How to use the existing network bandwidth effectively is a problem that many network administrators have to face. Whilton Wilton Network behavior Management and traffic management system This gives an excellent bandwidth management solution: Based on application, user based, bandwidth assurance, bandwidth priority as the means, supplemented by the number of connections, connection rate and transmission direction for bandwidth management policy settings. A reasonable policy setting enables the current network to serve more network users and applications, and to achieve smoother application effects than ever before. You can manage or limit the use of network entertainment or other non business applications to the network through priority setting, bandwidth throttling and other bandwidth management to ensure the smooth flow of key business and normal business.
1. Bandwidth management based on application
Wilton Internet Behavior Management/Traffic management system is a bandwidth management device based on layer seventh application. Bandwidth management based on application needs to analyze the protocol type and application type of data accurately, and the bandwidth strategy can limit the usage of network bandwidth of each service and user. The advantage of the bandwidth management strategy based on the application of layer seventh is that it can differentiate the main business from the secondary business, the non service and other network applications, and effectively ensure the consumption of the network bandwidth by the key business.
And the traditional third-layer flow management equipment can not accurately identify the seventh layer of applications, can not accurately block the application of the seventh layer, such as thunder, BT, QQ cyclone and other network downloads, PPLIVE, ppstream, such as network television, and can not be from the billions of network URLs in the fine-grained resolution of the Web page video.
2, according to user or user groups to set bandwidth policy
Based on the application management and protocol identification, the gateway can also set different priority and different levels of bandwidth policies based on user or group, for example, you can set each set of bandwidth policies for different groups, or you can set bandwidth for different users, so that bandwidth management can be managed to the user accurately, and different priorities may be set. According to the user priority to protect the bandwidth consumption of key services, so that the non-critical application of each group of users to ensure the smooth operation of core key business can use some of the network bandwidth, so as to maximize the level of network utilization. Through the user group bandwidth policy setting, it can also effectively improve the network server group's export bandwidth, protect the network server group's external service ability, shorten the response time. Bandwidth management settings are fully considered and reasonable planning, can be implemented for any user or user groups in the network can be based on the application of bandwidth management; Users and user groups are automatically read from the list of existing users and then selected by the user.
3. Bandwidth management strategies based on different priority levels
Within different user or user group policies, you can also set different bandwidth-priority policies, such as User (group) a Plus Application protocol (group) B, where the same group and different applications can be categorized and prioritized to ensure bandwidth usage for key applications/key users. Through the user and application of bandwidth management priority settings, but also can be a non-critical business within the scope of management, so that the network within a variety of traffic can be controlled.
With any bandwidth policy (such as bandwidth reservation, bandwidth assurance, bandwidth throttling, bandwidth priority), set up up to 1024 child policies: A bandwidth channel (also known as a virtual channel) for a more granular flow management strategy that distinguishes between user and application permutations and combinations.
Read more about Internet Behavior Management equipment please refer to: www.wholeton.com.cn Shenzhen Wilton
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.