WhatsUp Gold’s bandwidth monitoring tools collect, monitor and analyze network traffic volume by end-point (user), port, interface and protocol (application).
Assure adequate bandwidth for business-critical applications
Minimize the impact of non-critical or unauthorized network traffic
Identify bandwidth hogging processes unnecessarily running in peak load periods
Alert potential DDoS attacks or externally initiated port-scans
WhatsUp Gold tracks bandwidth usage over all areas of the network – devices, applications, servers, link connections, leased lines etc, and offers insights into network bandwidth utilization and traffics analysis. It also maps out historical trends for capacity planning and proactively identifies security issues.
Real-time monitoring allows administrators to identify interfaces/links/applications/users/protocols taking up bandwidth. WhatsUp Gold can highlight bandwidth utilization over LAN, WAN links and specific devices, identifies internal and external traffic sources/destinations. It also classifies the information as Top speakers, Top Protocols, Top Applications that use up bandwidth.
By default, each network channel operates on a best-effort basis – every application gets equal priority, be it a business critical VoIP service, or a user streaming video content. QoS polices are essential to ensure business-critical applications get sufficient bandwidth. WhatsUp Gold verifies Quality of Service over through Type of Service (QoS over ToS); DSCP for LAN/WAN, CBQoS policies and Cisco NBAR classification mechanisms.
By studying traffic patterns and usage over a period of time, and by analyzing the data, WhatsUp Gold can identify trends in bandwidth usage and potential bottlenecks. The historical data also aids administrators in capacity planning; efficient purchase of hardware/bandwidth and also verifies bandwidth-based billing including “burstable” bandwidth services using 95th percentile reports.
By monitoring real-time bandwidth usage along with historical bandwidth trends, WhatsUp Gold can proactively identify security issues like DDos attacks; unauthorized downloading and other suspicious, potentially malicious, network behavior. It can aid in security forensics and analysis by automatically identifying high traffic flows to un-monitored ports; expose unauthorized applications like file sharing and video streaming; monitor traffic volumes between pairs of source and destinations; and detect failed connections.
Bandwidth is a measurement of the amount of data transfer that takes place in a unit of time. For example, 3MB/s equates to three megabytes per second. The higher the rate per second, the more bandwidth you have. Every device with an IP address on your network uses bandwidth.
Monitoring bandwidth is one of the most critical aspects of network management. Without comprehensive insight into traffic type and bandwidth utilization, it is not possible to ensure proper availability of bandwidth.
WhatsUp Gold uses NetFlow, jFlow, and sFlow to monitor network bandwidth and application traffic. It automatically discovers NetFlow enabled routers and switches, and configures them to collect and send NetFlow data back to it. WhatsUp Gold then analyzes the data, providing details on traffic identification, historical trends and QoS through ToS verification. Comprehensive reports showing Top Protocols, Top Senders, Top Application etc, are provided.
Complete the form to download your free trial of WhatsUp Gold.
Download link will be emailed to you.
Click here for latest system requirements.
In this method, bandwidth monitors send SNMP queries to SNMP-enabled devices on the network. The devices then send device-centric information (stored in their Management Information Bases (MIBs)) back to the device. This information can include network bandwidth usage data. The monitoring tool can then analyze this data to monitor network bandwidth usage.
NetFlow is Cisco’s monitoring protocol that can collect various statistics on network bandwidth usage across devices, and hence monitor network bandwidth. NetFlow is based on “Flows”, which is defined a continuous series of packets sharing common characteristics (including source/destination IP and ports, IP protocol, Ingress Interface and Type of Service values). These characteristics are defined in Cisco’s NetFlow 7-ple key. NetFlow can be enabled on network device interfaces, which then monitor the “flows”. A series of packets with unique values in the 7 fields constitutes a flow, and subsequent packets with identical values are added as increments to the existing flow. A difference in even one of the values is recorded as a separate flow, and flows end when configurable timeouts are reached or specific flow ending packets are encountered. The flow data is then sent as UDP packets to a NetFlow collector, which then analyses the data into information for monitoring network bandwidth (including bandwidth usage, network traffic details, network trends and anomalies, bandwidth peaks and valleys, performance metrics, and so on).