Get Started Today!  321-259-5500

croom new

Tip of the Week: Understanding Bandwidth

Tip of the Week: Understanding Bandwidth

I have a question for you: when did you last examine the bandwidth that your business Internet package provides you? This is a very important consideration to make, for the sake of your productivity. This week, we’ll offer a few tips on how the proper bandwidth can help you get much more out of your IT solutions.

What is Bandwidth?

On a very basic level, bandwidth is simply how quickly you can download content from the Internet, measured in megabits per second, or Mbps. The higher the bandwidth, the faster these downloads will run.

Think about it like this: you’re trying to move water from one bucket to another. You have two tools you can use to do so, a fire hose, or a straw. Which connection will move the water more quickly?

If you answered the hose, you understand how bandwidth works. Just like the fire hose can move more water than a straw can, a larger bandwidth can move more megabits in the same amount of time. Some high-speed connections can even be measured in Gigabits per second.

How Does Bandwidth Translate to Download Speed?

Calculating your projected download speed is fairly simple, as long as you keep in mind that there are 8 bits for every byte. This means that, if you were trying to download 8 megabytes of data on a 1 Mbps connection, it would take approximately 1 second. 512 megabytes would take just over a minute to download on the same connection.

How Do I Know What My Business Needs?

In order to accurately estimate your business’ required bandwidth, a little more math is in order. While other factors, like connection reliability, should also be considered, your approximate bandwidth needs are relatively simple to calculate.

First, you will need to have the estimated traffic that each of your processes take up, as well as the total users that are likely to be engaged in that process. You will want to assume that this is during peak operations, so you don’t inadvertently short-change your business. Naturally, the bandwidth required by different processes will vary, but the following is generally the case:

100Kbps and Under - Low-end, single-line VoIP phones and e-fax machines. Some basic-use computers and laptops may utilize under 100 Kbps, but this isn’t often the case in businesses.

100Kbps to 500Kbps - It is much more common for computers and laptops to fall within this range, as they are more often used for streaming and downloading, emailing, and more rigorous browsing.

500Kbps to 2.0Mbps - If your business utilizes cloud solutions and (standard definition) video conferencing, you’re likely taking up this much bandwidth. This is commonly the range that Enterprise Resource Planning solutions, Customer Resource Management platforms, and Point of Sale devices will bring your bandwidth to as well.

2.0Mbps and Up - This bandwidth is usually called for by a high-definition conferencing solution, a lot of remote access, heavy cloud access, and more.

Now, still keeping peak activities in mind, add up what your staff is likely to need. Let’s say you have a total of 10 users in your business, including yourself. Let’s also say that you’re always on your email, corresponding with your business contacts and using 450Kbps. Six of your employees are engaged with the CRM solution they utilize, each using 2.0Mbps, and the last three are involved in a high-def video conference, each leveraging 2.5Mbps.

Totaling these use cases up, your business can expect to use almost 20Mbps at heaviest use - although it may make the most sense to assume everyone was attending a video conference, totaling 25Mbps, just to be safe.

What other tips would you like us to share? Let us know by leaving a comment, and make sure you subscribe so you don’t miss it!

Analytics Can Fool You
ALERT: Over a Million Asus Laptops Could Have Been...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!


Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Computing Business Internet Email Hosted Solutions Productivity IT Services Computer Data Backup Network Security Productivity Mobile Devices Hardware Microsoft Software Google Efficiency Managed Service Provider Workplace Tips User Tips Ransomware Tech Term Windows 10 Smartphone Android Server Innovation Business Continuity Disaster Recovery Small Business Cloud Computing Data Management IT Support Communication Social Media Business Management Smartphones Upgrade Encryption IT Support Network Phishing App Managed IT Services Browser Data Backup Windows Artificial Intelligence Data Recovery Office 365 BYOD Facebook Outsourced IT Gmail Office Windows 10 Apps Big Data Internet of Things Passwords Employer-Employee Relationship Paperless Office Vendor Management Collaboration Managed IT Services WiFi Microsoft Office Save Money Holiday Remote Monitoring Government Hosted Solution Mobile Device Management VoIP Cybersecurity communications Recovery Wireless Vulnerability Robot Wi-Fi Saving Money Risk Management Miscellaneous Two-factor Authentication Chrome Office Tips Spam Firewall Wireless Technology Alert Analytics IT solutions Website Hacker Document Management Automation IT Management Content Filtering Customer Service Bandwidth Quick Tips Social Infrastructure VPN Antivirus How To Tip of the week Money Password Word Settings Virtualization Budget Scam Managed Service Work/Life Balance Avoiding Downtime Remote Computing Machine Learning Customer Relationship Management Compliance Tablet Applications Business Technology BDR Data storage Virtual Reality IT service Apple Going Green Hard Drives Politics Legal Education SaaS Maintenance Bring Your Own Device Mobile Device Twitter Tech Support Cybercrime The Internet of Things Blockchain Computing Information Storage Healthcare Downtime Unified Threat Management Hacking Networking Cortana Data loss Business Owner YouTube Competition Users Samsung Data Security Unified Communications User Business Intelligence Computer Care Regulations Mobile Security Best Practice Virtual Private Network Identity Theft Management eWaste Computers Solid State Drive Running Cable Training User Error Private Cloud Search File Sharing LiFi End of Support Outlook G Suite Sports Heating/Cooling Health Point of Sale Printing Upgrades Websites Telephone Systems Administration Taxes Safety Mouse Operating System Electronic Medical Records Presentation Router Physical Security Net Neutrality Botnet Augmented Reality Automobile Chromebook IBM How To Server Management Google Drive Patch Management Network Management Cost Management Access Control HIPAA Lithium-ion battery Monitors Virtual Desktop Trending IoT Favorites Unsupported Software Application Fun Alerts Administrator ROI Dark Data Emoji Database Statistics Distributed Denial of Service Cleaning Firefox Law Enforcement Fraud Vulnerabilities RMM Google Docs Help Desk Comparison CCTV Halloween Typing Cookies Electronic Health Records Title II Touchscreen Google Wallet Recycling Remote Monitoring and Management Entrepreneur Backups Personal Information SharePoint Meetings Identities Consulting CIO Current Events Star Wars Instant Messaging Mobile Data Relocation Licensing Cabling OneNote Notes Voice over Internet Protocol Bluetooth Managed IT Service Gadget Law Development Tech Terms Specifications Social Networking Digital Scary Stories Cryptocurrency Nanotechnology Files IP Address Online Drones Zero-Day Threat Computer Repair Undo Downloads IT Technicians Webcam Mobile Computing Managed Services Provider Writing Notifications Assessment Finance Techology Cooperation Knowledge Employee-Employer Relationship PowerPoint Black Market Windows 7 Break Fix 5G Lenovo Hotspot Google Maps Cables Theft Public Speaking Black Friday Spyware Bitcoin Screen Reader Read Only Crowdsourcing Mobile Office Mail Merge Microsoft Excel Supercomputer Company Culture Human Error Environment Multi-Factor Security Mirgation Motherboard E-Commerce Retail Staffing VoIP Internet Exlporer Authentication Refrigeration Unified Threat Management Staff Travel Disaster Experience Remote Workers Professional Services Network Congestion Dark Web Smart Tech Printers Superfish Language Error Wires Financial Humor Update Cyber Monday Windows 8 Social Engineering Address IT Budget Servers Managing Stress Permission Google Calendar Chatbots Web Server Corporate Profile Business Growth Features Analyitcs GPS Time Management Hard Drive Authorization Printer Wearable Technology Motion Sickness Uninterrupted Power Supply Deep Learning Wasting Time iPhone Display Processors Shortcut Hacks Connectivity Bookmarks 3D Printing Computing Infrastructure Hiring/Firing Security Cameras Smart Technology IT Consultant Buisness Permissions Digital Payment Co-managed IT Save Time Enterprise Content Management Test Troubleshooting Managed IT Legislation Identity Cameras WannaCry Laptop Alt Codes Modem Marketing FCC Tracking Information Technology Cache Employees Hard Disk Drive Monitoring Gadgets Regulation Emergency USB Domains Flexibility Students CrashOverride Teamwork Shared resources

      Latest Blog Entry

      If your business is one that depends on transportation, you know that coordination is extremely important. With consumers’ reliance on a company’s distribution arm, today’s companies are turning old practices on their heads and utilizing a more technology-driven approach to ...

      Account Login