Solved

Streaming media

Posted on 2008-10-01
3
385 Views
Last Modified: 2013-12-14
my boss asked me to lock down the network and find out why our applications were so slow. I did just that and found streaming media was one of the issues. Now the users are complaining and I need to have documentation why this is not a good idea to allow this on our network. Please help. I need to list security standpoints as well and bandwidth issues.
0
Comment
Question by:shawkins331
  • 2
3 Comments
 
LVL 2

Expert Comment

by:DavidESL
ID: 22622362
primarirly if the use of streamed content is widespread in your organisation then your available bandwidth is going to be all but eaten up by the streaming users. Also I don't know what business sector you work in but surely if people are watching streamed video then they are not working :).

As far as security holes are concerned as long as your network is properly secured against external threats there should be no issues involved with streaming traffic as requests are initiated from within the network but  thats probably not what you wanted to hear.

security holes associated with streaming are usually found on the streaming server side such as certain servers requiring some UDP ports to be open for feedback in the form of RTCP reciever reports this have to be properly controlled by the firewalls to prevent UDP traffic from sources other than the Streaming client.
0
 

Author Comment

by:shawkins331
ID: 22623525
We are a manfacturing company. We have a T1 line that is divided for 5 phone lines and 1 data line. I have explained that the issue with some of the apps running slow is beacuse of the bandwidth issue but i guess he wants to see proof in black and white. I have ran a network analyzer and have the graphs to show when the media is streaming and when its not. If you know of any links that I can find and print out to verify that point it would be greatly appericated.
0
 
LVL 2

Accepted Solution

by:
DavidESL earned 500 total points
ID: 22623723
below is a quote taken from a microsoft article describing the differences between Unicast and Multicast found at (http://support.microsoft.com/kb/291786)

"Unicast is a one-to one connection between the client and the server. Unicast uses IP delivery methods such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), which are session-based protocols. When a Windows Media Player client connects using unicast to a Windows Media server, that client has a direct relationship to the server. Each unicast client that connects to the server takes up additional bandwidth. For example, if you have 10 clients all playing 100-kilobits per second (Kbps) streams, those clients as a group are taking up 1,000 Kbps. If you have only one client playing the 100 Kbps stream, only 100 Kbps is being used. "

In this context it is describing the utilisation of bandwidth from a server side persepctive but it illustrates equally the impact of having multiple users in concurrent streaming sessions from multiple streaming servers into your network.

This explanation of the nature of unicast streaming and your own network analysis graphs should go a long way to explaining why streaming is clogging up your network.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question