Skip to content

Unmask Bandwidth Bandits

The term bandwidth hog makes most network managers consider the usual suspects – from ill-timed backups to illicit P2P use. But bandwidth-stealing applications can be difficult to unmask and simply increasing network capacity won’t solve the problem. So let’s discuss three commonly overlooked strategies and scenarios to identify bandits and avoid performance interruptions.

Prioritized Video Push

Network teams assume video conferencing will consume significant bandwidth. While true, the greater impact occurs when ill-prepared network teams assign video and other UC applications the highest possible precedence settings. At first, video consumes a small amount of traffic, but as use expands and high-definition video is implemented, the situation drastically changes. With high-precedence communication programs taking up more pipe, less space is available for critical applications like email and web-based programs. The result? Noticeable performance slowdowns.

Avoiding Interruptions

  • Create network baselines for performance benchmarks and user expectations of legacy applications.
  • Deploy video-conferencing applications and test in a pre-production environment to better assess potential impact on existing network traffic.
  • Conduct a staged rollout to 25 percent and then 50 percent of the user base before deploying video network-wide.
  • Grant higher precedence to other critical apps to avoid slowing down business processes.

Cloud Crowd

No doubt shifting to cloud offers great scalability and availability benefits. But cloud also delivers a host of new challenges. Cloud services shift IT management priorities from the network core to the WAN/Internet connection. IT teams must understand this shift, adequately prepare the network, and adjust management styles – or risk crashing Internet links and existing web services.

Avoiding Interruptions

  • Assess and baseline existing Internet service performance and link utilization.
  • Test web service with a small user group to benchmark performance and Internet link demands.
  • Use modeling to extrapolate the impact of enterprise-wide service use and evaluate link utilization with added web service over the same time period.
  • Prioritize cloud and SaaS apps, plus throttle traffic to ensure bandwidth is appropriately allocated.
  • When relying heavily on cloud services, consider having multiple providers in case one has a performance issue.
  • Maintain visibility by developing a framework for eliminating blind spots delivering granular access to data across both public, private, and hybrid cloud environments.

App Vendors: Trust but Verify

When you deploy major applications like Enterprise Resource Management programs involving vendor-hired consultants, they typically run tests to verify proper service functionality. Consultants will generally be selective of test points and coordinate with someone on the application team without network team involvement.

As a consequence, applications will be approved without exhaustive enterprise-wide evaluations. The problem is that adverse performance in many untested locations can jeopardize overall network performance and any promised savings and benefits from the newly implemented program.

Avoiding Interruptions

  • Maximize communication between application and network teams
  • Ensure selected test sites represent overall environment.
  • Use third-party monitoring tools to validate application results.
  • Verify with lab test with 50 users in pre-deployment environments to learn the application’s impact.

Most bandwidth bandits highjack network utilization when network teams fail to take steps during the deployment phase. By fully evaluating the impact of rolling out critical services, you can confirm your network is ready for new services. You also maintain positive user experience and response times with critical legacy applications.

We thank Network Instruments for this Article

Related Posts

From Alerts to Scoreboards: Bodet’s Modular Solutions for Facilities

From Alerts to Scoreboards: Bodet’s Modular Solutions for Facilities

Bodet offers a wide range of modular and scalable solutions designed to improve communication, safety, and engagement across various environments.…
Understanding Network Impairment Emulation: Building Resilient and High-Performance Networks

Understanding Network Impairment Emulation: Building Resilient and High-Performance Networks

Modern networks are more complex than ever — spanning cloud, edge, and on-prem environments with applications that depend on consistent,…
Case Study: Leading Canadian University Modernizes Campus Operations with Modern Clock System from Sapling & Telnet Networks

Case Study: Leading Canadian University Modernizes Campus Operations with Modern Clock System from Sapling & Telnet Networks

The Situation In 2018, a major Ontario university partnered with Telnet Networks to overhaul its campus-wide synchronized clock system. The…
Fall Product Update 2025

Fall Product Update 2025

As the seasons change, so do the demands on your network. Our Fall Product Update showcases new and updated products…
The Advantages of IP & PoE Clocks

The Advantages of IP & PoE Clocks

Accurate time isn’t just a convenience – it is a critical factor in maintaining compliance, productivity, and safety across modern…