SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Bandwidth Management
                      and Control
                           “Who Cares? BW Is Cheap.”
Jim MacLeod                Jay Botelho                       Show us your tweets!
Product Manager            Director, Product Management         Use today’s webinar hashtag:
WildPackets                WildPackets
jmacleod@wildpackets.com   jbotelho@wildpackets.com
                                                                  #wp_bandwidth
                                                          with any questions, comments, or feedback.
Follow me @shewfig         Follow me @jaybotelho                    Follow us @wildpackets
                                                                         © WildPackets, Inc.   www.wildpackets.com
The Problem
•   Bandwidth limitations
•   Slow response
•   Angry users
•   Angry customers




                                  © WildPackets, Inc.
The Choice
• Blindly throw money at it
   ‒ Demand increases to fill supply
   ‒ Bandwidth is not always cheap
• Modify the demand!
   ‒ Control the traffic
   ‒ Allow access that enforces your priorities




                                                  © WildPackets, Inc.
The Process
•   Audit
•   Analyze
•   Modify
•   Measure




                            © WildPackets, Inc.
Audit
•   Understand your business needs
•   Businesses run on data
•   Data is carried by networks
•   Your organization needs enough bandwidth




                                           © WildPackets, Inc.
Analyze
• Check what's on your network now
• Decide:
  ‒ What to protect
  ‒ What to block
  ‒ What to allow




                                     © WildPackets, Inc.
Modify
• Make policy changes
• Start small
  ‒ Defined scope
  ‒ Measurable results




                                  © WildPackets, Inc.
Measure
• Evaluate the change
• Are the controls working?
• Make the change work before adding another change




                                         © WildPackets, Inc.
Repeat in Measurable Steps
• You wouldn’t:
   ‒ Re-number without planning
   ‒ Replace your firewall carelessly
• QoS, blocking, and bandwidth changes:
   ‒ Change how traffic flows
   ‒ Best done in discrete, measurable steps
• The goal:
   ‒ Assure the business
   ‒ Reduce the cost




                                               © WildPackets, Inc.
Auditing: What Do You Need?
• Business-critical traffic
   ‒ If it went down, your business would stop
   ‒ SaaS, Inter-site WAN, VPN, email
   ‒ This is the traffic that needs to be QoS protected
• Business-enabling traffic
   ‒ If it went down, some employees would be inconvenienced
   ‒ Research sites, social media, industry-specific
• “Harmless” traffic
   ‒ If it went down, your business would not be affected
   ‒ Personal email, sports scores, etc.
• “Toxic” traffic
   ‒ Traffic that hurts your business
   ‒ Bandwidth hogs, illegal downloads, etc.

                                                          © WildPackets, Inc.
Analyzing: Find the Pain Points
• WAN
   ‒ Connection to the Internet
   ‒ Higher cost than LAN
   ‒ Lower bandwidth than LAN
• Equipment
   ‒ Is your firewall slowing you down?
   ‒ Are your routers dropping packets?
• Wi-Fi
   ‒ Shared medium:
   ‒ Subject to interference
   ‒ One node can affect everyone



                                          © WildPackets, Inc.
Analyzing the WAN
• Start with total usage
   ‒ What does your WAN router report for link usage?
   ‒ Is your traffic less than your link bandwidth?
   ‒ If so, the WAN link isn’t at fault, adding more speed won’t help.
• Packet sniff outside the firewall
   ‒ Between the firewall and the WAN router
   ‒ Is there lots of inbound traffic that should be blocked?
   ‒ Can your ISP block upstream?




                                                         © WildPackets, Inc.
Analyzing the Equipment
• Packet sniff on both sides
   ‒ Are packets being dropped?
   ‒ Do retransmissions show up on the inside, but not the outside?
• Similar to “Application versus Network” analysis
   ‒ Differential analysis of in/out shows:
       • Drops
       • Latency
• Useful for security purposes
   ‒ Is traffic getting through that shouldn’t?
• Things to test
   ‒ Firewalls, routers, Wi-Fi APs (Wireless vs Wired sides)
   ‒ Anywhere the network seems “slow”

                                                       © WildPackets, Inc.
Analyzing Wi-Fi
• 802.11b/g/n all share the same spectrum
   ‒ Slower users slow everyone down
       • One 802.11b user makes everyone else wait
       • Broadcasts/Multicasts go out at the slowest speed!
   ‒ Poor signal causes Wi-Fi retransmissions
       • A user with bad signal strength will retransmit frequently
       • Slows everyone else down
   ‒ 2.4GHz is “noisy”
       • Portable phones, microwave ovens, etc.
       • Move to 5GHz if you can (802.11a/n)
• BYOD creates lots of multicasts
   ‒ Device discovery uses mDNS – transmitted everywhere!



                                                             © WildPackets, Inc.
Modify Demand: the Tools
• QoS-like traffic prioritization and queuing
   ‒ Commonly tied to ACLs for specific filtering
• Types of controls:
   ‒ Protected/Assured: guaranteed bandwidth
   ‒ Limited: artificially restricted, slowed down
• Scope of control:
   ‒ Broad: shared pool for all traffic of that type
   ‒ Tight: per-user or per-stream restriction
• Recommendation:
   ‒ Protect your Critical traffic first
   ‒ Limit your Harmless traffic (optional)
       • It’s easier to protect known traffic than to block unknown traffic
   ‒ Block Toxic traffic (recommended)

                                                               © WildPackets, Inc.
Measuring Success
• Repeat your Analysis to test your changes
   ‒ Is it working?
   ‒ Are there unintended results?
• QoS isn’t easy
   ‒ Most sites don’t get it right the first time
   ‒ Don’t go overboard, it can grow to fill your time




                                                         © WildPackets, Inc.
Repeat Periodically
• Make changes until the current crisis passes
   ‒ Modify & Measure in small changes
• Plan for the future
   ‒ Institute ongoing monitoring
   ‒ Makes future Analysis easier
   ‒ Lets you predict when more bandwidth will be needed


                      •   Audit
                      •   Analyze
                      •   Modify
                      •   Measure
                      •   Repeat Periodically
                                                    © WildPackets, Inc.
Live Demo


          Show us your tweets!
           Show us your tweets!
              Use today’s webinar hashtag:
                Use today’s webinar hashtag:
               #wp_bandwidth
                #wp_bandwidth
       with any questions, comments, or feedback.
          with any questions, comments, or feedback.
                 Follow us us @wildpackets
                    Follow @wildpackets
                      © WildPackets, Inc.   www.wildpackets.com
Q&A

   Show us your tweets!
      Use today’s webinar hashtag:           Follow us on SlideShare!
                                              Check out today’s slides on SlideShare
       #wp_bandwidth                             www.slideshare.net/wildpackets
with any questions, comments, or feedback.
          Follow us @wildpackets



                                                           © WildPackets, Inc.   www.wildpackets.com

Contenu connexe

En vedette

Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linuxnirate
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...Nevales Networks
 
Bandwidth Management Software
Bandwidth Management SoftwareBandwidth Management Software
Bandwidth Management SoftwareRahul Gupta
 
Additional Material DrayTek Training - Bandwidth Management
Additional Material DrayTek Training - Bandwidth ManagementAdditional Material DrayTek Training - Bandwidth Management
Additional Material DrayTek Training - Bandwidth ManagementABP Technology
 
Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Anuj Malik
 
Bandwidth management and qos
Bandwidth management and qosBandwidth management and qos
Bandwidth management and qosShane Duffy
 
White Paper - Bandwidth Management and Website Filtering
White Paper - Bandwidth Management and Website FilteringWhite Paper - Bandwidth Management and Website Filtering
White Paper - Bandwidth Management and Website FilteringMike Mount
 
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy IssuesIWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy IssuesIWMW
 
Bandwidth Management Solutions for Network Operators
Bandwidth Management Solutions for Network OperatorsBandwidth Management Solutions for Network Operators
Bandwidth Management Solutions for Network Operatorsipoque
 
Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on LinuxKHNOG
 
24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solution24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solutionNitin Mittal
 

En vedette (12)

Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linux
 
Nevales Content Filtering and Bandwidth Management Solution to the Education...
Nevales Content Filtering and  Bandwidth Management Solution to the Education...Nevales Content Filtering and  Bandwidth Management Solution to the Education...
Nevales Content Filtering and Bandwidth Management Solution to the Education...
 
Bandwidth Management Software
Bandwidth Management SoftwareBandwidth Management Software
Bandwidth Management Software
 
Additional Material DrayTek Training - Bandwidth Management
Additional Material DrayTek Training - Bandwidth ManagementAdditional Material DrayTek Training - Bandwidth Management
Additional Material DrayTek Training - Bandwidth Management
 
Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...Benefits of multi layer bandwidth management in next generation core optical ...
Benefits of multi layer bandwidth management in next generation core optical ...
 
Bandwidth management and qos
Bandwidth management and qosBandwidth management and qos
Bandwidth management and qos
 
White Paper - Bandwidth Management and Website Filtering
White Paper - Bandwidth Management and Website FilteringWhite Paper - Bandwidth Management and Website Filtering
White Paper - Bandwidth Management and Website Filtering
 
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy IssuesIWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
IWMW 2003: C7 Bandwidth Management Techniques: Technical And Policy Issues
 
Bandwidth Management Solutions for Network Operators
Bandwidth Management Solutions for Network OperatorsBandwidth Management Solutions for Network Operators
Bandwidth Management Solutions for Network Operators
 
Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linux
 
24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solution24online-Internet billing & bandwidth management solution
24online-Internet billing & bandwidth management solution
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 

Similaire à Manage Bandwidth with Auditing, Analysis, Modification, and Measurement

Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac DataSavvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksSavvius, Inc
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekSavvius, Inc
 
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Savvius, Inc
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekSavvius, Inc
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
Barry mann measurecamp
Barry mann measurecampBarry mann measurecamp
Barry mann measurecampBarry Mann
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acSavvius, Inc
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisSavvius, Inc
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringSavvius, Inc
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Savvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceSavvius, Inc
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceLisa Menestrina
 
Webinar: Is Convergence right for you? – 4 questions to ask
Webinar: Is Convergence right for you? – 4 questions to askWebinar: Is Convergence right for you? – 4 questions to ask
Webinar: Is Convergence right for you? – 4 questions to askStorage Switzerland
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
The Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsThe Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsHostway|HOSTING
 

Similaire à Manage Bandwidth with Auditing, Analysis, Modification, and Measurement (20)

Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac Data
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeek
 
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
 
Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
Barry mann measurecamp
Barry mann measurecampBarry mann measurecamp
Barry mann measurecamp
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
 
Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?Your Applications Are Distributed, How About Your Network Analysis Solution?
Your Applications Are Distributed, How About Your Network Analysis Solution?
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application Performance
 
Monitoring and Managing Network Application Performance
Monitoring and Managing Network Application PerformanceMonitoring and Managing Network Application Performance
Monitoring and Managing Network Application Performance
 
Webinar: Is Convergence right for you? – 4 questions to ask
Webinar: Is Convergence right for you? – 4 questions to askWebinar: Is Convergence right for you? – 4 questions to ask
Webinar: Is Convergence right for you? – 4 questions to ask
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Cohodatawebinar
Cohodatawebinar Cohodatawebinar
Cohodatawebinar
 
The Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud PlatformsThe Straight Skinny on Cloud Platforms
The Straight Skinny on Cloud Platforms
 

Plus de Savvius, Inc

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius VigilSavvius, Inc
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless AnalysisSavvius, Inc
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 UpdateSavvius, Inc
 

Plus de Savvius, Inc (16)

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Manage Bandwidth with Auditing, Analysis, Modification, and Measurement

  • 1. Bandwidth Management and Control “Who Cares? BW Is Cheap.” Jim MacLeod Jay Botelho Show us your tweets! Product Manager Director, Product Management Use today’s webinar hashtag: WildPackets WildPackets jmacleod@wildpackets.com jbotelho@wildpackets.com #wp_bandwidth with any questions, comments, or feedback. Follow me @shewfig Follow me @jaybotelho Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 2. The Problem • Bandwidth limitations • Slow response • Angry users • Angry customers © WildPackets, Inc.
  • 3. The Choice • Blindly throw money at it ‒ Demand increases to fill supply ‒ Bandwidth is not always cheap • Modify the demand! ‒ Control the traffic ‒ Allow access that enforces your priorities © WildPackets, Inc.
  • 4. The Process • Audit • Analyze • Modify • Measure © WildPackets, Inc.
  • 5. Audit • Understand your business needs • Businesses run on data • Data is carried by networks • Your organization needs enough bandwidth © WildPackets, Inc.
  • 6. Analyze • Check what's on your network now • Decide: ‒ What to protect ‒ What to block ‒ What to allow © WildPackets, Inc.
  • 7. Modify • Make policy changes • Start small ‒ Defined scope ‒ Measurable results © WildPackets, Inc.
  • 8. Measure • Evaluate the change • Are the controls working? • Make the change work before adding another change © WildPackets, Inc.
  • 9. Repeat in Measurable Steps • You wouldn’t: ‒ Re-number without planning ‒ Replace your firewall carelessly • QoS, blocking, and bandwidth changes: ‒ Change how traffic flows ‒ Best done in discrete, measurable steps • The goal: ‒ Assure the business ‒ Reduce the cost © WildPackets, Inc.
  • 10. Auditing: What Do You Need? • Business-critical traffic ‒ If it went down, your business would stop ‒ SaaS, Inter-site WAN, VPN, email ‒ This is the traffic that needs to be QoS protected • Business-enabling traffic ‒ If it went down, some employees would be inconvenienced ‒ Research sites, social media, industry-specific • “Harmless” traffic ‒ If it went down, your business would not be affected ‒ Personal email, sports scores, etc. • “Toxic” traffic ‒ Traffic that hurts your business ‒ Bandwidth hogs, illegal downloads, etc. © WildPackets, Inc.
  • 11. Analyzing: Find the Pain Points • WAN ‒ Connection to the Internet ‒ Higher cost than LAN ‒ Lower bandwidth than LAN • Equipment ‒ Is your firewall slowing you down? ‒ Are your routers dropping packets? • Wi-Fi ‒ Shared medium: ‒ Subject to interference ‒ One node can affect everyone © WildPackets, Inc.
  • 12. Analyzing the WAN • Start with total usage ‒ What does your WAN router report for link usage? ‒ Is your traffic less than your link bandwidth? ‒ If so, the WAN link isn’t at fault, adding more speed won’t help. • Packet sniff outside the firewall ‒ Between the firewall and the WAN router ‒ Is there lots of inbound traffic that should be blocked? ‒ Can your ISP block upstream? © WildPackets, Inc.
  • 13. Analyzing the Equipment • Packet sniff on both sides ‒ Are packets being dropped? ‒ Do retransmissions show up on the inside, but not the outside? • Similar to “Application versus Network” analysis ‒ Differential analysis of in/out shows: • Drops • Latency • Useful for security purposes ‒ Is traffic getting through that shouldn’t? • Things to test ‒ Firewalls, routers, Wi-Fi APs (Wireless vs Wired sides) ‒ Anywhere the network seems “slow” © WildPackets, Inc.
  • 14. Analyzing Wi-Fi • 802.11b/g/n all share the same spectrum ‒ Slower users slow everyone down • One 802.11b user makes everyone else wait • Broadcasts/Multicasts go out at the slowest speed! ‒ Poor signal causes Wi-Fi retransmissions • A user with bad signal strength will retransmit frequently • Slows everyone else down ‒ 2.4GHz is “noisy” • Portable phones, microwave ovens, etc. • Move to 5GHz if you can (802.11a/n) • BYOD creates lots of multicasts ‒ Device discovery uses mDNS – transmitted everywhere! © WildPackets, Inc.
  • 15. Modify Demand: the Tools • QoS-like traffic prioritization and queuing ‒ Commonly tied to ACLs for specific filtering • Types of controls: ‒ Protected/Assured: guaranteed bandwidth ‒ Limited: artificially restricted, slowed down • Scope of control: ‒ Broad: shared pool for all traffic of that type ‒ Tight: per-user or per-stream restriction • Recommendation: ‒ Protect your Critical traffic first ‒ Limit your Harmless traffic (optional) • It’s easier to protect known traffic than to block unknown traffic ‒ Block Toxic traffic (recommended) © WildPackets, Inc.
  • 16. Measuring Success • Repeat your Analysis to test your changes ‒ Is it working? ‒ Are there unintended results? • QoS isn’t easy ‒ Most sites don’t get it right the first time ‒ Don’t go overboard, it can grow to fill your time © WildPackets, Inc.
  • 17. Repeat Periodically • Make changes until the current crisis passes ‒ Modify & Measure in small changes • Plan for the future ‒ Institute ongoing monitoring ‒ Makes future Analysis easier ‒ Lets you predict when more bandwidth will be needed • Audit • Analyze • Modify • Measure • Repeat Periodically © WildPackets, Inc.
  • 18. Live Demo Show us your tweets! Show us your tweets! Use today’s webinar hashtag: Use today’s webinar hashtag: #wp_bandwidth #wp_bandwidth with any questions, comments, or feedback. with any questions, comments, or feedback. Follow us us @wildpackets Follow @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 19. Q&A Show us your tweets! Use today’s webinar hashtag: Follow us on SlideShare! Check out today’s slides on SlideShare #wp_bandwidth www.slideshare.net/wildpackets with any questions, comments, or feedback. Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com