Of course, if your network is uncongested, network logons are quick, and users find all their business applications are running at top speed, then you’re probably not too concerned about a handful of people using KazaA somewhere in your organization.
Sadly, though, this ideal state of affairs is rarely witnessed, except perhaps in administrators’ dreams. The truth is that most corporate networks carry far more network-clogging leisure traffic than they can cope with. That’s because leisure apps are often particularly aggressive bandwidth users.
The key concern here is that mission-critical applications get the bandwidth they need at all times. Beyond that, it’s also important that other applications that enable users to do productive work run at acceptable speeds.
When this doesn’t happen on a regular basis because of network congestion, the reflex reaction is often to throw more bandwidth at the problem, but it’s fairly obvious that increasing bandwidth in isolation is unlikely to be an effective solution. Doubling a 512 Kbps connection to 1 Mbps, for example, simply gives more capacity to bandwidth hungry apps, without guaranteeing that performance for mission-critical application users will be improved.
And increasing bandwidth is expensive — especially when you hit the 2 Mbps mark and find that any bandwidth increase will probably entail new physical cabling. A new data pipe costs a lot: how easy is it to justify a costly infrastructure upgrade when chances are high that you’ll find you’ve filled the new capacity — with more traffic you don’t really need — in a very short period of time?
The fact is that bandwidth upgrades by themselves are very unlikely to solve bandwidth problems in anything but the very, very short term. Most network managers clearly understand this — research from Cupertino, CA-based network management software vendor Packeteer shows that about 40 percent of businesses delay deploying new applications because they don’t believe their WANs will be able to cope.
Page 2: Reserving Bandwidth and Identifying Traffic Hogs
Reserving Bandwidth and Identifying Traffic HogsA better and more elegant solution is to reserve some bandwidth for the apps that really need it and to decrease the overall traffic on the network. To do that, of course, it’s necessary to analyze what you’re carrying on your network, and then decide what traffic you really want and what you want to restrict. “Most people are aware they have a problem, but they don’t know what it is until they take the time to find out at the application layer,” says Roger Hockaday, a marketing director at Packeteer.
The surprising thing is that solutions for traffic identification and shaping aren’t really that expensive. Packeteer’s PacketSeeker only costs a thousand dollars or so, yet it can automatically discover traffic from hundreds of applications and provide a clear picture of what’s really causing problems on a network. And the revelations are often disturbing. When you do find what’s on your network, it’s not uncommon to discover that most of the problems are being caused by a handful of P2P users.
The good news is that once you know what you’re facing, it’s not that hard to make changes and get the network in better shape. To do this you’ll need a policy-based network management tool like Packeteer’s PacketShaper, Israel-based Allot Communications’s NetReality, or any of the other products from vendors competing in this space.
How Policy-based Management Tools Can Help
How can policy-based management tools actually help? By enabling network admins to set up policies dictating which applications are mission critical and how much bandwidth they need to run properly, which applications (like Web browsers) are important and should have a certain amount of bandwidth available to them, and which traffic is unwelcome (possibly streamed media, probably P2P traffic) and therefore to be discouraged.
For example, with Packeteer’s PacketShaper it’s possible to set policies such as:
Mission-critical apps typically don’t need huge amounts of bandwidth — SAP, for example, only needs 16 Kbps per user — so it’s fairly simple math if you have 10 SAP users to set a policy that makes a reserved virtual link for SAP traffic of 160 Kbps at all times.
While you might like to get rid of “leisure” traffic like P2P traffic completely, you’re probably better off tolerating and containing it rather than trying to eliminate it altogether, according to Hockaday. “If you try to prohibit P2P, the apps look for ways through the firewall. If you contain them, they won’t port hop. In educational establishments, some of them find that a huge amount of bandwidth, like 90 percent, is outbound P2P. We suggest they don’t prohibit it, but only allow inbound traffic.”
Page 3: Added Security via Network Traffic Management
Added Security via Network Traffic ManagementNetwork traffic management can have a useful side effect: added security. By setting policies for unknown applications, they can in most circumstances be contained, so the risk of a worm flooding your entire bandwidth is reduced.
Allot has introduced specific features on its NetReality WAN appliance to help against denial of service (DoS) attacks. “If the server has 100 connections per second, and this suddenly jumps to 800 per second, then there’s a good chance that a DoS attack is under way,” says Antoine Guy, Director of Global Marketing at Allot Communications.
“If this happens, we can set off an alarm and execute a script automatically to create a policy and shrink the bandwidth allocated to it, so the hacker probably concludes he has succeeded, when in fact the rest of your network is operating normally. You can then store the IP address and blacklist it.”
Limitations of Router-based Traffic Control
As an alternative to installing dedicated network management appliances, many companies try to control traffic at the router, but there are several problems associated with this. Routers can’t actually look into the application layer, so the control they offer is necessarily very much less targeted. And a dedicated appliance — installed on the WAN, like NetReality, or behind the WAN access router, like PacketShaper — is also much quicker to implement, as setting up each router can potentially be a long-winded and complex affair.
“This technology can deliver benefits on the first day, and a reason that these appliances are popular is that their cost is very low compared with the cost you’d incur on consultancy and upgrading all your routers,” says Guy. A NetReality solution for a 45 Mbps WAN costs under $20,000, he says. “Our studies show a typical ROI of 4-5 months, with 10 months at the longest.”
It may be that an organization simply does not have enough bandwidth to run all its mission-critical applications — after all, companies’ needs change, and WAN bandwidth upgrades are inevitable from time to time. But what seems clear is that without some way of managing the traffic on a network, it’s almost impossible to ensure there will ever be enough bandwidth, whatever the capacity of the WAN. So if your company has shelled out hundreds of thousands of dollars for an SAP or a PeopleSoft implementation, for example, then spending a few thousand dollars more is not an unreasonable additional investment to consider for ensuring your mission-critical apps don’t run too slow and your business doesn’t grind to a halt.
Article courtesy of CrossNodes.
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.