measure network throughput

Most Relevant Content

  • Network Bandwidth and Throughput

    Bandwidth and Throughput are two important basic networking terms in computer network. If you wish to be an expert network administrator, you must have better understanding about these two networking terms. As a network user, you should also have better understanding about network bandwidth and throughput so that you can get maximum output from your network service provider. In this article, I will explain about network bandwidth and throughput from very beginning. I hope, this article will enrich your networking concept. What are Bandwidth and Throughput? Bandwidth In computer network, bandwidth is defined as the maximum number of bits that can flow through a network connection in a given period of time. The fundamental unit of network bandwidth is bits per second (bps). An ISP network connection that specified a bandwidth of 1Mbps means that in one second, maximum 100000 bits can be transferred across this connection. The term bandwidth is normally used in internet broadband subscription plan. Normally a higher bandwidth subscription plan will cost more than that of a lower bandwidth subscription plan. One thing to note is that even if you are subscribing a 1Mbps internet broadband plan, you may not get the full 1Mbps bandwidth when [...]

    READ MORE »

  • You May Also Like

  • »

    MikroTik Block Website (Facebook, YouTube and Other Sites) |   October 12, 2017

    MikroTik Firewall is a powerful security tool that can be used to block unwanted websites. If you are a network administrator, sometimes it may be your requirement to block any website like Facebook, YouTube, Pornographic site and so on. To block these types of websites, you just need to create Firewall Rules that will drop any connection to these websites through your MikroTik Router. MikroTik Firewall basic concept such as what is MikroTik Firewall, what is MikroTik Firewall Rule, how [...]

    READ MORE »

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »

  • »

    How to Get VMware ESXi Free License |   November 5, 2021

    You are here that means you are finding how to get ESXi free license because you have installed ESXi 6.7 or ESXi 7 and 60 days trial license has been expired and then all virtual machines have been powered off or you want to use VMware ESXi absolutely free of charge. Whatever your requirement, it is a good news that VMware provides free license with some limitations to use VMware ESXi absolutely free of charge. So, if you have a [...]

    READ MORE »

  • »

    FreeRADIUS User Group Management with MySQL |   January 3, 2019

    FreeRADIUS is a high performance RADIUS Server. A number of network devices can be used with freeRADIUS Server as a RADIUS Client including MikroTik Router. As a modular RADIUS suite, freeRADIUS accepts MySQL module to query user authentication and authorization and to store accounting data. In my previous article, I discussed how to install and configure FreeRADIUS MySQL module. I also discussed how to authenticate MikroTik Login with freeRADIUS MySQL user. In this article, we will talk about how to [...]

    READ MORE »

  • »

    Free Internet Speed Test Online |   August 31, 2015

    You are here because you want to check your broadband internet speed. Don’t worry, I will show you how to check your internet speed from online absolutely free and fastest way. I will show you top 4 websites link from which your broadband internet speed can be checked so easily. I will also show you how to check bandwidth usage continuously with windows operating system’s utility and a third party software utility. So, keep reading this article and find how [...]

    READ MORE »

  • »

    How to Block WiFi Access although Password is Known |   April 23, 2024

    We usually get internet connection from any ISP and buy any WiFi Router and then configure wireless/AP with password and configure DHCP Server to get connection from own WiFi devices. We use these WiFi Routers/APs at home, office, workspace or any other public places. Usually, we get connected to our WiFi using our provided WiFi password. Initially there will be no problem to keep your network safe using password authentication. But day by day your password will be known by [...]

    READ MORE »

  • »

    Apache2 Web Server HTTPS Configuration on Ubuntu Server |   August 15, 2021

    Data transmission between web server and web client over port 80 (HTTP) is not encrypted. So, any middle man between web server and web client can view transmitted data and can steal secret information. To overcome this limitation, HTTPS Protocol over port 443 has been introduced. HTTPS is a secure web server that is configured with SSL/TLS certificate. TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are web protocols used to wrap normal traffic in a protected, [...]

    READ MORE »

  • »

    MikroTik Site to Site VPN Configuration with IPsec |   March 8, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. Site to Site VPN technique establishes a secure tunnel between two routers across public network and local networks of these routers can send and receive data through this VPN tunnel. MikroTik RouterOS [...]

    READ MORE »

  • »

    Securing MikroTik Router with Port Knocking |   March 21, 2021

    MikroTik Port Knocking strategy helps to protect MikroTik Router from hackers and unauthorized access as well as enhances MikroTik RouterOS security.

    READ MORE »