StifleR
2.10
2.10
  • Start Here - StifleR 2.10
  • Introduction
    • StifleR Overview
      • The StifleR Solution
      • Managing Microsoft Data Transfer Services
    • Technical Overview
      • 2Pint BranchCache Administrator Guide
    • Features Overview
      • Control
      • Monitor
      • Automate
      • Other Features
      • StifleR Feature Details
    • Release Notes
  • Proof of Concept
    • Objectives and Prerequisites
    • Configure Microsoft Peer-to-Peer Components
    • Install and Configure StifleR
    • Testing and Validation
    • StifleR POC Quick Checklist
  • Planning
    • StifleR Server Considerations
    • StifleR Client Considerations
    • Firewall Ports
    • Permissions
    • Antivirus Exclusions
    • Network Topology
    • StifleR Generic Concepts
      • Client Leader Roles
        • Red Leader
        • Blue Leader
        • Green Leader
        • Examples of Leader Selection
      • Templates
      • Beacons
  • Installation
    • Overview
    • Server
      • StifleR Server Installation
      • StifleR Dashboard Installation
      • StifleR Beacon Installation
    • Client
      • StifleR Client Installation
      • Post Installation Checks
  • Configuration
    • Configuration Files
      • StifleR Server Configuration File
        • Using the AppSettings Override File
      • StifleR Client Configuration File
      • StifleR Dashboard Configuration File
    • Configuring BranchCache on Windows Server
    • Configuring Delivery Optimization
    • Configuring LEDBAT on CM DPs
    • Configuring a Beacon Server
    • Configuring StifleR SQL History
    • StifleR Network Locations
      • Automatic linking of Location, Network Groups and Networks
      • Network Topology Automation
      • Location Fields
        • Network Group Fields
          • Network Fields
    • StifleRulez.xml Configuration Guide
      • The Match – TypeData
        • When the Job Title Isn’t Suitable
        • ConfigMgr Specific Rules
      • The Setting - DownloadTypes
        • Delivery Optimization Jobs
      • Sample StifleRulez.xml
    • Securing StifleR Operations with SSL
      • Prerequisites
      • Using a Web Server Certificate
        • Requesting a Web Server Certificate
      • Using a Self-Signed Certificate
      • Preparing the StifleR Dashboard Web Site for SSL
      • Configuring StifleR to Use SSL
      • Finding the Certificate Thumbprint
    • StifleR Client Access Control Options
  • Operations
    • Dashboard
      • Overview & Navigation
        • Home Page
        • Traffic & Downloads
          • Transfers & Downloads
            • How to use query hosts search?
          • Running Sequences
          • Weekly Downloads Activity
          • History
        • Devices
          • Clients
            • Client Details
              • How to use an extended search?
          • Servers
          • StifleR Server
            • Templates Detail
        • Cache Management
        • System Resource Usage
        • Network Topology
          • Maps
          • Countries
          • Locations
            • Bandwidth Allocations and Locations
          • Network Groups
          • Networks
        • Reporting & Diagrams
    • Client Management & Remote Tools
      • Remote PowerShell Session
      • Remote Performance Counter
      • Remote WMI Browsing
      • Remote Event Log Viewer
      • Remote Netmon Session
    • Monitoring
      • StifleR server health
      • StifleR client health
      • BranchCache Testing and Monitoring
    • Maintenance tasks
    • Bandwidth Management and Allocation
      • Bandwidth Tuning Monitoring and Control
    • Backup and Recovery
      • Moving the StifleR Server Databases to a New Drive on the Same Server
    • Troubleshooting
      • StifleR Client Command Line Options
      • BranchCache across Subnets
    • StifleR WMI Provider
Powered by GitBook
On this page
  • When are new locations added automatically?
  • How long does it take before a location is created?
  • Special VPN handling
  • How Bandwidth is Allocated
  • Non linked locations
  • Linked locations
  • Latency throttling
  • Well Connected locations
  • Internet Breakout Locations
  • VPN networks
  1. Operations
  2. Dashboard
  3. Overview & Navigation
  4. Network Topology
  5. Locations

Bandwidth Allocations and Locations

When are new locations added automatically?

If any of the following statements are true, a location is automatically created:

  1. If the network is considered “Managed” by Windows

  2. If the client is a VPN client

  3. If the DomainType is "DomainAuthenticated"

  4. If the Category of the connection is "DomainAuthenticated"

  5. If the list of AcceptableNetworkNames contains the network (connection) name

  6. If the location is generated from iPXE

How long does it take before a location is created?

It can take up to several seconds before the new location is created. The process that handles this generates requests in parallel. Only one request is fired per network per time that the server is active. The tried list is stored in memory and is only active until the service restarts.

Any client (including the first one) that connected during the few seconds when there was no network will go into roaming until the internal location polling cycle runs. This runs at a 15 min interval on each client.

Special VPN handling

For VPNs, the same logic as regular networks applies to the most part. However, some VPN connections will report in the network as a 32 bit address mask. When this is the case, we apply a C mask to the IP to generate the network. If a machine with IP of 172.176.12.23 with a mask of 255.255.255.255, the calculated network id of that is the same as the client address. In order to avoid having a large amounts of single VPN locations, we apply a 24 bit(C) class mask to the IP and recalculate it.

Examples:

Client A reports in with 172.176.12.23 with a mask of 32 bit, we then apply a 24 bit mask so that the network ID and generated subnet will be 172.176.12.0. Any other machine that will connect in using an IP that falls within the 24bit range will be added to the subnet. If however a machine of 172.176.13.12 calls in, it will be placed in the 172.176.13.0 subnet.

Note: This logic is purely for grouping within StifleR itself and does not affect any routing or configuration. So even if the DHCP scope is generated with a 8 bit or 16 bit mask, the subnets will be grouped into 24bit mask segments.

How Bandwidth is Allocated

Non linked locations

The TargetBandwitdh is assigned to Red Leaders, other clients get the default non leader values.

Linked locations

When multiple locations are linked, the Parent bandwidth is split between the Red Leader per active subnet.

Latency throttling

Well Connected locations

<add key="WellConnectedSplitbandwidth" value="1" />on the server - determines the W/C behaviour.

If "WellConnectedSplitbandwidth" value="0" - All active clients get the same Bandwidth i.e the value assigned to WellConnectedBITSBandwidth / WellConnectedDOBandwidth (this value will be injected into the client config file)

If "WellConnectedSplitbandwidth" value="1" - the WellConnectedBITSBandwidth / WellConnectedDOBandwidth values will be split between all ACTIVE clients. If only the TargetBandwidth is set – the Red Leader will be allocated that bandwidth and all others will use the Befault Non-Red Leader bandwidth (as per a regular subnet)

Internet Breakout Locations

Internet traffic is then throttled differently, and is split per

VPN networks

For VPN networks the bandwidth is assigned the following way if both the client reports in as VPN as well as the location being set to VPN. If the client fails to detect itself as VPN it will not be getting the VPN settings but instead being considered managed, i.e. given very low bandwidth.

If the TargetBandwidth is set to zero, unlimited bandwidth is assigned to the clients, consider it reporting only mode.

VPN subnet is not linked with others

The bandwidth is assigned per number of number of active clients downloading with the logic of bandwidth / n + 1. So if a TargetBandwidth of 24Mbs is set, and we have 10 clients downloading the bandwidth is split between 10 + 1 = 2.18Mb/s per client. If this then changes over time to 2 active the assigned bandwidth goes up to 24 / 2 +1 = 8 Mbs per client.

Linked VPN networks

When multiple VPN subnets are linked together, the assigned bandwidth is split per active VPN subnets and then split per active clients within its subnet.

Example: If 100Mbs is set on the parent subnet, and you have 3 active child subnets, giving 4 active subnets with the parent, the bandwidth is then first split into (4, 100/4 = 25Mbs). The split value is then split per the number of active clients within that subgroup. So if one location has 10 active clients, they get 25Mbs/ 10 + 1 = 2.18 Mbs. If only a single subnet has VPN clients, the bandwidth will be allocated to a single VPN

When are these calculations done?

The calculations are done at the same time for all bandwidth assignment, which is at connection time, and then at a rolling 5 minute interval per VPN client. (For non VPN connections the bandwidth is allocated every 15 min).

PreviousLocationsNextNetwork Groups

Last updated 7 months ago