Solved

Unusually high bandwidth usage

Posted on 2012-03-11
5
731 Views
Last Modified: 2013-12-24
We have a 3 network MIFI device that allows up to 5 wireless connections.
We have a 15GB per month allowance.
We used up this allowance a few days before the month end.
For our type of Internet usage (email with attachments that run into 10's of MBs per day only) 5GB would be more than enough.

Logging onto the config page of the device showed we had used:

     Download 3GB
     Upload 12GB

I phoned 3 who suggested that one of the users may be watching/listening to video/audio and that this would use more upload than download.
This came as a surprise, I thought that if you were watching TV/Video etc. online that you would be downloading more than uploading!

Can any of you experts explain the data movement process of this type of Internet use and if uploads would be more than downloads (to me that doesn't sound logical)

Thanks for your help and hopefully education.

Neil
0
Comment
Question by:NELMO
5 Comments
 
LVL 5

Accepted Solution

by:
BAYCCS earned 500 total points
ID: 37707136
If you are streaming audio or watching a video you are downloading period, no exception!
(Think of it that the data needs to be delivered to the device)

If you are sending pictures, email, or videos to other people then you are uploading that content.

Who ever said that watching a movie would give you higher uploads is wrong. The only time you upload is the request to view the content from the server (think of me calling you on the phone, once you pick up and say hello that would be the video playing).

Your wireless bill should show you a break down of the devices and show you who your biggest usage users are.
0
 
LVL 20

Expert Comment

by:edster9999
ID: 37707244
As above - watching streams of movie or audio is download not upload.

Upload is mostly likely to be either someone doing bit torrent or P2P downloads (as it shares the data back to others)
or someone storing files on your network (imagine you have an FTP server with no security and people find it by searching.  They stick a copy of HarryPotter.avi on it and as people download it from there, your upload number goes up.

Your ISP may be able to check traffic - if not you need to install some sniffer software (see wireshark) and see what is going up and down.
0
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 37707288
It sounds like either someone in your network is sending out large attachments by email or you hight have spyware somewhere in the network with it's own SMTP engine that is sending out spam.
0
 
LVL 44

Expert Comment

by:Darr247
ID: 37708089
When downloading, no matter what the content, you should see approximately 10%-15% upload traffic just in Ack messages. i.e. for 100MB of download, you should see 10MB to 15MB of upload traffic for Ack's.

12GB would be 3 to 6 movies, by the way, depending on resolution; or a couple hours of broadcast TV HD video, 20-35 music CDs with no compression, et cetera.

Either your report has the totals switched around... or, as TG-TIS noted, someone using it should know where that traffic originated or there's a 'bot or a backdoor on your network.

Are you unplugging the device at night?
0
 

Author Closing Comment

by:NELMO
ID: 37714541
I don't know why I questioned myself on this - The 3 network techie was very sure that the streaming went upstream! Which just did not sound logical.

Thanks for putting me back on track

Neil
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now