312-253-4321    Get SUPPORT

Alchetec Blog

Tip of the Week: Understanding Bandwidth

Tip of the Week: Understanding Bandwidth

I have a question for you: when did you last examine the bandwidth that your business Internet package provides you? This is a very important consideration to make, for the sake of your productivity. This week, we’ll offer a few tips on how the proper bandwidth can help you get much more out of your IT solutions.

What is Bandwidth?

On a very basic level, bandwidth is simply how quickly you can download content from the Internet, measured in megabits per second, or Mbps. The higher the bandwidth, the faster these downloads will run.

Think about it like this: you’re trying to move water from one bucket to another. You have two tools you can use to do so, a fire hose, or a straw. Which connection will move the water more quickly?

If you answered the hose, you understand how bandwidth works. Just like the fire hose can move more water than a straw can, a larger bandwidth can move more megabits in the same amount of time. Some high-speed connections can even be measured in Gigabits per second.

How Does Bandwidth Translate to Download Speed?

Calculating your projected download speed is fairly simple, as long as you keep in mind that there are 8 bits for every byte. This means that, if you were trying to download 8 megabytes of data on a 1 Mbps connection, it would take approximately 1 second. 512 megabytes would take just over a minute to download on the same connection.

How Do I Know What My Business Needs?

In order to accurately estimate your business’ required bandwidth, a little more math is in order. While other factors, like connection reliability, should also be considered, your approximate bandwidth needs are relatively simple to calculate.

First, you will need to have the estimated traffic that each of your processes take up, as well as the total users that are likely to be engaged in that process. You will want to assume that this is during peak operations, so you don’t inadvertently short-change your business. Naturally, the bandwidth required by different processes will vary, but the following is generally the case:

100Kbps and Under - Low-end, single-line VoIP phones and e-fax machines. Some basic-use computers and laptops may utilize under 100 Kbps, but this isn’t often the case in businesses.

100Kbps to 500Kbps - It is much more common for computers and laptops to fall within this range, as they are more often used for streaming and downloading, emailing, and more rigorous browsing.

500Kbps to 2.0Mbps - If your business utilizes cloud solutions and (standard definition) video conferencing, you’re likely taking up this much bandwidth. This is commonly the range that Enterprise Resource Planning solutions, Customer Resource Management platforms, and Point of Sale devices will bring your bandwidth to as well.

2.0Mbps and Up - This bandwidth is usually called for by a high-definition conferencing solution, a lot of remote access, heavy cloud access, and more.

Now, still keeping peak activities in mind, add up what your staff is likely to need. Let’s say you have a total of 10 users in your business, including yourself. Let’s also say that you’re always on your email, corresponding with your business contacts and using 450Kbps. Six of your employees are engaged with the CRM solution they utilize, each using 2.0Mbps, and the last three are involved in a high-def video conference, each leveraging 2.5Mbps.

Totaling these use cases up, your business can expect to use almost 20Mbps at heaviest use - although it may make the most sense to assume everyone was attending a video conference, totaling 25Mbps, just to be safe.

What other tips would you like us to share? Let us know by leaving a comment, and make sure you subscribe so you don’t miss it!

Analytics Can Fool You
Using Technology to Build Your Customer Relationsh...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, May 27 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity IT Services Network Security Malware Email Hackers Privacy Data Backup Hosted Solutions Data Software Outsourced IT Internet Managed IT Services Productivity Innovation Business Data Recovery Microsoft IT Support Ransomware Tech Term Computer Cloud Computing Hardware IT Support Small Business Backup Business Continuity Mobile Devices Efficiency Google Paperless Office Communication Managed IT Services Business Management User Tips Android Remote Monitoring Collaboration VoIP Windows 10 Internet of Things Data Management Workplace Tips Upgrade Phishing Disaster Recovery Smartphone Encryption Cybersecurity Passwords Managed Service Provider Browser Office 365 Mobile Device Smartphones Managed IT Server Holiday Communications BYOD Social Media Windows 10 Save Money Artificial Intelligence Applications Risk Management Business Technology Government Facebook Employer-Employee Relationship Saving Money Compliance Document Management Wi-Fi Chrome Recovery Unified Threat Management Help Desk BDR Tip of the week Microsoft Office Managed Service Information Healthcare Antivirus SaaS Virtualization Vulnerability Telephone Systems IT Management Scam Network Windows Analytics Project Management File Sharing Vendor Management Bandwidth Infrastructure Automation Password Quick Tips Files Tablet Data Security Money Bring Your Own Device Apps Politics Hosted Solution Office Robot Maintenance Customer Relationship Management Storage Word Virtual Reality Gmail Website Work/Life Balance IT Service App Training Router Wireless Going Green Mobile Device Management Firewall Regulations VPN Data Storage Data loss Two-factor Authentication Blockchain Samsung Cooperation Proactive Access Control Flexibility Mobile Security Employees Virtual Private Network Printing Company Culture Remote Monitoring and Management RMM Chromebook Uninterrupted Power Supply The Internet of Things Outlook Mobility How To Twitter Health Upgrades Remote Workers Gadgets Computers Software as a Service Social Assessment Machine Learning Big Data Remote Computing Electronic Medical Records Settings Patch Management Unified Communications How To Customer Service Miscellaneous Redundancy Management Smart Technology Network Management Monitors Net Neutrality HIPAA Computing Server Management Digital Payment Alert Identity Theft Internet Exlporer Networking IoT Licensing Mobile Test Websites Humor Managed IT Service Cookies Cyberattacks Voice over Internet Protocol Cache Disaster Augmented Reality Cortana Data Breach Social Networking Managed Services Provider PowerPoint Black Market End of Support Specifications Software Tips Wireless Technology 5G Computer Repair Crowdsourcing Google Drive Solid State Drives Mirgation High-Speed Internet Employee-Employer Relationship Procurement WiFi VoIP Tech Support Education Permissions Star Wars Meetings OneDrive Notifications Firefox Staff IBM Botnet Statistics Office Tips SharePoint Break Fix Nanotechnology Read Only Windows 7 Apple Safety Hotspot Recycling Wires Zero-Day Threat Sports Technology Laws Black Friday Motherboard Point of Sale Professional Services Hacker Physical Security Mail Merge Avoiding Downtime Options Techology Migration Development Security Cameras GPS YouTube Business Growth Shortcut Fraud Utility Computing Instant Messaging Manufacturing Lenovo Operations Managing Stress WPA3 Operating System Bluetooth Downloads Dark Web Screen Reader Transportation Google Maps Language eWaste Backup and Disaster Recovery Travel Telephony Heating/Cooling Unified Threat Management Unsupported Software Cyber Monday Mobile Computing E-Commerce Virtual Assistant Supercomputer Address Hard Disk Drives Content Filtering History Time Management Wireless Internet Disaster Resistance 3D Printing Chatbots Cables Remote Worker Tracking Users Automobile Display Technology Tips Finance Consultation Superfish Wearable Technology Enterprise Content Management Fleet Tracking Tech Terms Corporate Profile Emoji Dark Data Multi-Factor Security Data Warehousing Smart Tech Bookmarks Social Engineering Computing Infrastructure Human Error Solid State Drive Servers User Error Mobile Data Features Wasting Time IT Budget IT Solutions Processors Authentication G Suite Cabling Legal Law Enforcement Proactive IT Identity Monitoring ROI Digital USB Mouse Cost Management Personal Information Vulnerabilities Asset Tracking Theft Computer Care WannaCry Spam Private Cloud Hacking Google Calendar Microsoft Excel Connectivity Favorites Teamwork Downtime Search Alerts Enterprise Resource Planning MSP Permission Taxes Hard Disk Drive Update Printer Distributed Denial of Service Modem Electronic Health Records Database Authorization Gadget Touchscreen IT Consulting Consulting Notes Spyware Comparison Hard Drive Virus IT Technicians Geography OneNote Financial Trending Network Congestion Legislation Conferencing Shared resources Emergency IT Consultant Lithium-ion battery CrashOverride Mobile Device Managment Public Cloud Administrator Cybercrime Marketing Hiring/Firing Budget Hacks Information Technology Printers Competition IP Address Fun Cleaning Relocation Students Regulation Motion Sickness Mobile Office Domains Hard Drives Public Speaking Presentation Staffing Error Sync