{"id":2629,"date":"2023-10-04T13:57:32","date_gmt":"2023-10-04T13:57:32","guid":{"rendered":"http:\/\/172.105.17.27\/?p=2629"},"modified":"2023-10-05T13:15:31","modified_gmt":"2023-10-05T13:15:31","slug":"know-which-users-and-applications-are-using-the-most-bandwidth","status":"publish","type":"post","link":"https:\/\/www.blesk.ca\/fr\/2023\/10\/04\/know-which-users-and-applications-are-using-the-most-bandwidth\/","title":{"rendered":"Know which users and applications are using the most bandwidth"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1310.4px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>Like road traffic, it is essential to identify the cause of the slowdown to act and restore order. In the case of a computer network, the frustrating question that runs: Who is monopolizing my bandwidth?<\/p>\n<p>If you are noticing that your Internet speeds are not what they used to be, the reason could be employees constantly listening to streaming music or watching online movies. Not only does having an entire office streaming media influence your bandwidth, but employees also watching movies or TV can really kill productivity.<\/p>\n<p>The struggle to prevent misuse of the internet in the workplace has been a long challenge to overcome. Recent studies demonstrate that upwards of 25% of Internet bandwidth in an office are consumed by employees misusing the internet. From social media and chatrooms to video games and video streaming, employees face limitless temptations and risks when they log on to their work computer and hop online.<\/p>\n<p>According to an International Data Corporation (IDC) report 30% \u2013 40% of Internet use in the workplace is unrelated to business. When an employee browses across the internet, they can unknowingly visit one of the thousands of malicious websites that are being registered daily. These cybersecurity threats can be just as devastating for a company as any amount of lost productivity.<\/p>\n<p>On top of all the ways of misusing internet at workplace, increasing number of crypto mining activities at workplace not only slowdown the network but also lead to increased electricity costs and damaged hardware.<\/p>\n<p>The Network Traffic Analyzer (NTA) module of the bl\u00ebsk network monitoring tool, captures the continuous flow of network traffic and presents the data in graphs and tables. These can provide valuable information on how your network is being used. It is a simple, portable traffic measurement and monitoring tool, which supports various management activities, including network optimization &amp; planning, and detection of network security violations.<\/p>\n<\/div><div class=\"fusion-image-element awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-1\" style=\"--awb-margin-bottom:50px;--awb-caption-title-font-family:var(--body_typography-font-family);--awb-caption-title-font-weight:var(--body_typography-font-weight);--awb-caption-title-font-style:var(--body_typography-font-style);--awb-caption-title-size:var(--body_typography-font-size);--awb-caption-title-transform:var(--body_typography-text-transform);--awb-caption-title-line-height:var(--body_typography-line-height);--awb-caption-title-letter-spacing:var(--body_typography-letter-spacing);\"><span class=\"fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1905\" height=\"838\" title=\"Screenshot-2022-02-02-152954\" src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-152954.png\" data-orig-src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-152954.png\" alt class=\"lazyload img-responsive wp-image-2634\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271905%27%20height%3D%27838%27%20viewBox%3D%270%200%201905%20838%27%3E%3Crect%20width%3D%271905%27%20height%3D%27838%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-152954-200x88.png 200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-152954-400x176.png 400w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-152954-600x264.png 600w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-152954-800x352.png 800w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-152954-1200x528.png 1200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-152954.png 1905w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 1905px\" \/><\/span><div class=\"awb-imageframe-caption-container\"><div class=\"awb-imageframe-caption\"><div class=\"awb-imageframe-caption-title\">Image: Top resource consuming hosts<\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>bl\u00ebsk NTA helps the network administrators keep a close eye on network perimeter. Even with strong firewalls in place, mistakes can happen, and unwanted traffic could get through. Users could also leverage methods such as tunneling, external anonymizers, and VPNs to get around firewall rules.<\/p>\n<\/div><div class=\"fusion-image-element awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-2\" style=\"--awb-margin-bottom:50px;--awb-caption-title-font-family:var(--body_typography-font-family);--awb-caption-title-font-weight:var(--body_typography-font-weight);--awb-caption-title-font-style:var(--body_typography-font-style);--awb-caption-title-size:var(--body_typography-font-size);--awb-caption-title-transform:var(--body_typography-text-transform);--awb-caption-title-line-height:var(--body_typography-line-height);--awb-caption-title-letter-spacing:var(--body_typography-letter-spacing);\"><span class=\"fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1866\" height=\"817\" title=\"Screenshot-2022-02-02-153246\" src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-153246.jpg\" data-orig-src=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-153246.jpg\" alt class=\"lazyload img-responsive wp-image-2621\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271866%27%20height%3D%27817%27%20viewBox%3D%270%200%201866%20817%27%3E%3Crect%20width%3D%271866%27%20height%3D%27817%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-153246-200x88.jpg 200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-153246-400x175.jpg 400w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-153246-600x263.jpg 600w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-153246-800x350.jpg 800w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-153246-1200x525.jpg 1200w, https:\/\/www.blesk.ca\/wp-content\/uploads\/2023\/10\/Screenshot-2022-02-02-153246.jpg 1866w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 1866px\" \/><\/span><div class=\"awb-imageframe-caption-container\"><div class=\"awb-imageframe-caption\"><div class=\"awb-imageframe-caption-title\">Image: NTA Chart or applications used by a host<\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-font-size:19px;--awb-line-height:1.8em;--awb-margin-bottom:50px;\"><p>NTA provides the ability to identify those situations where network traffic does not comply with specified policies, or when it exceeds defined thresholds. This will help you in detecting network configuration problems including:<\/p>\n<ul>\n<li>Misconfiguration of software applications (by analyzing protocol traffic data)<\/li>\n<li>Identification of hosts that use unnecessary protocols.<\/li>\n<li>Excessive network bandwidth utilization<\/li>\n<\/ul>\n<p>bl\u00ebsk NTA discovers the application protocols (Facebook, YouTube, BitTorrent, etc.) using the nDPI approach, a deep packet inspection technology. It characterizes HTTP traffic by relying, among other<\/p>\n<p>things, on the characterization services provided by Google (search engines rather than Google?).<\/p>\n<p>Il fournit des informations d\u00e9taill\u00e9es sur le trafic r\u00e9seau, y compris le volume de trafic, les principaux locuteurs, la consommation de bande passante et les dur\u00e9es d'utilisation \u00e9lev\u00e9es.<\/p>\n<p>bl\u00ebsk NTA est compatible avec toutes les approches de capture de donn\u00e9es n\u00e9cessaire \u00e0 la fonctionnalit\u00e9 de ce type de logi-ciel. Il peut utiliser les statistiques de donn\u00e9es de flux g\u00e9n\u00e9r\u00e9es par les routeurs, les commutateurs, les sondes mat\u00e9rielles autonomes sp\u00e9cialis\u00e9es ou par la configuration de port miroir sur les commutateurs.<\/p>\n<p>Briefly bl\u00ebsk NTA is an essential way to monitor network availability and activity to identify anomalies, maximize performance, and keep an eye out for attacks.<\/p>\n<p>We understand that some organizations may not have inhouse capacity to facilitate many essential tasks; therefore, bl\u00ebsk offers managed services for the low resourced companies to monitor their network services.<\/p>\n<p>Download a <a href=\"https:\/\/www.blesk.ca\/fr\/free-trial\/\">free trial<\/a> of bl\u00ebsk or <a href=\"https:\/\/www.blesk.ca\/fr\/contact\/\">contact us<\/a> for more information.<\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Like road traffic, it is essential to identify the cause of the slowdown to act and restore order. In the case of a computer network, the frustrating question that runs: Who is monopolizing my bandwidth?<\/p>","protected":false},"author":2,"featured_media":2630,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-2629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blesk-tech-talk"],"_links":{"self":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts\/2629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/comments?post=2629"}],"version-history":[{"count":5,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts\/2629\/revisions"}],"predecessor-version":[{"id":2692,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/posts\/2629\/revisions\/2692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/media\/2630"}],"wp:attachment":[{"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/media?parent=2629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/categories?post=2629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blesk.ca\/fr\/wp-json\/wp\/v2\/tags?post=2629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}