Interpreting bandwidth utilization graphs

Dwight Barker, Contributing expert
It's not easy to interpret whether bandwidth usage is "good, oversized or under-utilized," based solely on a bandwidth utilization graph, and the best benchmark for measuring if a network link is over-utilized is to measure

    Requires Free Membership to View

the impact of the resulting network bottleneck on the critical business applications and users using that link. The following are examples where high and low bandwidth utilization does signal the types of link upgrades or downgrades you would expect.

Business versus non-business traffic
Most companies don't want to invest in upgrading their WAN/Internet bandwidth for a saturated link that is filled up by employees who are Web surfing and listening to Internet radio. Now, if a link is saturated with critical SAP traffic, and it is impacting employee productivity, then that is a different story.

Quality of Service (QoS)
While a link may have high utilization, it may not be a problem because priority traffic is still routing properly, and therefore, users are experiencing very little delays. Under these conditions, you could be running at extremely high bandwidths, yet not need to upgrade any of your links. However, if the available bandwidth for priority traffic is starting to reach the capacity of the link, then you may have to start thinking about upgrading your link.

Packet loss
Although a link may show low bandwidth utilization, packets may be getting lost across the WAN or Internet. Typically, where there is packet loss, users experience slower application performance because data needs to be re-sent (retransmissions), and the user must wait for this re-sent data. In this case, there is no need to upgrade the link speed. However, you do need to call your service provider and ask for a fix to the packet loss problem.

Ideal solutions
The following information is typically furnished by an ideal performance management solution:

  • Real-time and historical trending information.

  • Auto-discovery of "Who" and "What" is using the network. Typically, this data consists of the top IP addresses, IP conversations (source and destination IP address), and applications being used.

  • End-user performance measurements, including application response time, network latency, and delay, due to retransmissions.

This question was asked at Ask the Experts on SearchNetworking.com.

About the author: Dwight Barker works at EMC Corp. Dwight has held product management roles at Network Physics, Netscreen, Cisco and Neon Software.

This was first published in May 2009

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.