ Is your firewall slowing you down?
   ‒ Are your routers dropping packets?
• Wi-Fi
   ‒ Shared medium:
   ‒ Subject to interference
   ‒ One node can affect everyone



                                          © WildPackets, Inc.
Analyzing the WAN
• Start with total usage
   ‒ What does your WAN router report for link usage?
   ‒ Is your traffic less than your link bandwidth?
   ‒ If so, the WAN link isn’t at fault, adding more speed won’t help.
• Packet sniff outside the firewall
   ‒ Between the firewall and the WAN router
   ‒ Is there lots of inbound traffic that should be blocked?
   ‒ Can your ISP block upstream?




                                                         © WildPackets, Inc.
Analyzing the Equipment
• Packet sniff on both sides
   ‒ Are packets being dropped?
   ‒ Do retransmissions show up on the inside, but not the outside?
• Similar to “Application versus Network” analysis
   ‒ Differential analysis of in/out shows:
       • Drops
       • Latency
• Useful for security purposes
   ‒ Is traffic getting through that shouldn’t?
• Things to test
   ‒ Firewalls, routers, Wi-Fi APs (Wireless vs Wired sides)
   ‒ Anywhere the network seems “slow”

                                                       © WildPackets, Inc.
Analyzing Wi-Fi
• 802.11b/g/n all share the same spectrum
   ‒ Slower users slow everyone down
       • One 802.11b user makes everyone else wait
       • Broadcasts/Multicasts go out at the slowest speed!
   ‒ Poor signal causes Wi-Fi retransmissions
       • A user with bad signal strength will retransmit frequently
       • Slows everyone else down
   ‒ 2.4GHz is “noisy”
       • Portable phones, microwave ovens, etc.
       • Move to 5GHz if you can (802.11a/n)
• BYOD creates lots of multicasts
   ‒ Device discovery uses mDNS – transmitted everywhere!



                                                             © WildPackets, Inc.
Modify Demand: the Tools
• QoS-like traffic prioritization and queuing
   ‒ Commonly tied to ACLs for specific filtering
• Types of controls:
   ‒ Protected/Assured: guaranteed bandwidth
   ‒ Limited: artificially restricted, slowed down
• Scope of control:
   ‒ Broad: shared pool for all traffic of that type
   ‒ Tight: per-user or per-stream restriction
• Recommendation:
   ‒ Protect your Critical traffic first
   ‒ Limit your Harmless traffic (optional)
       • It’s easier to protect known traffic than to block unknown traffic
   ‒ Block Toxic traffic (recommended)

                                                               © WildPackets, Inc.
Measuring Success
• Repeat your Analysis to test your changes
   ‒ Is it working?
   ‒ Are there unintended results?
• QoS isn’t easy
   ‒ Most sites don’t get it right the first time
   ‒ Don’t go overboard, it can grow to fill your time




                                                         © WildPackets, Inc.
Repeat Periodically
• Make changes until the current crisis passes
   ‒ Modify & Measure in small changes
• Plan for the future
   ‒ Institute ongoing monitoring
   ‒ Makes future Analysis easier
   ‒ Lets you predict when more bandwidth will be needed


                      •   Audit
                      •   Analyze
                      •   Modify
                      •   Measure
                      •   Repeat Periodically
                                                    © WildPackets, Inc.
Live Demo


          Show us your tweets!
           Show us your tweets!
              Use today’s webinar hashtag:
                Use today’s webinar hashtag:
               #wp_bandwidth
                #wp_bandwidth
       with any questions, comments, or feedback.
          with any questions, comments, or feedback.
                 Follow us us @wildpackets
                    Follow @wildpackets
                      © WildPackets, Inc.   www.wildpackets.com
Q&A

   Show us your tweets!
      Use today’s webinar hashtag:           Follow us on SlideShare!
                                              Check out today’s slides on SlideShare
       #wp_bandwidth                             www.slideshare.net/wildpackets
with any questions, comments, or feedback.
          Follow us @wildpackets



                                                           © WildPackets, Inc.   www.wildpackets.com

Contenu connexe

En vedette

Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linuxnirate
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...Nevales Networks
 
Bandwidth Management Software
Bandwidth Management SoftwareBandwidth Management Software
Bandwidth Management SoftwareRahul Gupta
 
Additional Material DrayTek Training - Bandwidth Management
Additional Material DrayTek Training - Bandwidth ManagementAdditional Material DrayTek Training - Bandwidth Management
Additional Material DrayTek Training - Bandwidth ManagementABP Technology
 
Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Anuj Malik
 
Bandwidth management and qos
Bandwidth management and qosBandwidth management and qos
Bandwidth management and qosShane Duffy
 
White Paper - Bandwidth Management and Website Filtering
White Paper - Bandwidth Management and Website FilteringWhite Paper - Bandwidth Management and Website Filtering
White Paper - Bandwidth Management and Website FilteringMike Mount
 
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy IssuesIWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy IssuesIWMW
 
Bandwidth Management Solutions for Network Operators
Bandwidth Management Solutions for Network OperatorsBandwidth Management Solutions for Network Operators
Bandwidth Management Solutions for Network Operatorsipoque
 
Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on LinuxKHNOG
 
24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solution24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solutionNitin Mittal
 

En vedette (12)

Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linux
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...
 
Bandwidth Management Software
Bandwidth Management SoftwareBandwidth Management Software
Bandwidth Management Software
 
Additional Material DrayTek Training - Bandwidth Management
Additional Material DrayTek Training - Bandwidth ManagementAdditional Material DrayTek Training - Bandwidth Management
Additional Material DrayTek Training - Bandwidth Management
 
Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...
 
Bandwidth management and qos
Bandwidth management and qosBandwidth management and qos
Bandwidth management and qos
 
White Paper - Bandwidth Management and Website Filtering
White Paper - Bandwidth Management and Website FilteringWhite Paper - Bandwidth Management and Website Filtering
White Paper - Bandwidth Management and Website Filtering
 
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy IssuesIWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
 
Bandwidth Management Solutions for Network Operators
Bandwidth Management Solutions for Network OperatorsBandwidth Management Solutions for Network Operators
Bandwidth Management Solutions for Network Operators
 
Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linux
 
24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solution24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solution
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 

Similaire à Manage Bandwidth with Auditing, Analysis, Modification, and Measurement

Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac DataSavvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksSavvius, Inc
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekSavvius, Inc
 
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Savvius, Inc
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekSavvius, Inc
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
Barry mann measurecamp
Barry mann measurecampBarry mann measurecamp
Barry mann measurecampBarry Mann
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acSavvius, Inc
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisSavvius, Inc
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringSavvius, Inc
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Savvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceSavvius, Inc
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceLisa Menestrina
 
Webinar: Is Convergence right for you? – 4 questions to ask
Webinar: Is Convergence right for you? – 4 questions to askWebinar: Is Convergence right for you? – 4 questions to ask
Webinar: Is Convergence right for you? – 4 questions to askStorage Switzerland
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
The Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsThe Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsHostway|HOSTING
 

Similaire à Manage Bandwidth with Auditing, Analysis, Modification, and Measurement (20)

Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac Data
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeek
 
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
Barry mann measurecamp
Barry mann measurecampBarry mann measurecamp
Barry mann measurecamp
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application Performance
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application Performance
 
Webinar: Is Convergence right for you? – 4 questions to ask
Webinar: Is Convergence right for you? – 4 questions to askWebinar: Is Convergence right for you? – 4 questions to ask
Webinar: Is Convergence right for you? – 4 questions to ask
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Cohodatawebinar
Cohodatawebinar Cohodatawebinar
Cohodatawebinar
 
The Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsThe Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud Platforms
 

Plus de Savvius, Inc

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius VigilSavvius, Inc
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless AnalysisSavvius, Inc
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 UpdateSavvius, Inc
 

Plus de Savvius, Inc (16)

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
 

Dernier

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Manage Bandwidth with Auditing, Analysis, Modification, and Measurement

  • 1. Bandwidth Management and Control “Who Cares? BW Is Cheap.” Jim MacLeod Jay Botelho Show us your tweets! Product Manager Director, Product Management Use today’s webinar hashtag: WildPackets WildPackets jmacleod@wildpackets.com jbotelho@wildpackets.com #wp_bandwidth with any questions, comments, or feedback. Follow me @shewfig Follow me @jaybotelho Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 2. The Problem • Bandwidth limitations • Slow response • Angry users • Angry customers © WildPackets, Inc.
  • 3. The Choice • Blindly throw money at it ‒ Demand increases to fill supply ‒ Bandwidth is not always cheap • Modify the demand! ‒ Control the traffic ‒ Allow access that enforces your priorities © WildPackets, Inc.
  • 4. The Process • Audit • Analyze • Modify • Measure © WildPackets, Inc.
  • 5. Audit • Understand your business needs • Businesses run on data • Data is carried by networks • Your organization needs enough bandwidth © WildPackets, Inc.
  • 6. Analyze • Check what's on your network now • Decide: ‒ What to protect ‒ What to block ‒ What to allow © WildPackets, Inc.
  • 7. Modify • Make policy changes • Start small ‒ Defined scope ‒ Measurable results © WildPackets, Inc.
  • 8. Measure • Evaluate the change • Are the controls working? • Make the change work before adding another change © WildPackets, Inc.
  • 9. Repeat in Measurable Steps • You wouldn’t: ‒ Re-number without planning ‒ Replace your firewall carelessly • QoS, blocking, and bandwidth changes: ‒ Change how traffic flows ‒ Best done in discrete, measurable steps • The goal: ‒ Assure the business ‒ Reduce the cost © WildPackets, Inc.
  • 10. Auditing: What Do You Need? • Business-critical traffic ‒ If it went down, your business would stop ‒ SaaS, Inter-site WAN, VPN, email ‒ This is the traffic that needs to be QoS protected • Business-enabling traffic ‒ If it went down, some employees would be inconvenienced ‒ Research sites, social media, industry-specific • “Harmless” traffic ‒ If it went down, your business would not be affected ‒ Personal email, sports scores, etc. • “Toxic” traffic ‒ Traffic that hurts your business ‒ Bandwidth hogs, illegal downloads, etc. © WildPackets, Inc.
  • 11. Analyzing: Find the Pain Points • WAN ‒ Connection to the Internet ‒ Higher cost than LAN ‒ Lower bandwidth than LAN • Equipment ‒ Is your firewall slowing you down? ‒ Are your routers dropping packets? • Wi-Fi ‒ Shared medium: ‒ Subject to interference ‒ One node can affect everyone © WildPackets, Inc.
  • 12. Analyzing the WAN • Start with total usage ‒ What does your WAN router report for link usage? ‒ Is your traffic less than your link bandwidth? ‒ If so, the WAN link isn’t at fault, adding more speed won’t help. • Packet sniff outside the firewall ‒ Between the firewall and the WAN router ‒ Is there lots of inbound traffic that should be blocked? ‒ Can your ISP block upstream? © WildPackets, Inc.
  • 13. Analyzing the Equipment • Packet sniff on both sides ‒ Are packets being dropped? ‒ Do retransmissions show up on the inside, but not the outside? • Similar to “Application versus Network” analysis ‒ Differential analysis of in/out shows: • Drops • Latency • Useful for security purposes ‒ Is traffic getting through that shouldn’t? • Things to test ‒ Firewalls, routers, Wi-Fi APs (Wireless vs Wired sides) ‒ Anywhere the network seems “slow” © WildPackets, Inc.
  • 14. Analyzing Wi-Fi • 802.11b/g/n all share the same spectrum ‒ Slower users slow everyone down • One 802.11b user makes everyone else wait • Broadcasts/Multicasts go out at the slowest speed! ‒ Poor signal causes Wi-Fi retransmissions • A user with bad signal strength will retransmit frequently • Slows everyone else down ‒ 2.4GHz is “noisy” • Portable phones, microwave ovens, etc. • Move to 5GHz if you can (802.11a/n) • BYOD creates lots of multicasts ‒ Device discovery uses mDNS – transmitted everywhere! © WildPackets, Inc.
  • 15. Modify Demand: the Tools • QoS-like traffic prioritization and queuing ‒ Commonly tied to ACLs for specific filtering • Types of controls: ‒ Protected/Assured: guaranteed bandwidth ‒ Limited: artificially restricted, slowed down • Scope of control: ‒ Broad: shared pool for all traffic of that type ‒ Tight: per-user or per-stream restriction • Recommendation: ‒ Protect your Critical traffic first ‒ Limit your Harmless traffic (optional) • It’s easier to protect known traffic than to block unknown traffic ‒ Block Toxic traffic (recommended) © WildPackets, Inc.
  • 16. Measuring Success • Repeat your Analysis to test your changes ‒ Is it working? ‒ Are there unintended results? • QoS isn’t easy ‒ Most sites don’t get it right the first time ‒ Don’t go overboard, it can grow to fill your time © WildPackets, Inc.
  • 17. Repeat Periodically • Make changes until the current crisis passes ‒ Modify & Measure in small changes • Plan for the future ‒ Institute ongoing monitoring ‒ Makes future Analysis easier ‒ Lets you predict when more bandwidth will be needed • Audit • Analyze • Modify • Measure • Repeat Periodically © WildPackets, Inc.
  • 18. Live Demo Show us your tweets! Show us your tweets! Use today’s webinar hashtag: Use today’s webinar hashtag: #wp_bandwidth #wp_bandwidth with any questions, comments, or feedback. with any questions, comments, or feedback. Follow us us @wildpackets Follow @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 19. Q&A Show us your tweets! Use today’s webinar hashtag: Follow us on SlideShare! Check out today’s slides on SlideShare #wp_bandwidth www.slideshare.net/wildpackets with any questions, comments, or feedback. Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com