LogoLogo
Web HomeTutorialsPortal
  • Bamboozle Wiki and Documents
  • Products
    • Cloud
      • Compute
        • Managing Virtual Machines
          • Supported guest operating systems
          • Creating virtual machines
          • Connecting to virtual machines
          • Managing virtual machine power state
          • Attaching ISO images to virtual machines
          • Reconfiguring virtual machines
            • Changing virtual machine resources
            • Configuring network interfaces of virtual machines
            • Configuring virtual machine volumes
          • Monitoring virtual machines
          • Shelving virtual machines
          • Rescuing virtual machines
          • Managing guest tools
            • Installing guest tools
            • Uninstalling guest tools
          • Troubleshooting virtual machines
          • Deleting virtual machines
          • Managing SSH keys
        • Managing security groups
          • Creating and deleting security groups
          • Managing security group rules
          • Changing security group assignment
        • Managing images
          • Uploading images
          • Creating volumes from images
          • Preparing templates
            • Preparing Linux templates
            • Preparing Windows templates
            • Enabling logging for virtual machines
        • Managing volumes
          • Creating and deleting volumes
          • Attaching and detaching volumes
          • Resizing volumes
          • Creating images from volumes
          • Cloning volumes
          • Managing volume snapshots
        • Managing virtual networks
        • Managing VPN connections
          • Creating VPN connections
          • Editing VPN connections
          • Restarting and deleting VPN connections
        • Managing virtual routers
          • Managing router interfaces
          • Managing static routes
      • Managed Kubernetes
        • Creating and deleting Kubernetes clusters
      • Object Storage
        • Instances
        • How-to
          • Access Storage with S3 SDKs
          • Access Object Storage with Cyberduck
          • Access Storage with Mountainduck
        • Addtional Ressources
          • Supported Amazon S3 features
    • Servers
      • Cloud Servers
      • Dedicated Servers
    • Cyber Protect
      • Welcome to Cyber Protect
      • Supported features by OS
      • Activating the account
        • Password requirements
        • Two-factor authentication
      • Accessing the Cyber Protect service
      • The Cyber Protect console
      • Installing the software
        • Which agent do I need?
        • System requirements for agents
        • Preparation
        • Linux packages
        • Proxy server settings
        • Installing the Protection Agents
          • Downloading protection agents
          • Installing protection agents in Windows
          • Installing protection agents in Linux
          • Installing protection agents in macOS
          • Granting the required system permissions to the Connect Agent
          • Changing the logon account on Windows machines
          • Dynamic installation and uninstallation of components
    • Business Email
      • Getting started
        • DNS Records
        • Setting up a Mail Client with IMAP
        • Setting up your Mailbox with macOS, iOS, ipadOS and Android Devices
        • Configure Microsoft Outlook for Business Email
        • Zimbra Connector for Microsoft Outlook User Guide
      • Web Mail Client
        • Webmail Login
        • Mail
          • Left Sidebar
          • Email Pane
          • Reading Pane
          • Keyboard Shortcuts
      • Zimbra Modern Desktop
    • Web Hosting
      • Linux Web Hosting
        • cPanel Overview
          • Getting Started in cPanel
          • Server Information for cPanel
        • Preferences
          • Account Preferences
          • Audit Log
          • Change Language
          • Contact Information
      • Windows Web Hosting
    • SSL Certificates
      • SSL Intermediate and ROOT CA Bundles
        • RapidSSL CA Bundle
  • Tutorials
    • Rocky Linux
      • Rocky Linux 9
        • Basic Server Setup with Rocky Linux 9
  • Billing
    • Payment Methods
    • Credit Card Refunds
  • Legal
    • Legal Documents
      • Terms & Conditions
      • Master Agreement for Datacenter IP Services
      • Privacy
      • Service Level Agreement (SLA)
        • Public & Private Cloud
        • IP Transit Service Level Agreement
      • GDPR
        • FAQ
        • Data Processing Agreement
          • Schedule 1: Description of the Processing and Subprocessors
          • Schedule 2: Controller-to-Controller Information for International Data Transfers
      • Supplier Code of Conduct
  • Security
    • Platform Security
    • Infrastructure Security
    • Certification Reports
  • Pricing
    • Overview
    • Cloud
      • Compute
      • Volumes & Snapshots
      • Load Balancers
      • VPN
      • Elastic IPs
      • Traffic
    • Billing Q&A
      • Colocation - 95th percentile billing
  • Other Technical Information
    • Peering
Powered by GitBook
LogoLogo

Copyright © 2024 Bamboozle Web Services, Inc. All Rights Reserved.

On this page
  • How is 95th percentile billing calculated?
  • The benefits of 95th percentile billing
  • When do you use 95th percentile billing?

Was this helpful?

Export as PDF
  1. Pricing
  2. Billing Q&A

Colocation - 95th percentile billing

95th percentile billing is also called burstable billing, and it’s a way of calculating the cost of internet use which ignores the top 5% of internet usage peaks.

How is 95th percentile billing calculated?

Over the course of the month (or other billing period, but for the purposes of this article we’ll assume you’re billed monthly) your data usage is recorded. Every 5 minutes a measure of your bandwidth will be taken and the Mbps you’re using at that time will be recorded.

At the end of the month these bandwidth recordings are sorted from highest to lowest. The highest 5% of bandwidth usage is then discounted. This totals about 36 hours over the course of the month. Your bill is then calculated using the remaining 95% of bandwidth, thus the name 95th percentile billing.

The benefits of 95th percentile billing

The contract you have with your internet service provider will charge you based on your Committed Data Rate (CDR). 95th percentile billing allows you to burst beyond your CDR without having to pay any additional fees.

Committed Data Rate (CDR) – The amount of bandwidth you’re committed to using in a contract. Your CDR dictates what you will be charged by your ISP each month, and the bandwidth you have available to use without bursting.

95th percentile billing allows you to maximize the use of your internet connection while not having to pay significantly more for this increased bandwidth usage. You save money in two ways using this billing model:

  • You’re not charged for the top 5% of bursting, meaning that you don’t have anything extra to pay on top of your usual monthly bill.

  • Since you have this flexibility to burst, you can sustain a lower monthly CDR, and your monthly bill is lower than it would otherwise need to be.

You also have the reliability of always having the bandwidth you need, compared to other billing methods which can put a cap on your internet speed. But this uncapped data use can be dangerous. If you launch a new regular offsite backup or something similar that will eat up your bandwidth, you risk bursting beyond your CDR for more than 5% of the time and will have extra fees to pay if this happens.

When do you use 95th percentile billing?

The most common usage of 95th percentile billing is with the internet services provided by a data centre to their customers who have cloud or colocation services hosted with them. When a business has an IT system hosted in a data centre, they’re connecting to it remotely from other IT systems or from their office where people are working, and they can make full use of this this bursting when demand spikes.

PreviousBilling Q&ANextPeering

Last updated 1 year ago

Was this helpful?