bandwidth and speed relation

Most Relevant Content

  • Network Bandwidth and Throughput

    Bandwidth and Throughput are two important basic networking terms in computer network. If you wish to be an expert network administrator, you must have better understanding about these two networking terms. As a network user, you should also have better understanding about network bandwidth and throughput so that you can get maximum output from your network service provider. In this article, I will explain about network bandwidth and throughput from very beginning. I hope, this article will enrich your networking concept. What are Bandwidth and Throughput? Bandwidth In computer network, bandwidth is defined as the maximum number of bits that can flow through a network connection in a given period of time. The fundamental unit of network bandwidth is bits per second (bps). An ISP network connection that specified a bandwidth of 1Mbps means that in one second, maximum 100000 bits can be transferred across this connection. The term bandwidth is normally used in internet broadband subscription plan. Normally a higher bandwidth subscription plan will cost more than that of a lower bandwidth subscription plan. One thing to note is that even if you are subscribing a 1Mbps internet broadband plan, you may not get the full 1Mbps bandwidth when [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik WiFi MAC Authentication with UserMan RADIUS Server |   December 23, 2019

    MikroTik Wireless Router is popularly used as WiFi AP. MikroTik WiFi AP has a lot of features to tune WiFi network as your requirements. MAC authentication is one the amazing and useful features in MikroTik WiFi. MAC authentication enables filtering MAC address that means no MAC can be able to connect to WiFi AP without authentication.  MAC authentication can be done either local database or RADIUS Server. MAC authentication with RADIUS Server provides facility to manage multiple APs from centralized [...]

    READ MORE »

  • »

    System Restore in Windows 10 |   August 30, 2015

    Windows is the most popular operating system in the world. No computer user can go a single day without windows operating system. As windows is a popular and mostly used operating system, a lot of viruses or unwanted programs are creating everyday. So, you may face various unusual behavior in your windows operating system due to various virus attack or unwanted programs installation. But windows has integrated a lot features which help to prevent these unwanted programs and keep your [...]

    READ MORE »

  • »

    MikroTik RouterOS User Authentication via RADIUS Server |   November 19, 2017

    MikroTik RouterOS has a strong local user database that is enough to manage a single MikroTik RouterOS user. But if your network has more than one MikroTik Routers, it is always better to use a RADIUS server to manage RouterOS user centrally. MikroTik User Manager RADIUS Server is a centralized user authentication and accounting application that gives the ISP Company or network administrator ability to manage not only RouterOS users but also PPP, Hotspot, DHCP and Wireless users. How to [...]

    READ MORE »

  • »

    MikroTik Hotspot Configuration in RouterOS 7 |   April 25, 2023

    MikroTik Hotspot is an awesome service to run a captive portal network. You can run a public Wi-Fi network, Hotel Network, Airport network, CAMP Wi-Fi network, Shopping Mall Network and so on using MikroTik Hotspot and even can monetize your network for earning if you use Hotspot Billing Software like GalaxyRAD which is specially designed for MikroTik Hotspot network. GalaxyRAD helps to monetize your any network providing online payment gateway as well as integrating voucher-based system. It also helps to [...]

    READ MORE »

  • »

    Linux Text Editor |   September 7, 2017

    Everything is file in Linux operating system. So, anyone who wants to work with Linux operating system (specially, Red Hat or CentOS) must learn how to edit files in Linux operating system. Because, it is always prefer to avoid graphical user interface (GUI) for changing system configuration parameters in Linux operating system unlike Windows operating system.  You should be expert enough to edit any file in Red hat Linux operating system  otherwise you will face a lot of difficulty to [...]

    READ MORE »

  • »

    MikroTik Send Browsing Log to Remote Syslog Server |   August 18, 2019

    MikroTik RouterOS is capable of logging various system events as well as user browsing information. Logs can be saved in router’s memory (RAM), disk, file, sent by email or even sent to remote syslog server. Sometimes it may require saving user browsing log by the law. So, a syslog server is an essential part to any network. In this article, I will discuss how to configure MikroTik Router to keep user browsing log and send that log to remote syslog [...]

    READ MORE »

  • »

    MikroTik WiFi Frequency Band and Channel Width Explanation |   January 10, 2020

    MikroTik WiFi frequency, band and channel width tuning is an important task in any wireless network. If we fail to setup WiFi frequency and channel width parameter properly, we will notice a poor performance of wireless network. WiFi is aimed at use within unlicensed spectrum and the unlicensed spectrum that is usually used for WiFi is 2.4 GHz and 5 GHz band.  2.4 GHz and 5 GHz bands have multiple channels and these channels must be setup properly to get [...]

    READ MORE »

  • »

    MikroTik EoIP Tunnel for Bridging LANs over the Internet |   April 22, 2018

    VPN (Virtual Private Network) is a technology that provides a secure tunnel across a public network. A private network user can send and receive data to any remote private network using VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik provides EoIP (Ethernet over IP) that is used to create a site to site VPN tunnel. EoIP tunneling is a MikroTik RouterOS protocol that creates an Ethernet tunnel between two MikroTik Routers on top [...]

    READ MORE »

  • »

    How to Block a Phone from WiFi Router |   May 8, 2024

    We usually buy a WiFi Router from market and configure SSID and password to access it. We also configure DHCP Server so that whenever a phone or IP device gets connected to this SSID with the password, the device can get an IP address automatically and can get internet access. It is not possible to secure the WiFi Network keeping only the password authentication method. Because the password can be shared by the users or can be hacked easily. So, [...]

    READ MORE »