Bandwidth vs Throughput
Most Relevant Content
Network Bandwidth and Throughput
Bandwidth and Throughput are two important basic networking terms in computer network. If you wish to be an expert network administrator, you must have better understanding about these two networking terms. As a network user, you should also have better understanding about network bandwidth and throughput so that you can get maximum output from your network service provider. In this article, I will explain about network bandwidth and throughput from very beginning. I hope, this article will enrich your networking concept. What are Bandwidth and Throughput? Bandwidth In computer network, bandwidth is defined as the maximum number of bits that can flow through a network connection in a given period of time. The fundamental unit of network bandwidth is bits per second (bps). An ISP network connection that specified a bandwidth of 1Mbps means that in one second, maximum 100000 bits can be transferred across this connection. The term bandwidth is normally used in internet broadband subscription plan. Normally a higher bandwidth subscription plan will cost more than that of a lower bandwidth subscription plan. One thing to note is that even if you are subscribing a 1Mbps internet broadband plan, you may not get the full 1Mbps bandwidth when [...]
- »
MikroTik SSTP VPN Server Configuration with Windows 10 | April 27, 2020
VPN (Virtual Private Network) technology provides a secure and encrypted tunnel across a public network. So, a private network user can send and receive data to any remote private network through VPN tunnel as if his/her network device was directly connected to that private network. Secure Socket Tunneling Protocol (SSTP) transports PPP tunnel over TLS channel. SSTP uses TLS channel over TCP port 443. So, SSTP VPN can virtually pass through all firewalls and proxy servers. Because of using TLS [...]
- »
How to Buy a Good WiFi Router for Home or Office | October 12, 2021
You are here because you want to buy a WiFi Router and want to know how to buy a good WiFi Router for your home or office or business. A lot of wireless routers are nowadays available in the market. But before buying a WiFi Router, you should know which one is a good WiFi Router for your need based on some features and specifications of the router. We will now see some key points those should have well understand [...]
- »
MikroTik Blocking All Websites Except a Few Websites | May 7, 2019
A few days ago, someone asked me how to block all websites except one with MikroTik Firewall. For this, I have decided to discuss about blocking all websites except someone’s whitelist. Unlike firewall devices, MikroTik Firewall by default allows all websites. So, if you need to block any website, you have to create a firewall rule that will block the specific website. Now if we want to block all websites and want to allow a few websites, we have to [...]
- »
How to Recover MikroTik User Password | August 9, 2018
MikroTik Wiki and Forum say that there is no way to recover MikroTik user password without losing MikroTik configuration. But if you have an unencrypted configuration file backup taken before, you will be able to recover your user password using MikroTik password recovery tools. How to Backup and Restore MikroTik configuration file manually was discussed in my previous article. I also discussed how to backup MikroTik configuration file automatically via Mail in another article and in this article I will [...]
- »
MikroTik RADIUS Server Setup with User Manager – RouterOS7 | August 4, 2022
MikroTik User Manager RADIUS Server is an awesome service for user Authentication, Authorization and Accounting (AAA) for a small or medium business. User Manager RADIUS Server can be used to maintain Hotspot, PPP, DHCP, IPsec, Wireless and System User authentication. In RouterOS 7, User Manager has come with new features and looking, specially, maintaining from Winbox. As User Mange package does not come with the default system package in RouterOS 7, we have to install User Manger package manually before [...]
- »
How to Block VPN Access with MikroTik Router | May 14, 2019
Sometimes system administrators create firewall rule to block unwanted websites. But VPN apps break these firewall rules and allow access to unwanted websites. For example, if Facebook is blocked with MikroTik Firewall and any expert user installs and enables VPN apps (such as OpenVPN, Hotspot Shield, ProtonVPN, NordVPN, PureVPN etc.), he can easily get access to Facebook. So, system administrators should also block popular VPN apps so that user cannot use those VPN servers. Blocking VPN apps is not so [...]
- »
How to Create Free SSL/TLS Certificate with OpenSSL | July 23, 2021
SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]
- »
CentOS 7.5 Installation with GUI and LVM Partition | March 7, 2019
Red Hat/CentOS Linux is a popular server operating system. Specially who work on mail server, web server, web proxy server, ftp server and file server are so familiar with the Red Hat/CentOS Linux. In my previous article, I discussed how to install CentOS 7.5 Linux step by step with the standard partition. But if you want to work on mail server, web proxy server, ftp server, file server or any other application where disk space changes frequently, the standard partitioning [...]
- »
Virtual Web Hosting with Apache on CentOS 7 (Name Based) | July 15, 2019
Virtual Hosting is a method of hosting multiple domains on single server. If you have multiple domains (such as domain1.com, domain2.com and so on) and want to host on a webserver, Virtual Web Hosting is your right choice. Apache web server provides an easy way to manage Virtual Hosting. Virtual Hosting can be either Name Based or IP Based. In Name Based Virtual Hosting, multiple domains can be hosted on single IP address. On the other hand, in IP Based [...]
You May Also Like