Sunday, August 5, 2012

University & need of Bandwidth Control and Policy (or Policing)

University & need of Bandwidth Control and Policy (or Policing)

University bandwidth suffers due to large volume of peer-to-peer file sharing (P2P) traffic such as BitTorrent, eDonkey and such traffic that end up using up to 60% to 75% of the overall network capacity and slowing down other applications. Most firewall and non-DPI (deep packet inspection) based solutions or an old generation application are incapable of handling the high volume of traffic and fails to reliably detect encrypted P2P protocols. This heavy usage increases infrastructure and communication costs and affects the quality of service of other applications. Also this makes universities look for constant additional bandwidth.

The universities have a strong reason to monitor their traffic, explore the behavior of various applications and determine their bandwidth usage requirements and patterns and then set policy controls and do optimization based on the analytics. These activities will provide better service and control to the Universities to better serve their staff members and employees and also students across the campus. Also the challenge at the University is to reliably detect the relevant protocols, especially the encrypted BitTorrent format, and throttle P2P file sharing to a minimum. Also what Universities want is not to slow down their critical applications because of this massive traffic from the student community. They need a solution to be able to prioritize bandwidth usage and allocate higher bandwidths to critical applications.

They also need a way to control applications such as peer-to-peer, direct download links (DDL), and Flash and illegal content downloads (for copyright violations, compliance reasons etc.) but also has a requirement for higher-quality services. They need to provide suitable priority to important applications such as scientific computing, digital libraries, and activities related to research. Of course added requirements will be logging of such network usage data (for forensics), better stability and reliability and cost savings on bandwidth too (say for example by limiting peer-to-peer applications in universities you can save close to 30% of internet usage cost).

This would require the adoption of a system for analyzing and evaluating network traffic usage by means of a deep packet analysis, logging and analytics both retro analysis and real time analysis (what we call @ i7, analytics on the move!!) providing an Eagle eye to the usage and patterns of traffic at the campus. i7 networks EagleEye provides the required network intelligence and policy control solutions helping Universities achieve exactly what is the pain point mentioned above with an added benefit of forensics which most products don’t provide.  EagleEye detects applications layer-7 DPI and also via behavioral traffic analysis. EagleEye supports all major protocols including encrypted and unencrypted P2p file sharing, media streaming, internet telephony (voip) and instant messaging. EagleEye not only helps QoS management but allows prioritization, classification and bandwidth management along with any copyright infringements.

EagleEye is connected via hardware bypass which does not affect network connectivity at all and is completely transparent to network users.

 I7’s EagleEye helps not only universities but also CSPs (Cloud service Providers) and also fixed and mobile broadband operators to better understand traffic patterns, monetize new data services and improve the quality of experience for their subscribers. Our application classification and analytics engine enables bandwidth and congestion control, prioritized quality of service delivery and detailed network visibility. It also helps to limit equipment and operating expenditures, increase profitability and maximize subscriber satisfaction. Moreover to be patented self app ranking algorithm actually minimizes the policy control specifications to a minimal and makes deployment and configuration an easy job.

No comments:

Post a Comment