GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

Network Utilization, KPIs and the Truth

Posted by: GreenPages Blog
Read More
All Posts

Network Utilization, KPIs and the Truth

Recently, I came across a question posed on our website asking how to effectively measure network utilization.  On a high-level that answer seems easy, but in reality there is more to it.  One should certainly measure bandwidth, and for the sake of this conversation we are talking WAN bandwidth, from both inbound and outbound perspectives.  While this snapshot could help from an immediate remediation perspective, it is only a snapshot.  If you didn’t run the command at the exact correct moment you might have missed something.  Actually, we probably already did.

In order to really get a good perspective on bandwidth utilization we want to take a look at a number of variables.  First and foremost we want some trending data on this environment.  Being able to trend on a WAN interface over the course of time is going to allow us to proactively make informed decisions about upgrades or optimization strategies that could potentially obviate the remediation process before it happens.  This is obviously going to entail some more up front work and some type of monitoring solution.  There are a lot of them out there.

Not only do we want some trending data – the most important piece to this analysis is not only do we want to understand bandwidth usage patterns; we also want to understand what applications are using what subset of that bandwidth.  Having that application level granularity is going to allow us to make more informed decisions about our infrastructure, the applications running on it and the future direction of all of it.  Multiple vendors support protocols on their WAN routers that can assist us with this; Netflow, J-Flow, S-flow etc.  All require some type of collection device and related head-end application to parse this information and represent it in a nice, graphical manner.  One thing that some don’t consider, and it is common amongst all of these, is the storage implications required to store this data.  Some of these are appliance based while others require some backend database and the storage required to save this raw data.  Depending on how long you want to save it, what the sampling rate is and what the role-ups look like will predicate what you need from a storage capacity perspective.

Lastly, we really should be taking a look at not only bandwidth from a utilization perspective (application-level granularity), but we also need to take a look at some of the other valuable Key Performance Indicators.  Other attributes such as errors and uptime are also extremely valuable in determining immediate and future needs.


Related Posts

Tech News Recap for the Week of 03/01/21

If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 03/01/21!

Microsoft Exchange Zero-Day Vulnerabilities Being Actively Exploited in The Wild

By Randy Becker, CISO & VP, Network and Security Consulting It isn’t common for Microsoft to release a security update for an 11-year-old server application. So, when they do, people take notice. Especially when tied to Email. Microsoft has just released out-of-band security updates for a zero-day exploit that is actively being exploited in the wild. Of significant importance is that this is for all supported Microsoft Exchange versions plus Exchange 2010.

Zero Trust Does Not Mean Zero Access

By Randy Becker, CISO & VP, Network and Security Consulting Zero Trust is not new, but it has recently started to show up a lot in security circles. A quick search shows that there are a lot of organizations with thoughts on this topic. Given the infamous SolarWinds breach, we are starting to hear more about “Zero Trust,” “Defense in Depth,” and my personal favorite “Assume the Breach.” Last Friday CISA quietly posted the following important guidance on Zero Trust: NSA Releases Guidance on Zero Trust Security Model. This should be on the short list of reading for everyone.