how to calculate network bandwidth

Most Relevant Content

  • Network Bandwidth and Throughput

    Bandwidth and Throughput are two important basic networking terms in computer network. If you wish to be an expert network administrator, you must have better understanding about these two networking terms. As a network user, you should also have better understanding about network bandwidth and throughput so that you can get maximum output from your network service provider. In this article, I will explain about network bandwidth and throughput from very beginning. I hope, this article will enrich your networking concept. What are Bandwidth and Throughput? Bandwidth In computer network, bandwidth is defined as the maximum number of bits that can flow through a network connection in a given period of time. The fundamental unit of network bandwidth is bits per second (bps). An ISP network connection that specified a bandwidth of 1Mbps means that in one second, maximum 100000 bits can be transferred across this connection. The term bandwidth is normally used in internet broadband subscription plan. Normally a higher bandwidth subscription plan will cost more than that of a lower bandwidth subscription plan. One thing to note is that even if you are subscribing a 1Mbps internet broadband plan, you may not get the full 1Mbps bandwidth when [...]

    READ MORE »

  • You May Also Like

  • »

    VMware ESXi 6.7 Installation and Basic Configuration |   November 17, 2020

    VMware vSphere is the pioneer in virtualization. No other virtualization software is as feature rich as VMware vSphere. More than 500,000 enterprise data center are now using VMware vSphere. It is expected that most of the data center will be turned into virtualization near future. As VMware vSphere provides more feature than any other virtualization software, it is also expected that demand of VMware vSphere will be increased day by day. VMware ESXi is the foundation of VMware vSphere and [...]

    READ MORE »

  • »

    MikroTik OpenVPN Configuration on TCP Port 443 with Windows OS |   April 6, 2020

    MikroTik OpenVPN is an amazing VPN solution. IT provides a secure and encrypted VPN tunnel across public network. Unlike PPTP and L2TP VPN Services which are poorly designed and can easily be blocked, OpenVPN can highly be customized and even can be run on so popular TCP Port 443. So, OpenVPN cannot easily be blocked. OpenVPN uses SSL/TLS Certificates. So, OpenVPN Tunnel is a trusted tunnel to send and receive data across public network. OpenVPN is a site to site [...]

    READ MORE »

  • »

    How to Secure MikroTik RouterOS Login Users |   February 19, 2021

    MikroTik RouterOS is a bridge between WAN and LAN. So, it is mandatory to apply RouterOS login user security policy. Otherwise, RouterOS may so insecure.

    READ MORE »

  • »

    MikroTik Router Auto Backup via Email |   August 23, 2016

    MikroTik Router is popularly used not only in ISP network but also in enterprise office network. So, MikroTik is a popular item to network administrator. A regular task of a network administrator is to keep and store router configuration file backup. Almost every network administrator takes configuration file backup manually. But MikroTik Router has an E-mail tool by which network administrators can automate configuration file backup regularly via email and can reduce his daily manual task easily. E-mail tool is [...]

    READ MORE »

  • »

    Red Hat/CentOS 7 Linux Installation (Minimal Packages) |   April 18, 2017

    Linux is a free and open source operating system developed by Linus Torvalds on September 17, 1991. It is mainly used as server environment. A lot of Linux distributions are present today. Among them, Red Hat Linux is used as enterprise Linux. Red Hat is also known as Red Hat commercial Linux that means Red Hat is a paid service program. CentOS (Community Enterprise Operating System) is another Linux distribution that provides a free and open source, enterprise-class, community-supported server platform functionally [...]

    READ MORE »

  • »

    Red Hat/CentOS Network Configuration |   August 4, 2017

    Red Hat/CentOS network configuration or IP configuration is an important task to a Linux system administrator. After completing RedHat 7/ CentOS 7 fresh installation, you have to first configure your system network so that it can communicate to other network devices. In my previous article, I discussed how to install CentOS 7 core packages successfully on your physical machine. If you are a new CentOS 7 user and yet you have not installed CentOS on your machine, feel free to study [...]

    READ MORE »

  • »

    MikroTik L2TP/IPsec VPN Configuration (Connecting Remote Client) |   February 26, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network and using this VPN tunnel a private network user can send and receive data to any remote private network as if his/her network device was directly connected to that private network. MikroTik L2TP server is one of the most popular VPN services. It provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. L2TP/IPsec is more secure [...]

    READ MORE »

  • »

    MikroTik DHCP Server Configuration in RouterOS 7 |   October 14, 2015

    Dynamic Host Configuration Protocol (DHCP) is a client/server protocol. DHCP server automatically provides an Internet Protocol (IP) address and other related information such as subnet mask, default gateway and DNS to DHCP clients. DHCP server and client use UDP port 67 and 68 for communication. In a network, a DHCP client (IP devices such as Desktop, Laptop, Smartphone etc.) requests for an IP lease to DHCP servers and a DHCP server responses allocating IP address and other related IP information [...]

    READ MORE »

  • »

    MikroTik Router Web Proxy Configuration |   August 28, 2016

    A Proxy Server is usually placed between users and the internet so that the proxy server can track the activities of any user. Formerly, a proxy server was mainly used for caching the static content of any web server because the internet speed was too slow. So, users would get high speed for browsing as if they were browsing a local server. But nowadays the internet bandwidth has increased. So, the proxy server is usually not used for web caching [...]

    READ MORE »