How is bandwidth monitoring different from other types of network monitoring?
Bandwidth monitoring plays a special role in overall network administration. Using bandwidth monitoring tools, administrators assess issues related to internal network traffic and bandwidth usage.
One way that bandwidth monitoring works for administrators is that it may help them look at compliance with bandwidth limits imposed by an internet service provider (ISP) or other vendor. When network bandwidth usage goes beyond these limits, it may trigger all sorts of fees and costs. Administrators use bandwidth monitoring to ensure that usage stays within the right boundaries.
In general, bandwidth monitoring can help administrators find internal sources of traffic disruption. If a network is moving slowly, not because of improper setup or malfunctioning equipment, but because of a huge bandwidth draw somewhere in the network, bandwidth monitoring can help identify the problem. IT professionals refer to this as "finding bandwidth hogs."
Other types of network monitoring focus more on other kinds of problems or bottlenecks that may affect network performance. Some of them help with finding malfunctioning equipment or other hardware and software problems within the network, while others look at intrusions from outside the network, security vulnerabilities and other potential problems.
Tags
Written by Justin Stoltzfus | Contributor, Reviewer

Justin Stoltzfus is a freelance writer for various Web and print publications. His work has appeared in online magazines including Preservation Online, a project of the National Historic Trust, and many other venues.
More Q&As from our experts
- What is the difference between little endian and big endian?
- How can unstructured data benefit your business's bottom line?
- What are some of the dangers of using machine learning impulsively without a business plan?
Related Terms
- Bandwidth
- Bandwidth Monitor
- Bandwidth Hog
- Network Monitoring
- Network Traffic
- Distributed Computing System
- Active Directory
- Hacking Tool
- Geotagging
- Discretionary Access Control
Related Articles

INFOGRAPHIC: Why It Sucks to Be the IT Guy

Top 3 Reasons to Use Remote Management Software
Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
- The CIO Guide to Information Security
- Robotic Process Automation: What You Need to Know
- Data Governance Is Everyone's Business
- Key Applications for AI in the Supply Chain
- Service Mesh for Mere Mortals - Free 100+ page eBook
- Do You Need a Head of Remote?
- Web Data Collection in 2022 - Everything you need to know