Annonceindlæg fra Paessler

Diagnosticering af pludselige spikes i netværkstrafikken

Problemer i IT-infrastrukturen kan få enorme konsekvenser for produktiviteten i virksomheden.

Reduced IT speed due to spikes in network traffic can significantly contribute to this problem. Most IT monitoring solutions make it easy for IT teams to identify sudden or particularly alarming spikes in network traffic by communicating this data through graphical interfaces. But sometimes, alerting the problem is not enough, and the real challenge is to solve the mystery of the sudden peak in traffic.

Of course, all networks are different. But Paessler has worked with customers for several years to identify the causes of bandwidth spikes, and with the help of customer feedback, we have managed to rank a top-five over the most common:

  1. Scheduled backups within the LAN - Many backup products can be timed to run at a specific time, and if they overlap, even the strongest connection can be overloaded.
  2. Remote Backup Tools - Many companies use cloud-based solutions for their backups. Uploading large backups can cause severe loads and slow down Internet connections significantly.
  3. Virus scanner or software updates that are distributed within the LAN.
  4. Mail Server Problems - An external mail server may try every five minutes to send a 15 MB mail to the company's mail server every five minutes, even if the target server is set to deny access. This too can cause an overload of infrastructure.
  5. Malware and attempted hacking.

This list lists some of the most common issues related to enterprise IT, but there are many other factors contributing to spike in bandwidth. Other causes may e.g. be large downloads among network users, video conferencing or hardware failure.

However, while the list can be used as a reference, it is important that corporate IT teams spend some time on basic network troubleshooting - it is the best and ultimately only method for the administrator to diagnose what is causing spikes. With an IT monitoring tool, companies are given a number of initial steps to dig into the root of the problem.

The first is to consider if there is a pattern in these spikes. Do they occur at roughly the same intervals? Do they show up during working hours (indicating that the peak is due to a user) or later (a sign that the reason lies in some time settings)? If one can identify a pattern, the next step is to try to find other monitoring points in the system that match. The key lies in comparing the pattern with other processes on the network. For example, a CPU peak load on one of the servers may. be in sync with the bandwidth load.

What you can also consider is analyzing the traffic with a packed sniffer or a flow monitoring tool. This can provide insight into what has triggered the network spike. Paessler's PRTG includes packet sniffing and flow monitoring to analyze network data. The best way to find out how PRTG can make your life easier is to download a trial. You can test PRTG for a month - with all features and at no cost. All information as well as the PRTG trial can be found here.

 

Kort om Paessler og PRTG

I 1997 revolutionerede Paessler området for it-monitorering, da vi lancerede PRTG som monitorerer hele it-infrastrukturen 24/7 og bistår it-fagfolk med gnidningsfrie løsninger af problemer, inden de får konsekvenser for brugerne.

Læs mere om Paessler
Kontaktinfo:

Paessler AG

Thurn-und-Taxis-Str. 14

90411 Nuremberg, Germany

https://www.paessler.com/

Vil du vide mere om annonceindlæg?

Premium
Efter 24 år valgte Niels Elbek at fratræde posten som topchef i Elbek & Vejrup: Se her hvorfor
Gennem 24 år har Niels Elbek stået i spidsen for it-selskabet Elbek & Vejrup, som han har stiftet sammen med Lars Vejrup. Selskabet har kunne fremvise tocifrede vækstrater de seneste mange år, men alligevel takker topchefen nu af - se her hvorfor.
Job & Karriere
På jagt efter et it-job i Jylland? Her er 10 stillinger fra Aabenraa til Aalborg, der ledige netop nu
Vi har fundet en række spændende stillinger til dig, der jagter et it-job. Her kan du vælge og vrage mellem ledige stillinger lige fra Aabenraa til Aalborg.
White paper
Det skal dit endpoint detection and response-system kunne
EDR, eller endpoint detection and response, lovede egentlig bedre it-sikkerhed og bedre overblik. Men resultaterne er ikke helt overbevisende. I dette whitepaper kan du læse om nogle af begrundelserne for, at traditionel EDR kan drille – blandt andet et systemerne kæmper med manglende integration af data fra andre kilder. Samtidig får du i dette whitepaper en checkliste for, hvad du kan forvente at dit endpoint detection and response-system skal kunne samt en række relevante use cases.