Skip to main content

Find Out Who’s Eating Your Bandwidth With These Tips

Click….wait. Click….wait. Click….ARG! Sound familiar? That’s the sound of someone running out of Internet bandwidth.
A lot of things can drain away the capacity of that pipe that connects your computer to the Internet. It could be other people or devices on your network, or it could even be malicious applications or services running on the PC itself. The problem can get so bad that some people will toss out their computer and buy a new one.
It doesn’t have to be that way. While the problem could be coming from anywhere, it isn’t impossible to troubleshoot if you know where to look, what tools to use, and what to do when you find the culprit. In this article, I’m going to give you a hand and walk you through the process of tracking down that bandwidth hog and shutting him down.

Track Down The Bandwidth Bandit Via Your Router

You could start just about anywhere when it comes to isolating the bandwidth hog on your network or inside your computer, but in order to grab at the low-hanging fruit, it’s best to start with your network. A few of the solutions below can focus in on a culprit quickly and resolve your problems immediately. So why waste time troubleshooting your own computer before canceling out the external issues as a possibility?
The first and quickest way to check what’s connected to your Internet through your router is the DHCP Client table. Each router is a little different, so you may need to search for which menu the table comes under. For Linksys, it’s typically under the “Status” Tab, and then the “Local Network” menu item.
stolen-bandwidth1
Next, just click the “DHCP Client Table” button, and that’ll take you to a list of all clients that are currently logged into your network. Are there any there that you don’t recognize? If so, there could potentially be a neighbor that’s drawing out much of your bandwidth.
stolen-bandwidth2
All you have to do to put an end to it is click on the “Delete” button to the right of that client. Just be careful not to inadvertently delete one of your own clients, because to reconnect to the network with that device, you may need to re-enter your security password again. Not a big deal, just a hassle.

Use Third Party Utilities To Unravel Bandwidth Problems

Another option is to turn to software tools that can reach out and monitor devices on your network. One of those utilities is a free app called Capsa, which Matt actually mentioned in his Guide to Home Networking.
Capsa is really impressive, and it’s hard to believe that it’s free software. Running Capsa, you can see traffic on your network and associated data transfer rates to and from the various hosts, which you can find under the “Protocol” tab once you press “Start” on the main welcome screen.
stolen-bandwidth3
This is even better organized on the IP Endpoint tab, which lines up all of the hosts in one area and then in the lower pane, shows you all of the remote IP connections of the host you selected in the top pane. By the way, this is a great way to check out what your kids are up to on your network without actually installing monitoring software on their computer.
stolen-bandwidth4
Capsa is by far my favorite. This is similar to using another bandwidth monitoring app I covered recently called NetworkMiner, except that Capsa is less about network hacking and packet sniffing, and more about monitoring your network for activities and different traffic protocols. Either application would serve you well, though.

Find Malware Or Software That Is Dogging Down Your Internet

The other possibility is that it isn’t anything on your network at all that’s causing the bandwidth crunch, but instead something running right inside of your PC itself. Old computers are notorious for getting infected with little applications called “bots” that quietly run in the background, connect to some remote server, and silently send out spam emails to hundreds or thousands of email addresses a day. That’s just one example. Malicious software can consume your bandwidth in many different ways.
The way to identify those issues is by reviewing all of your network connections and identifying any that look unusual. You can do this by clicking Start -> Run and typing “CMD” and pressing Enter. When you get the command window up, type “netstat -o”.
stolen-bandwidth5
This shows all open network connections on your computer. Depending on what you have open, this list can take a while to finish, and could scroll off the screen, so you might even append a “>>network.log” to the end of the command to log it to a text file.
Keep an eye on any strange http or IP addresses in the third column, and note the PID for those from the list. To identify that application, open up Task Manager (start->run->”TaskMgr”) and go to the services tab.
stolen-bandwidth6
Locate the PID on the list to find the problem child. If you see any PID value that has lots of open network connections and it’s related to a service you don’t recognize or that you didn’t realize was running on your computer, stop the service and see what happens to your Internet performance. This is a good way to stumble upon a bandwidth hog with just a little bit of work.
By the way, if you didn’t know, you can also see the PID values of each process running on your computer by going into the Processes tab, clicking the “View” menu item, select columns, and check off the box for PID.
stolen-bandwidth7
You’re bound to find the culprit between services and processes that have open network connections!

Hone In On The Culprit With The Windows Resource Monitor

In fact, while you’re in the Task Manager, to get to another bandwidth troubleshooting tool, click on the “Performance” tab, and then click on the “Resource Monitor” button at the bottom.
stolen-bandwidth8
The resource monitor is one of the most powerful tools available in your network troubleshooting arsenal, in my opinion.
stolen-bandwidth9
Just one quick glance at the send/receive bandwidth values under the Network panel shows me that Kaspersky is really the biggest bandwidth consumer at the moment, followed closely by Chrome. This could indicate that the antivirus software is performing a database update. What you shouldn’t see at the top of the list is some executable file that you’ve never heard of.

Read More

Popular posts from this blog

How To Hide Text In Microsoft Word 2007, Reveal It & Protect It

Sometimes what we hide is more important than what we reveal. Especially, documents with sensitive information, some things are supposed to be ‘for some eyes only’. Such scenarios are quite common, even for the more un-secretive among us. You want to show someone a letter composed in MS Word, but want to keep some of the content private; or it’s an official letter with some part of it having critical data. As important as these two are, the most common use could involve a normal printing job. Many a time we have to print different versions of a document, one copy for one set of eyes and others for other sets. Rather than creating multiple copies and therefore multiple printing jobs, what if we could just do it from the same document?  That too, without the hassle of repeated cut and paste. We can, with a simple feature in MS Word – it’s just called Hidden and let me show you how to use it to hide text in Microsoft Word 2007. It’s a simple single click process. Open the document

Clip & Convert Your Video Faster With Quicktime X & The New Handbrake 64-bit [Mac]

Recently a friend of mine asked for my help to find a video of a good presentation to be shown to one of his classes. He also requested for it to be iPod friendly as he would also distribute the video to his students. Three things came to my mind: Steve Jobs, Quicktime and Handbrake . Mr. Jobs is well known for his great presentations which are often used as references. I have several Apple Keynotes videos. For my friend, I decided to choose the one that introduced MacBook Air – the one that never fails to deliver the wow effect to the non-techie audience. It’s a part of January 2008 Macworld Keynote. First step: The Cutting To get only a specific part of the Keynote, I clipped the 1+ hour video into about 20 minutes using Quicktime X (which comes with Snow Leopard). I opened the movie using Quicktime X and chose Trim from the Edit menu ( Command + T ). Then I chose the start and end of my clip by moving both edges of the trimming bar to the desired position. To increase th

Ex-Skypers Launch Virtual Whiteboard Deekit

Although seriously long in the tooth and being disrupted by a plethora of startups, for many years Skype has existed as an almost ubiquitous app in any remote team’s toolkit. So it seems apt that a new startup founded by a team of ex-Skype employees is set to tackle another aspect of online collaboration. Deekit, which exits private beta today, is a virtual and collaborative whiteboard to help remote teams work smarter. The Tallinn, Estonia-based startup is headed up by founder and CEO, Kaili Kleemeier, who was previously a Head of Operations at Skype. She and three colleagues quit the Internet calling giant in 2012 and spent a year researching ideas in the remote team space. They ended up focusing on creating a new virtual whiteboard, born out of Kleemeier’s experience collaborating with technical teams remotely, specifically helping Skype deal with incident management. “Working with remote teams has been a challenge in many ways – cultural differences, language differences, a