Solved

bandwidth consumption

Posted on 2013-12-06
3
322 Views
Last Modified: 2013-12-25
I got some data from wireshark for the conversation between the client (B) and the server (A) and I am trying to do some analysis as far as the bandwidth consumption is concerned.

The WAN link on the client side is a T1 and the link on the server side is 3MB. I have Wireshark captured on both ends.

Here it goes...
This is the data from the statistic->conversation in Wireshark on the server side (3MB link). I got the A->B as 200,000 bps (0.19073 Mbps)  and B->A as 50,000bps.

Questions:
- Is it valid to say that the traffic from A->B (outbound of the gateway) takes 7% (which is (3/0.19073)*100) of the 3MB?
- Is it valid to say that the traffic from B->A (inbound of the gateway) takes 1.7% of the 3MB?
0
Comment
Question by:leblanc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
Beartlaoi earned 500 total points
ID: 39702160
Your 7% and 1.7% are close for the 3Mb/s circuit but your equation is wrong.
It should be (used/available)*100%
(0.19073/3)*100 = 6.36%
(.05/3)*100 = 1.67%
0
 
LVL 1

Author Comment

by:leblanc
ID: 39703375
yes. I flipped it around.
So it is valid to say that the rate for the bandwith from A to B for that specific application is 0.19073 Mbps which is 6.36% of the 3MB bandwidth at the gateway. Correct?
0
 
LVL 9

Assisted Solution

by:Beartlaoi
Beartlaoi earned 500 total points
ID: 39711999
Correct
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question