Transforming Networks with Digi Remote Manager

In the ever-evolving landscape of network management, Digi Remote Manager (Digi RM) stands out as a transformative technology platform that takes networks to the next level, enabling smarter operations for both networks and the individuals tasked with managing them. By seamlessly bringing together a myriad of dispersed Internet of Things (IoT) devices, Digi RM evolves them into a dynamic, intelligent network. 

Features of Digi Remote Manager

1. Effortless Device Management

Digi RM simplifies the configuration, deployment, monitoring, and management of hundreds or even thousands of mission-critical devices from a single point of command. The platform’s exclusive drag-and-drop grouping technology facilitates the auto-assimilation, updating, and deployment of devices with ease.

2. Insightful Dashboard and Reporting

The flexible Digi RM dashboard allows users to customize and position crucial information as needed. Pre-built reports with critical device health metrics can be tailored to include specific data, and alerts can be configured for specified conditions. This allows for a deeper understanding of network performance and facilitates informed decision-making.

3. Security and Compliance

Digi RM ensures an always-on, always-secure network with software-defined protection. It automatically scans and fixes any out-of-compliance device configurations in the group, maintaining the integrity of the network and alerting administrators if key settings deviate.

4. Cloud Integration

Digi RM provides pre-configured APIs that streamline the access, connection, and analysis of data collected from devices. Cloud connectors enable seamless integration with third-party analytics and visualization dashboard applications. For custom integrations, the platform offers a rich web service API.

5. Digi Containers

Digi Containers, an add-on service to Digi Remote Manager, simplifies the deployment of custom applications via containers. These containers streamline the process of building, deploying, and running custom applications on devices managed with Digi RM. Lightweight Linux Containers (LXC) tools enable developers to package custom applications, complete with dependencies, into a portable bundle.

6. WAN Bonding

Digi WAN Bonding combines multiple connections into a resilient connectivity solution, ensuring optimal performance and maximum uptime globally. Features such as Digi SureLink®, policy-based routing, and interface bonding prevent external network failures from causing downtime, providing a robust and reliable network connection.

7. Mobile VPN

Digi Mobile VPN offers a secure connection between data centers and Digi routers, including connected edge devices. Orchestrated through Digi Remote Manager, this service provides persistent, secure connectivity—a crucial feature for applications in public sectors, emergency response, and mass transit.

8. Digi Remote Manager Mobile App

The Digi RM mobile app enhances user convenience by enabling device registration via QR codes. The Configuration Manager feature allows for the automatic application of custom configurations. Users can monitor the overall health of their network and individual device statuses through the app.

5Gstore’s Utilization of Digi Remote Manager

5Gstore harnesses the power of Digi Remote Manager across various aspects of network management.

  • Configuration Management
    • 5Gstore utilizes Digi RM’s Configuration Manager for both individual devices and bulk configurations, streamlining the process of setting up and managing devices across the network.
  • Firmware Management
    • Digi RM facilitates firmware management for 5Gstore, allowing them to update firmware on individual devices or in bulk, ensuring that all devices are running the latest and most secure versions.
  • Monitoring Data Usage
    • Leveraging Digi IntelliFlow, a key feature of Digi Remote Manager, 5Gstore actively monitors data usage via alarms and network traffic visualization tools. This provides actionable insights into the network’s application data, focusing on the top 10 users or destinations.
  • WAN Bonding for Network Redundancy
    • 5Gstore employs Digi WAN Bonding to achieve resilient connectivity and maximum performance across multiple connections. This ensures that our employees’ networks remain robust and operational even in the face of connection failures.

In conclusion, Digi Remote Manager serves as a cornerstone in modern network management, empowering organizations like 5Gstore to achieve efficiency, security, and resilience in their networks. As technology continues to advance, Digi RM remains at the forefront, providing a comprehensive solution for managing the complexities of IoT devices and ensuring the seamless operation of intelligent networks.

How Can Digi WAN Bonding Help Me?

Digi WAN Bonding is a solution that goes beyond traditional failover strategies. This value-added service, accessible through Digi Remote Manager®, introduces a technique that optimizes connectivity by aggregating multiple connections, ensuring enhanced speed, reduced latency, and improved reliability. This blog explores the intricacies of Digi WAN Bonding, shedding light on how it works and its diverse applications across various industries.

Understanding Digi WAN Bonding

Digi WAN Bonding leverages the power of Bondix Simple Aggregation of Networks (S.A.NE), comprising two programs — one embedded in the Digi device and another on an external virtual private server (VPS). The client program intelligently divides outgoing traffic based on factors such as latency, consistency, and user-assigned priorities. The VPS then reconstitutes and forwards the divided traffic, ensuring optimal performance by considering the strengths of each interface.

Key Features:

  1. Hot failover: Ensures uninterrupted connectivity with no packet loss or failover wait time.
  2. WAN aggregation: Combines multiple WAN links to increase speed and bandwidth, reaching up to 1 Gbps.
  3. WAN smoothing: Minimizes latency and jitter by simultaneously sending data through multiple channels.
  4. WAN prioritization: Automatically selects or allows manual setting of the best active WAN link, balancing traffic accordingly.
  5. Packet duplication: Replicates packets on multiple WAN links to guarantee the delivery of mission-critical data.
  6. Simple integration: Easy deployment on a range of Digi routers in diverse environments via Digi Remote Manager.
  7. Increased throughput: Offers subscription options for 100 Mbps, 200 Mbps, and 1 Gbps maximum throughput.

WAN Bonding Modes

Digi WAN Bonding provides various modes, including automatic, cellular-optimized for speed or latency, Ethernet, low latency, and TCP mode, catering to different network requirements and scenarios. But what do these mean exactly?

  • Automatic: Automatically sets the mode to Cellular Optimized for Speed-mode for cellular, and Ethernet for non-cellular. This is the default mode.
  • Cellular Optimized for Speed: A general-purpose configuration suitable for most lines (4G, DSL, etc.), with a fair tolerance for packet loss and latency.
  • Cellular Optimized for Latency: Another preset for mobile connections with an even higher focus on reducing latency.
  • Ethernet: A preset for direct Ethernet connections, very sensitive to latency and packet loss.
  • Low Latency: Similar to Ethernet preset, but with higher tolerance for packet loss.
  • TCP Mode: Utilizes TCP instead of UDP. Higher throughput rate at the cost of latency. Useful in scenarios where UDP is throttled or blocked.

Components of Digi WAN Bonding

  1. WAN Bonding Client (Bondix S.A.NE client): Included in DAL OS firmware and enabled via Digi Remote Manager, it sets up a tunnel with the server, breaks down data traffic into packages, and ensures the best-possible performance with a built-in bonding proxy.
  2. WAN Bonding Tunnel: The logical connection that bonds multiple WAN links, transporting data packages and offering multiple methods for sending traffic, such as WAN priority, WAN smoothing, and packet redundancy.
  3. WAN Bonding Server: Acts as the endpoint for the tunnel, can be hosted on a Linux VM or cloud infrastructure without a license cost, and supports single and multi-instance servers for scalability.

WAN Bonding Applications and Benefits

Digi WAN Bonding is instrumental in scenarios requiring increased throughput or availability of remote applications. By utilizing multiple connections — whether fixed network or wireless — users can enhance bandwidth and uptime, effectively avoiding issues related to line failures or network problems. Here are just a few examples of some use cases for Digi WAN Bonding:

  1. Cellular Resiliency for Vehicles:
    In the realm of public transit, uptime is paramount for both passengers and operators. Consider the scenario of a Digi TX64 5G cellular router in a transit vehicle equipped with two cellular modems (WWAN1 and WWAN2) connected to different providers. While Digi Surelink® provides failover capability, Digi WAN Bonding intelligently balances the two cellular connections based on quality metrics. As one connection gradually degrades, it is used only when the most effective connection has been saturated. This ensures continuous, reliable connectivity during the vehicle’s journey.
  2. More Bandwidth in Office Environments:
    For an office user relying on a symmetric 100 Mbps copper line, large file transfers often lead to congestion and slowdowns in the network. Digi WAN Bonding transforms this scenario by combining the symmetric wired connection with an asymmetric cellular connection. This dynamic pairing significantly increases throughput without compromising the low latency of fiber, even under heavy loads. The result is a streamlined network experience, especially beneficial for remote workers requiring VPN access to the office network.
  3. Protecting Mission-Critical Data in Remote Locations:
    Digi WAN Bonding introduces packet duplication as a safeguard for mission-critical data in remote locations. By simultaneously sending packets through all available Internet connections and transmitting only the first packet received on either end of the bonded connection, this use case prioritizes data certainty over increased throughput. It ensures that data transmissions are delivered with 100% certainty, even in scenarios involving high-latency or intermittent connections.

Why Choose Digi WAN Bonding? 

Digi WAN Bonding, powered by Bondix S.A.NE, is a versatile and cost-effective solution for optimizing connectivity in diverse environments. Its robust features, simplified pricing, and seamless integration make it a compelling choice for businesses seeking enhanced speed, reliability, and resilience in their network infrastructure. Whether in transportation, retail, or other enterprise and industrial applications, Digi WAN Bonding paves the way for a future where connectivity is both efficient and steadfast.

Contact the 5Gstore team to learn more about Digi WAN Bonding today!

Benefits of IP Passthrough

In the complex world of internet configurations, users often grapple with challenges, especially when combining their Internet Service Provider’s (ISP) router, or a cellular router, with a personal router. Enter a common hurdle known as “double NAT,” which can cause disruptions in applications such as Voice over IP (VoIP) and VPNs. However, a solution exists: IP Passthrough mode. This article will delve into what IP Passthrough is, how it operates, and why it’s helpful for users seeking greater control over their network security, especially when using VoIP and VPNs.

IP Passthrough: What Is It?

IP Passthrough is a feature that allows a user’s personal router to bypass the ISP’s router and directly obtain the IP address from the Internet Service Provider. In simpler terms, it eliminates the double NAT scenario by enabling the user’s devices to communicate directly with the ISP’s network.

How Does IP Passthrough Work?

When IP Passthrough is enabled, the personal router takes on a more prominent role in the network setup. Instead of relying on the ISP’s router for assigning IP addresses, the user’s router directly interfaces with the ISP’s modem, receiving a unique IP address. This direct connection ensures that VoIP calls and VPN connections traverse the network with minimal interference, optimizing performance and reliability.

Why Choose IP Passthrough?

Enhanced Control Over Security

One of the compelling reasons users opt for IP Passthrough is the desire for greater control over their network security. In a typical setup where the ISP’s router manages security features, users may find themselves limited in terms of customization. IP Passthrough allows individuals to take charge of their security settings directly from their personal router. This means implementing specific firewall rules, setting up intrusion detection systems, and managing access controls according to their preferences. The result is a highly personalized and robust security infrastructure that aligns with individual needs and concerns.

Optimization for VoIP and VPN Applications

For users heavily reliant on applications like Voice over IP (VoIP) and Virtual Private Networks (VPNs), IP Passthrough offers a significant advantage. In a double NAT environment, these applications may encounter difficulties due to restricted access to specific ports. IP Passthrough eliminates these restrictions, creating a direct pathway for VoIP and VPN traffic. This optimization ensures that VoIP calls are crystal clear without interruptions, and VPN connections operate securely and swiftly. By allowing these applications to function at their best, IP Passthrough enhances the overall user experience for individuals and businesses alike.

Freedom from ISP Restrictions

By choosing IP Passthrough, users liberate themselves from the constraints imposed by their Internet Service Provider’s (ISP) router or firewall. In a traditional setup, the ISP’s equipment often comes with predefined settings and limitations that may not align with the user’s preferences. IP Passthrough enables users to break free from these constraints and set up their network according to their unique requirements. This includes configuring advanced networking features, managing Quality of Service (QoS) settings, and implementing specialized protocols that may be crucial for specific applications.

Efficient Resource Utilization

IP Passthrough contributes to more efficient resource utilization within the network. By eliminating the need for double NAT translation, it streamlines the data flow, reducing latency and optimizing bandwidth usage. This efficiency becomes particularly pronounced in scenarios where multiple devices and applications are concurrently accessing the network. Users benefit from a smoother and more responsive network environment, ensuring that every connected device enjoys optimal performance without unnecessary bottlenecks.

Future-Proofing the Network

We live in a time where technology is rapidly evolving and our reliance on internet-connected devices has increased. This raises the importance of future-proofing your network. IP Passthrough provides a flexible foundation that can adapt to changing needs and emerging technologies. Users can seamlessly integrate new devices, applications, and services without being hindered by the limitations of a double NAT setup. This adaptability ensures that the network remains robust and ready for the challenges of tomorrow’s digital landscape.

Setting Up IP Passthrough: A User-Friendly Process

Configuring IP Passthrough might sound intimidating, but most routers simplify the process through user-friendly interfaces. Users typically access their router’s settings, locate the IP Passthrough option, and enable it. For those unfamiliar with the setup, you may be able to reach out to the ISP’s customer support to receive assistance.

If you’re searching for instructions on setting up IP Passthrough on your cellular router, look no further than our YouTube videos below. These cover Digi, Inseego, Peplink, and Sierra Wireless devices.

Digi
Inseego
Peplink
Sierra Wireless

A Guide to Understanding VPN

Online privacy and security are of utmost concern these days. Virtual Private Networks (VPNs) have emerged as a popular solution for protecting internet users. But what exactly is a VPN, and how does it benefit users in various scenarios? This article looks at what VPNs are, highlights their advantages, and explores common use cases for the technology.

What is a VPN?

A VPN, or Virtual Private Network, is a technology that establishes a secure and encrypted connection over a public network, typically the internet. It allows users to access the internet as if they were connected to a private network, even while using a public or unsecured WiFi network. The VPN creates a secure tunnel between the user’s device and the VPN server, encrypting all data transmitted through the connection.

VPN Protocols

A VPN protocol is a set of rules and procedures used to establish and manage secure communication between devices over a VPN. It defines how data is encrypted, transmitted, and authenticated during the process of establishing a secure connection between the user’s device and the VPN server. Different VPN protocols offer varying levels of security, speed, and compatibility, allowing users to choose the one that best suits their needs.

VPN protocols determine how data packets are encapsulated and encrypted, ensuring that sensitive information remains protected from potential threats and eavesdroppers while traveling through the internet. The most commonly used VPN protocols include OpenVPN, IPSec, L2TP, PPTP, IKEv2, and SSTP, among others.

When a user connects to a VPN service, the client application on their device negotiates with the VPN server to select the most appropriate protocol for the connection. Factors considered during this negotiation include the level of security required, network environment, and the capabilities of the user’s device and operating system.

Each VPN protocol has its advantages and disadvantages. Some protocols, like OpenVPN, provide strong encryption and high security, making them ideal for privacy-conscious users. Others, such as PPTP, are known for their ease of setup and fast connection speeds but offer lower levels of security. The choice of VPN protocol depends on the user’s specific needs, whether it’s prioritizing security, speed, compatibility, or a combination of factors.

Benefits of VPN

  • Enhanced Security and Privacy: One of the primary benefits of using a VPN is the enhanced security and privacy it offers. By encrypting internet traffic, VPNs prevent hackers, cyber criminals, and even Internet Service Providers (ISPs) from monitoring or intercepting users’ online activities. This encryption ensures that sensitive information, such as passwords, credit card details, and personal communications, remains safe from prying eyes.
  • Anonymous Browsing: VPNs can also help users maintain anonymity while surfing the internet. By masking their IP address and routing their traffic through the VPN server, users can prevent websites, advertisers, and third parties from tracking their online behavior, providing a shield against invasive data collection.
  • Bypassing Geo-restrictions: VPNs enable users to access region-restricted content by connecting to servers in different countries. This capability allows users to enjoy streaming services, websites, and online resources that might be blocked or limited in their own region due to content licensing or government censorship.
  • Secure Remote Access: VPNs offer a secure method for remote workers to access their company’s private network and resources. This remote access ensures that employees can work from virtually anywhere while maintaining a high level of data security.
  • Protection on Public WiFi: Public WiFi networks are often unsecured, making them hotspots for hackers to exploit vulnerable connections. Using a VPN on public WiFi encrypts data, making it extremely difficult for hackers to intercept or steal sensitive information from unsuspecting users.

Typical Use Cases

VPNs serve a variety of practical purposes in the digital world. Businesses leverage VPNs to create secure communication channels for their offices and remote employees, ensuring the confidentiality of sensitive data and facilitating seamless collaboration across different locations. Additionally, users find value in VPNs for accessing region-specific content, such as streaming services and websites that are restricted in their home country. By connecting to servers in other countries, they can unlock a wider range of content. 

VPNs are also popular among individuals engaged in file sharing and torrenting, as these services allow users to maintain anonymity and safeguard their online identity during such activities. Lastly, privacy-conscious individuals rely on VPNs to protect their online privacy and prevent intrusive advertisers, data brokers, and other entities from tracking their internet behavior, resulting in reduced exposure to targeted ads.

Putting VPN to Use

Virtual Private Networks have become a crucial tool for internet users seeking to enhance their online security, protect their privacy, and access content unrestricted by geographic boundaries. With the numerous benefits they offer, VPNs have gained popularity in both personal and professional spheres. However, it is essential to choose a reputable and reliable VPN service provider to ensure the best performance and protection while enjoying the advantages of this valuable technology. Keep in mind that there are also routers that support VPN, meaning it can support your entire network of devices rather than having something running on each individual device.

For more information on routers with VPN compatibility, reach out to the 5Gstore team.

7 Tips for Ensuring a Secure Internet Connection

The internet has revolutionized the way we communicate, do business, and access information. However, the internet is also a hub of malicious activities, making it imperative to ensure a secure internet connection. Whether you are browsing the web, conducting online transactions, or accessing sensitive data, securing your internet connection is crucial. Let’s take a look at some of the ways we can help protect our connections. 

#1: Use a Virtual Private Network (VPN)

A Virtual Private Network (VPN) is an excellent tool to secure your internet connection. A VPN creates an encrypted tunnel between your device and the internet, making it difficult for anyone to intercept your data. This is particularly important when using public Wi-Fi, as these networks are often insecure and can be easily hacked.

When choosing a VPN, ensure that it uses strong encryption and has a no-logging policy. A no-logging policy means that the VPN provider does not store any of your internet activities, ensuring your privacy. Some popular VPN providers include ExpressVPN, NordVPN, and SurfShark.

#2: Keep your devices updated

Software updates are not just about new features and bug fixes; they also include security patches. Hackers are constantly looking for vulnerabilities in software to exploit. Thankfully, software updates often include security fixes that address these vulnerabilities. Keeping your devices updated ensures that you have the latest security patches, making it harder for hackers to exploit your devices.

Ensure that your operating system, antivirus software, and other applications are updated regularly. Most software updates can be set to automatic, making it easier to keep your devices updated.

#3: Use strong passwords and enable two-factor authentication

One of the most common ways hackers gain access to your online accounts is through weak passwords. A strong password should be at least eight characters long and include a mix of uppercase and lowercase letters, numbers, and special characters.

Using a different password for each account is also important, as it prevents hackers from gaining access to all your accounts if they manage to crack one password. Additionally, enabling two-factor authentication adds an extra layer of security by requiring a second verification method, such as a code sent to your phone, before allowing access to your account.

#4: Use a Firewall

A firewall is a security tool that monitors and controls incoming and outgoing network traffic. A firewall can help prevent unauthorized access to your computer by blocking incoming traffic from suspicious sources. Most operating systems come with a built-in firewall, but you can also install a third-party firewall for additional protection.

#5: Avoid suspicious websites and emails

Phishing attacks are a common way hackers use to gain access to your online accounts. Phishing emails often look legitimate, but they are designed to trick you into providing sensitive information, such as login credentials or credit card details. To avoid falling victim to phishing attacks, be cautious of emails that ask for sensitive information or come from unknown sources.

Similarly, malicious websites can also be used to steal your information or install malware on your device. Be cautious when clicking on links, and always verify that the website is legitimate before providing any sensitive information.

#6: Disable file sharing

File sharing is a convenient way to share files between devices, but it can also be a security risk. If file sharing is enabled on your device, anyone on the same network can access your files, including sensitive information. Ensure that file sharing is disabled when using public Wi-Fi or in any other situation where you do not trust the network.

#7: Use HTTPS

HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP, the protocol used to transfer data between your browser and websites. HTTPS encrypts your data and ensures that the website you are accessing is legitimate. You can check if a website uses HTTPS by looking for the padlock icon in the address bar. If the website uses HTTPS, you should see a padlock icon and the website address should start with “https://” instead of “http://”.

Using HTTPS ensures that your data is encrypted and secure, making it harder for hackers to intercept your data or manipulate the website you are accessing. It is particularly important when accessing sensitive information, such as online banking or making online purchases.

Maintaining Security on Your Network

In addition to the tips provided, utilizing a secure router is also advised as it adds another layer of protection. Most routers come with their own firewall as well as configuration settings that allow you to block certain devices from accessing your network. For example, you might set a configuration rule that blocks any device [from your network] that does not exist on a trusted list you’ve created. If any new devices need to connect, a secure guest network can be used rather than your primary network. Should you be in need of a secure router, just contact the team at 5Gstore and we’ll assist you in selecting the most appropriate solution based on your Internet connection(s), usage, and other requirements.  

How to Maximize Your Internet Connection Time: 9 Tips for Reliable Connectivity

From communication to work and entertainment, we rely heavily on the internet. But, what happens when the internet goes down? We can experience frustration, loss of productivity, and even financial losses. Maximizing internet uptime is essential, and here are some ways to achieve this.

Choose a Reliable Internet Service Provider (ISP)

One of the primary factors that affect internet uptime is the quality of your ISP. Not all ISPs are created equal, and some are more reliable than others. When choosing an ISP, consider their reputation, customer service, and the quality of their network. Look for an ISP with a proven track record of providing high uptime and fast internet speeds. If you’re looking to cellular Internet services providers (4G LTE/ 5G), also consider the coverage in your location and any other areas you may frequently visit. 

Use a Reliable Router

Your router is the device that connects your home or office network to the internet. Using a reliable router is crucial to ensure maximum uptime. Make sure your router is up to date and has the latest firmware installed. A router that is outdated or has an old firmware version can cause connection issues, leading to downtime. It’s also helpful to have a router that can support multiple Internet connections so that you can implement redundancy (more on this below).

Keep Your Equipment in Good Condition

Your internet equipment, including your router and modem, needs to be in good condition to ensure maximum uptime. Dust, heat, and other environmental factors can affect the performance of your equipment. Regularly clean your equipment, keep it in a cool and dry place, and replace any faulty parts as soon as possible.

Use Wired Connections Instead of WiFi

WiFi is convenient, but it is also more prone to interference and signal degradation than wired connections. Using a wired connection can help you achieve a more stable and reliable internet connection. If you have the option, consider using an Ethernet cable to connect your devices to your router.

Use a UPS (Uninterrupted Power Supply)

Power outages can cause internet downtime, especially if your ISP’s equipment and your router are affected. Using a UPS can help prevent this by providing backup power during power outages. A UPS can give you enough time to save your work and shut down your devices properly, preventing data loss.

Monitor Your Network

Monitoring your network can help you detect issues before they cause downtime. You can use network monitoring software to monitor your network and receive alerts when there are issues. This can help you take action quickly and prevent prolonged downtime.

Use Cloud-Based Services

Using cloud-based services can help you maximize uptime. Cloud-based services are typically hosted on multiple servers, which means they are less likely to experience downtime. They are also accessible from anywhere, making it easier for you to access your data even if your local network is down.

Implement Redundancy

Redundancy is the practice of having multiple systems or backups in place to ensure maximum uptime. For example, you can use a failover internet connection, which automatically switches to a backup connection if your primary connection goes down. Most users typically opt for a cellular Internet connection in these cases because of their availability and flexible data plans. 

Use a VPN

Using a VPN can help you maximize uptime by providing an additional layer of security and privacy. A VPN encrypts your internet traffic, making it more difficult for hackers and other malicious actors to intercept your data. It also allows you to bypass internet censorship and access content that is not available in your region. However, not all services will allow you to connect when coming from a VPN connection. Still, if you want to give it a try, Peplink includes their own VPN service with warranty plans, which is called SpeedFusion. This allows you to build a VPN connection anywhere in the world, directly from your router. This means that all your devices connected to the router can benefit from the VPN. Other benefits include having seamless failover between multiple Internet connections as well as bandwidth aggregation.

Maximizing internet uptime is essential to ensure productivity, prevent data loss, and avoid frustration. By following these tips, you can ensure that your internet connection is as reliable and stable as it can be. Start by selecting a reliable ISP and router. Keep your equipment in good condition and use a UPS to ensure connectivity when power goes out. You may also use wired connections instead of Wi-Fi, implement redundancy, and use a VPN. 

Looking for further assistance with routers, VPN and redundant connections? Reach out to the 5Gstore team via phone, email, or chat!

How Much Data Do I Need for My Business?

You may already know that streaming video eats up a lot of data, but what about the important applications you use for business? In this article, we’re going to address some common application types and look at how much data and bandwidth they will require. 

VoIP

Like most things, the higher the quality of the call, the more data and bandwidth it will need. Each service uses a different codec to transform speech into data. Below are some common examples.

  • G.711: uses approximately 1.3 MB of data per minute (78 MB per hour)
  • G.723.1: uses approximately 0.33 MB per minute (20 MB per hour)
  • G.726: uses approximately 0.78 MB per minute (47 MB per hour)
  • G.728: uses approximately 0.48 MB per minute (29 MB per hour)
  • G.729: uses approximately 0.5 MB per minute (30 MB per hour)

As far as bandwidth, a .256 Mbps by .256 Mbps connection should be more than enough for normal VoIP. However, having speed isn’t enough. You also need a stable, high-quality connection with minimal packet loss and latency. You can measure the health of your internet connection by taking a Speed Test that includes latency, jitter and packet loss. Cloudflare’s speed test does just that. Although, once you have the data, how do you interpret it? 

Latency, which is essentially the time it takes for data to reach its destination, is measured directly in the ping time. For an excellent connection, the ping should be under 100ms. For a good connection, it should be under 250ms. Anything higher than that is going to provide poor results. 

Jitter is the time difference between when a packet is sent and received. The longer it is, the bigger the delay and the worse the quality of your calls. Jitter is measured in milliseconds, and a good value is between 15-20ms. If it’s any higher than this, the connection will become laggy, and audio will therefore sound choppy. 

Packet loss is when “packets” or pieces of data traveling across a network do not reach their end destination. In a VoIP call, this will appear as garbled audio with missing information like words and sentences.

Video Calls

As you might assume, video calls use significantly more data than voice calls. There are a number of variables, such as video quality, screen size, and the specifications of the connecting devices. For example: 

  • A video call between two mobile devices uses about 3.75 MB of data per minute (225 MB per hour).
  • A video call between a mobile device and a computer uses about 4.5 MB of data per minute (270 MB per hour)

Here’s a look at usage when we factor in the video quality:

  • A standard definition video call uses an average of 190 MB per hour.
  • A high-quality video call uses an average of 400 MB per hour.
  • An HD video call uses an average of 1.25 GB per hour.

Regarding bandwidth requirements, here are some averages we gathered:

  • 1:1 video calling:
    • High-quality video: 600kbps (up/down)
    • 720p HD video: 1.2Mbps (up/down)
    • 1080p HD video: 3.8Mbps/3.0Mbps (up/down)
  • Group video calling:
    • High-quality video: 1.0 Mbps/600kbps (up/down)
    • 720p HD video: 2.6Mbps/1.8Mbps (up/down)
    • 1080p HD video: 3.8Mbps/3.0Mbps (up/down)

Emails

Like online web browsing, checking your email should require no more than 5 Mbps. The amount of data used by emails with attachments can vary based on the size of the attachment. So, based on emails without attachments, you can send and receive 100 and only need 30 MB per month. 

Credit Card Transactions

Credit card transactions require very little bandwidth. On average a minimum of 1.5 mbps download speed and 768 kbps upload speed should be sufficient. Data usage is very small as well. If you were to run 1000 credit card transactions per day, this would work out to be just under 300 MB of data. 

IP Cameras

There are a few factors that determine how much bandwidth an IP security camera system uses. This includes video resolution, frames per second, file compression (e.g. H.264 and MJPEG), and the number of cameras. All four help to determine exactly how much bandwidth you need for your system.

Note that special applications, like facial recognition or license plate recognition, will eat up more IP camera bandwidth, since these applications require higher resolution and frame rate recording.

In our research, we frequently came across the following formulas for calculating IP camera bandwidth requirements. 

Resolution in pixels x Color depth in bits = Bit rate

Bit rate x Frame rate in frames per second = Bandwidth requirement in bits per second

Using the above formulas will give you its raw bandwidth requirement before compression. Audio, communication, and compression protocols also contribute to raw bandwidth, but they generally use a negligible amount. 

As an example, let’s say we have a high definition (1280 x 720 pixel) online surveillance system in true color (24 bit) that operates at 30 frames per second. Based on these formulas, we would have a raw bandwidth requirement of 665 Mbps. However, due to compression, this can be reduced down to as little as 2 Mbps (depending on the compression standard). 

Here’s a quick reference chart based on resolution and compression:

IP Camera Bandwidth Requirement
ResolutionH.264MJPEG
1MP (1280×720)2 Mbps per camera6 Mbps per camera
2MP (1920×1080)4 Mbps per camera12 Mbps per camera
4MP (2560×1440)8 Mbps per camera24 Mbps per camera

VPN

A VPN experiences something called “encryption overhead.” Encryption is a form of security for that connection and can increase bandwidth. Any activity you perform on your computer or network with the VPN enabled will use more data than when it is disabled. The increased amount could be anywhere from 2% up to 19%. The strength and protocols of your VPN will also contribute towards more usage. 

Generally speaking, the amount of bandwidth speed required for a VPN depends on the type of applications you’re accessing. For example, say you’re downloading a large HD movie file that’s 4GB of data. Over a non-VPN connection, the data usage would be exactly 4GB. However, due to the VPN encryption, the data usage will increase. 4GB is actually 4,096 MB of data, so that means you’re technically transferring closer to 4,396 MB in total.

Streaming Audio

Now, if you’re anything like me, you probably have some sort of music streaming throughout the workday. So, while this might not be “important,” it is common enough that we wanted to touch on the subject. There are dozens of ways to stream music these days. Some of the more popular services include:

  • Pandora
  • Spotify
  • Google Play
  • Amazon Music
  • iHeartRadio
  • SoundCloud

Typically, streaming music does not use much data or bandwidth. Although each service differs slightly in the stream quality. So what does that mean in terms of your data usage? If you were to stream music for an entire eight-hour work day, you would use about 1 GB each day. Based on your average month of 30 days, that could turn out to be up to 30 GB of data usage!

Does this seem like a lot of work? Not sure it makes much sense? Well, we made it more simple for users with our data usage calculator. This is an easy way to help determine your usage requirements, and average monthly usage based on common applications like credit card processing and emails. 

Data Usage Calculator example

Looking for a data plan? 5Gstore has data plans available here. Reach out to us for more information by phone, email, or chat!

What is SpeedFusion Connect Relay from Peplink?

If you have a WAN connection at your home that you wish you could use while you’re traveling, then Peplink’s SpeedFusion Connect Relay is the solution. As long as your hardware is running firmware 8.2 or higher, this allows you to connect your mobile Peplink router to your home Peplink router and use its Internet connection to connect to the Internet. This essentially makes it look like you’re at home rather than connected through the mobile network or VPN connection you’re using. So, it might allow you to connect to things like streaming services more easily.

To learn how to set this up on your own, check out our video at YouTube. You may also follow the steps below. 

Configuring the Relay Server

Start by connecting to and logging into your home router. This will act as the Relay server in the connection. We’ll be using a Peplink MAX BR1 Mini in our example. 

Navigate to the SpeedFusion Connect tab. Click on setup relay mode. A new screen should appear. Click where it says cloud location and select the location closest to your home. 

When done, click on the green checkmark to the right, followed by the apply changes button at the top right. 

Once applied, your SpeedFusion connect name will appear with a relay sharing code to the right. Copy this and then apply the changes before moving on. 

Configuring the Relay Client

Now that we have configured the server connection, we’re going to log into the client router. In this case we will be using a Peplink Balance 20X.

Navigate to the SpeedFusion Connect tab. Select choose cloud location and a new screen will appear. Refer to cloud location here and click where you see the blank field. A drop down should appear. Select home sharing and then paste in the code you copied from the server router. Click the green checkmark to the right, followed by apply changes at the top right. 

Navigate back to the Dashboard to check the status of the changes. Once applied, we will see the SpeedFusion connection appear. Wait while it cycles through the connection process. After a moment, it should say established

Routing All Traffic Over the SpeedFusion Relay

At this time, we need to configure the client router to send all traffic over our newly connected Speed Fusion relay. Navigate to the network tab, although for some Peplink routers, this will be under the advanced tab. Select Outbound Policy on the left. Click on Add rule here. 

Give the custom rule a unique name such as SpeedFusion Relay. Confirm the enable checkbox is checked. Source and Destination should be set to Any. Set the algorithm to priority and then drag and drop your SpeedFusion connection into the WAN list. It should be positioned at the top of the list so that all traffic routes over this connection first. If this fails for some reason, it will fail over to the WAN connection or connections you have in place. 

Leave the remaining settings as is. Click save, then apply changes. We’ll then go back to the Dashboard page again to confirm changes are applied and our SpeedFusion is still established. 

Checking the Connection

We can also check the connection at the server router and then verify our configuration is working. Once logged back into the server router, first verify the Speed Fusion connection shows it is established here with 1 out of 1 relay clients. Note that additional client connections can be purchased if needed. 

At the client router’s web admin page, navigate to the status tab and click on client list. This is where we can confirm the IP address our computer is receiving from the router’s private network. Now that we’ve noted this, we’ll go to active sessions on the left. Click on the search tab at the top of this page and then scroll through the outbound sessions list. This is where it tells us which Internet or WAN service our computer is connecting to the Internet over. As we can see here, it shows our SpeedFusion relay connection, which confirms our configuration is working correctly. 

If you have more questions, or you’re interested in purchasing additional relay connections, contact our team by phone, email, or chat!

How Can Peplink’s SpeedFusion Technology Improve Starlink Performance?

Starlink is a satellite internet service developed and operated by SpaceX, a private American aerospace manufacturer and space transport services company founded by Elon Musk. The service aims to provide high-speed internet access to remote or underserved areas around the world by using a constellation of low Earth orbit satellites. 

The company has launched several batches of satellites into orbit since 2019, with the goal of eventually having thousands of satellites in its constellation. Their aim is to provide internet speeds of around 100 megabits per second (Mbps) with latency of around 20 milliseconds. This is significantly faster than current satellite internet services, which can have latency in the hundreds of milliseconds and speeds of around 25 Mbps. However, just like with cellular connections, throughput and latency are not guaranteed. 

So, you may be wondering, how might you make your Starlink connection more reliable? Enter Peplink SpeedFusion Connect (SFC). Peplink is a company that specializes in developing networking solutions for businesses and organizations. They offer a range of products, including routers and other networking devices, that can help connect computers, devices, and networks together. Their SpeedFusion technology runs just like a VPN tunnel. It is used to combine multiple Internet connections together to create a single, fast, and reliable connection for use with a Peplink router. 

The goal of SpeedFusion is to provide a way for users to improve the performance and reliability of their Internet connection by using multiple connections from different providers, such as broadband, cellular, and satellite. SpeedFusion can be used to load balance traffic across multiple connections, seamlessly failover to a secondary connection in the event of an outage, and bond connections for more bandwidth, all while providing improved security and privacy through the use of encryption.

Seeing that cellular and satellite connections can be sporadic and unreliable on their own, Peplink technology helps them to behave more like wired services. Congestion on the network and latency spikes are the biggest factors to consider with wireless services. Ways to mitigate these issues include increasing the number of WAN connections that you are using. Though, even if you are only using two WANs, there are still ways that the Peplink SpeedFusion can be configured to improve performance. 

Here are some tips: 

  • Avoid bonding multiple Starlink connections together as this could create more issues with performance.
  • Important part of the SFC connection is how to get it connected and how to route your traffic
    • The default configuration is already optimized for best performance, but it is a matter of making changes to the WAN connection priority. This is what controls whether the SFC tunnel runs with just Hot Failover between connections, or bonds them.
    • With connections in different priorities, you have Hot Failover. With connections all in priority 1, you have bonding. This is what allows you to have connections active simultaneously so that bandwidth can be bonded and real time/ mission critical traffic can be routed over this connection. 
  • If you would like to have the benefits of both Hot Failover and bonding, simply create sub tunnels (i.e. one for Hot Failover and one for Dynamic Weighted Bonding).
Sub-Tunnel #1: Hot Failover
Sub-Tunnel #2: Dynamic Weighted Bonding
  • To get the traffic routed as needed, this is where the outbound policy comes into play. This can be done at the local admin page or through InControl 2.
    • The big difference is that SaaS is only possible via InControl 2. 
    • Add more redundancy by using the priority algorithm and prioritize your tunnels
    • Use your Dynamic Weighted Bonding tunnel to protect your real time traffic. Route regular traffic over single WAN with hot failover tunnel.
    • Local configuration is the same as on InControl 2, but does NOT support SaaS or regional based routing. 
Default Outbound Policy Rule for Regular Traffic
Custom Outbound Policy Rule for Mission Critical Traffic
Viewing Outbound Policy Configuration from the Local Web Admin
  • Use WAN smoothing over Dynamic Weighted Bonding when seeing high packet loss. Otherwise Dynamic Weighted Bonding can be more helpful without increasing your data usage.
  • Firmware: Upgrade to version 8.3.0 to use TCP Ramp up. This improves the handling of Upload/ Download TCP traffic, which is important because Starlink uses TCP acceleration. This also helps with congested LTE networks. It is the initial duplication of traffic and allows for more bandwidth. 
  • If Starlink goes up and down, elongate the health check interval.
  • MTU for Starlink is 1500.

Have more questions about using Starlink and Peplink together? Reach out to our team via phone, email, or chat!

What is Cradlepoint NetCloud Exchange?

As our businesses changed with the pandemic, the need for the Internet in remote locations, cloud computing, and security all increased and continues to do so. Among other companies, Cradlepoint was able to assist greatly in these areas. At this time, their company believes that wide area network (WAN) architectures have proven too limited. They’re also too inflexible for securely connecting distributed enterprise sites, vehicles, remote employees and devices.

5G is also quite a big factor here that will assist in evolving the industry standards. Cellular is becoming more essential as an alternative or backup WAN so it is important that it can easily be managed and secured.

As a response, Cradlepoint has released a new version of NetCloud that is designed to address common issues and help “lean IT organizations” amplify their 5G experience. This will assist with advanced SD-WAN, zero-trust capabilities, and security services.

“As organizations continue to undergo digital transformation, IT teams must evolve how they manage the network edge,” said Rohit Mehra, group vice-president of network and telecom infrastructure at leading analyst IDC. “Cradlepoint’s innovation in wireless WAN is enabling enterprises to deploy 5G with the management and security functions needed to scale.”

The new software, called NetCloud Exchange, is based on what is called an agile LTE/5G VPN-like service. More importantly, it’s been designed to enable secure end-to-end connections for thousands of locations in just three steps. Zero-trust principles include IP address cloaking and no default network access to change the traditional VPN paradigm from “connect and then secure”, to “secure and then connect” to provide least privileged-based access.

Advanced SD-WAN features are of course an extension of Cradlepoint’s current SD-WAN capabilities. The advancement is that they have added end-to-end support and advanced application optimization. This adds features such as 5G network slicing, simplified configuration at scale, more advanced cloud integration, more resilient and flexible traffic steering, and more scalable and resilient private and cloud data center terminations.

Zero-trust network access consists of a service that is simple to deploy and uses flexible, granular user, site, application and resource-based policies that use identity, context and 5G attributes to control network access.  

All services are delivered using the NetCloud Exchange Service Gateway offering for private and cloud data centers, which aggregates remote connections, provides flow-level visibility and acts as the policy-enforcement point for the services it supports.

Cradlepoint’s EMEA product manager said, “Most network solutions today are designed for wired-only deployments. With the new NetCloud Exchange extension, NetCloud now offers new 5G and security-first services to support enterprise WAN transformation, including end-to-end secure connectivity, hybrid SD-WAN and zero-trust networking – all lifecycle-managed through a single pane of glass.”