How to limit the Internet access speed for multiple computers when multiple users share the Internet (1)

Source: Internet
Author: User

Many users are using multi-host or multi-user routers to share the Internet, saving both costs and troubles. For example, sometimes some users are downloading BT, and other users want to play a legend, they may not be able to play well, because there is no speed limit for downloading BT, most or even all of the network bandwidth is swallowed up. Is there a way to limit the traffic of some network segments or specific machines in the Intranet through the traffic limit function? How can we achieve more reasonable bandwidth allocation between computers or users? Next, let's take a look at some of this knowledge.

I. vro traffic limit

P2P download is like a locust, and the bandwidth to which to fly is tight. P2P downloads usually allow 10% of users to occupy 90% of the bandwidth resources, as well as the processing capabilities of various switches and routers, resulting in network congestion. However, whether a router can effectively restrict this type becomes one of its important capabilities. The first attempt was to use port sealing on the router. However, with the upgrade of the BT client software, you can modify the application port at will, therefore, the final result of this method is not ideal.

1. traffic control is in the ascendant

So the more popular method is traffic control. At present, many high-end broadband routers and bar dedicated routers all have this function. The traffic control function classifies data streams based on IP addresses, protocols, ports, and other information, and controls the bandwidth of different data streams. This allows you to reserve bandwidth for specified hosts or services and limit the maximum bandwidth, limit the use of massive download software such as P2P, and achieve average bandwidth allocation. This is especially suitable for multi-user networks with Mixed Voice videos and data.

 

Traffic limit has become an advanced feature of many vrouters.


If you want to restrict LAN traffic, you can choose products with such features. In addition, the traffic limit function of such products also has their own characteristics:

For example, the flying fish star VOLANS-4150 + router, it supports Qos traffic control function, bandwidth sharing, bandwidth reserved, support for the specified number of hosts, network segment upstream and downstream traffic control. If BT or other P2P software is enabled on a machine in the Intranet for network transmission, the machine sends out a large number of connections, which affects the connections of other users and directly paralyzes the entire network.

The ranking of the number of connections provided by the flying fish star 4150 + can quickly determine which machine has the largest concurrent connection on the Intranet, and then control a host or network segment through its traffic limit. When setting, you only need to enter the maximum number of upstream and downstream requests and "save" to control the bandwidth of a computer or network segment.

TP-LINK and other models are representative of this product. This router also provides the port traffic control function. Each of its lanports sets an eight-level bandwidth limit, 128 Kbps, 256 Kbps, 512 Kbps, 1 Mbit/s, 2 Mbit/s, 4 Mbit/s, and 8 Mbit/s, respectively. Managers can allocate bandwidth to computers connected to any port as needed, this prevents users on one of the ports from occupying too much bandwidth.

2. gain an in-depth understanding of traffic control

In some enterprise-level routers, such functions are also widely used. For example, zhaowei Electronic Group launched the deep Rate Control Technology of CW-AFC Deeper Rate Control), through four steps to Control P2P Traffic, to ensure the efficiency of network utilization, to ensure the key applications, to meet the general application, avoid blocking in the WAN Access bottleneck.

 
The bandwidth control function has become a must-have for high-end routers.

Its core technology is to allocate bandwidth through the processing policy of the current system. The CW-AFC control policy can correspond to and the user accurately defines the bandwidth policy, for the application, the CW-AFC can define the application bandwidth allocation level, and the maximum bandwidth, minimum guaranteed bandwidth, and whether the application can be rented. This effectively ensures users' key applications and limits non-key applications such as P2P, CW-AFC can guarantee the use of most users, limit the excessive use of resources of individual users.

The specific traffic control settings are not very complex. Taking this function of TP-LINK router as an example, it is through the IP QoS function to achieve traffic control first bound IP and MAC ). After entering the configuration page of The vro, we can see that the QoS Set interface has two parameters: "upstream bandwidth" and "downstream bandwidth, after QoS is enabled, you can set it as a real bandwidth parameter.

On the IP QoS settings page, you can set the IP addresses of computers with large data traffic in the "address segment", and restrict the download bandwidth in the "upstream/downstream" mode. In addition, to ensure that the computer does not have access to the Internet due to bandwidth restrictions, the router can ensure that the "downstream bandwidth" of the two hosts can be used at least 100 Kbps.

Ii. Soft weapons for traffic restrictions

1. Neptune Network Traffic Control Software

At present, most vrouters with traffic control functions are not cheap on the market, so many domestic users are discouraged from such products. Therefore, for home users who have this need, you can try a pure software traffic limit solution.

Neptune's traffic limit is more convenient to use

At present, there are many products that can limit bandwidth traffic. For example, "Neptune" is an excellent local network traffic monitoring and control software.

Neptune traffic monitoring is suitable for networks of any type of architecture and is suitable for monitoring and controlling operating systems of any type of Windows. You can directly view the network traffic of any client in the LAN on a machine equipped with the Neptune traffic monitoring server. This allows you to view and monitor the instantaneous download speed, upload speed, and total downloads, monitors the total number of uploads and allows you to sort them freely. You can easily find the most crazy computer for downloading and uploading. You can view the current screen of any computer and the usage of application processes and ports, check what the operator is doing, send a warning message to the client, and disable or restart the computer that violates the regulations.

When the traffic uploaded or downloaded by the client exceeds the set value, a self-configured warning message is automatically sent to the client, which can automatically disconnect the client from the Internet. The host speaker can read the illegal machine number alarm.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.