Presumably, the TSM server Activity Log has been inspected for any session failure issues, such as too-short timeout values or preemption. And, hopefully, there's nothing in the client OS which is clobbering network usage (such as bad anti-virus software).
Unusual possibilities that I could think of might be a network access point with a "rotary IP" scheme such that addresses are changing during the session, or maybe even a server erroneously using DHCP, whose lease has expired. A general thing to watch out for on Linux servers is default settings in iptables firewall being too restrictive. As Andy suggests, a network trace is in order, which you could pursue using client sessions which could start with basic queries over a goodly period of time, and then backup exercises. Richard Sims at Boston University