In this article, I'll explain the different methods that are available in different situations, and how to use SNMP , RMON, flow and packet sniffing to track down the culprits. The options that are available will depend very much on the hardware you're using, and how much management access you have to that hardware. First answer yourself the following questions:. Enterprise-grade hardware offers many more possibilities than SOHO or consumer-grade hardware.
Port mirroring, for example, is rarely supported by consumer-grade equipment. Some of the most useful protocols, such as netflow , aren't supported by all vendors.
So, your ability to monitor bandwidth based on flows is limited to those vendors and models that support flow protocols. NetFlow data provide a more granular view of how bandwidth and network traffic are being used than other monitoring solutions, such as SNMP.
Read more You need administrative access to the router or switch to enable SNMP or to mirror traffic to an additional port. In a corporate environment, the network administrators will have full access to their own equipment, but only limited access to provider equipment. In a home environment, most customers will have no management access to their ISP router.
If you don't have management access to the equipment, your options for monitoring are limited, and you may need to rely on reporting from the ISP. Port mirroring for sniffing requires an unused port on your switch. If you're already actively using all the ports, you'll need to disconnect something first not a ideal plan , or you won't be able to mirror traffic to a sniffer.
If your hardware supports it, one of the first places to look is at the device itself. Many devices include detailed traffic statistics as part of their user interface. If you're lucky, your device will report which ports have the most traffic on them, and what IP addresses or protocols are causing this traffic. This requires that you have enough management access to the router to be able to view the statistics, and that the router provides these statistics.
If you don't have management access, you can try asking your ISP to generate a report for you. The steps to do this vary from vendor to vendor, so please check the documentation from your vendor. There are SNMP-based monitoring tools available at all price levels, from freeware to large enterprise platforms. Bandwidth monitoring with SNMP will tell you the amount of traffic, over time, on each port.
If certain ports have spikes of traffic, you know that the devices connected to those ports are generating a lot of traffic. The additional information, such as the number of broadcasts, can be very useful when debugging network problems. A high number of broadcasts, for example, can indicate spanning tree problems.
If your spanning tree is constantly recalculating, you will have recurring network problems. What you think is somebody hogging the network could actually be underlying protocol problems, so don't ignore these additional counters. If your vendor supports it, RMON adds additional details about the type of traffic you've got.
It was originally developed for monitoring remote sites hence the name , but can monitor LAN and WAN equipment as well. This doesn't tell you who's hogging your bandwidth, at least not directly. However, problems here eg. But let's go back to looking for the cause of a bandwidth spike Tired of your neighbor using his Wi-Fi gear on channel 1, 6, or 11 that's all the possible choices on the 2.
Well now's your chance to get even! They might not interoperate at high speeds with each other but they're FCC legal and they're guaranteed to shut your neighbor down or your money back! While Airgo's third generation product achieves record breaking throughput, it annihilates any legacy Ok that's not an actual advertisement, but it might as well be one.
Earlier this month, Tim ran a battery of tests on these wannabe What the first set of tests reveals is that Airgo's product still beats the "Draft N" competition from Broadcom and Marvell hands down with their third generation MIMO product in range and throughput.
Note: The results showing the Cisco business-grade One could also easily quadruple the range on a Cisco Access Point with the right kind of high-powered antenna but that wouldn't be a fair measurement on how good the radio and chipset design is.
In the second set of tests examining interoperability and interference characteristics on neighboring While the Draft N and Pre N products technically work with each other, it would seem that most of them don't interoperate at the higher speeds.
Broadcom announced that their Draft N products will interoperate at high speeds with Atheros Draft N products, but the Atheros based products weren't available for testing yet at the time of the review.
Broadcom and Atheros feeling the heat from relative newcomer Airgo have put their fiercely competitive past behind them though I'm not sure if this will help if they can't post good throughput versus range numbers against Airgo. When I asked Broadcom's representative if they were guaranteeing future compatibility with I finally got them to admit that there are no such guarantees for actual Airgo is a very interesting story by itself. I've praised them in the past for having the cleanest design in terms of staying in a single 20 MHz channel while retaining the speed crown.
Airgo's competitors eventually pushed past the performance of Airgo's first and second generation products by hogging two radio channels and Airgo quickly answered with their third generation product that also used a 40 MHz wide signal and regained a massive lead in throughput which holds today. The problem is that Airgo when from being the nicest single-channel neighbor in town to being the absolute worst Wi-Fi neighbor in town. The other products from Broadcom and Marvel weren't quite as devastating to the neighbors, but the damage is still severe.
What's crazy is that these products are FCC legal and are being sold on store shelves today. This is a serious problem in the city where town homes and condominiums are right next to each other and it's even a problem for businesses which primarily uses Here's the scenario: I've discovered that the most efficient way to effectively "page" my husband to the bedroom for sexytimes is to hog the internet bandwidth.
He then comes upstairs to inquire as to why his internet is laggy, I wiggle my butt at him, and sexytimes commence. Sometimes he's not logged into IM and his ringer is off and I am too warm and snug in bed and too lazy to actually walk downstairs and to the other end of the house to seduce him, so fucking with his internet connection is the next best way to communicate that I'm awake and trying to get his attention. So far it seems that running uTorrent is a good but inconsistent method for bandwidth-hogging.
What is a better, more consistent way that I can basically flip a switch to instantly tie up all the bandwidth and thus summon him to my love nest? Thanks in advance! This is possibly the funniest AskMe I've seen in a long time : Since domestic internet access is usually asymmetric, it's probably easiest to flood the uplink which thanks to the BufferBloat menace will quickly bring all other connections to a screeching halt.
Start a bunch of ftp uploads in parallel perhaps? You'll need a friendly machine to connect to at the other end, or the admin may get a little annoyed. Particularly devious individuals would ping flood some external machine with some nice large ping packets, so that no pesky TCP backoff algorithms get in the way of your sexy times.
Experiment with different TTL values depending on your home network setup: it might be a couple of hops to the border router. Response by poster: OK, for starters, I don't know anything about this so I don't know if I'm doing any of this right. I get error messages when trying pharm's suggestion and variants : ping -i 0 -n -s -t 2 "Bad value for option -i, valid range is from 1 to General failure.
What am I doing wrong? Are you using Windows or a unix variant Jacqueline? Also, I forgot to point out that you need to put an IP address or hostname on the end of the command. Setting the time-to-live value nice and low means that the packets will never actually get there, so it doesn't really matter what address you use.
Pick a google mail server : posted by pharm at AM on March 29, Response by poster: Windows. Can you log into the router or whatever you connect to the outside world with from your computer? Or can you get it set up so that you can do that? Then you can just reboot the router and kill his internet connection for the minute or so it takes to restart.
How you do it will depend on what you're using.
0コメント