Solved

how to  measure network performance in LAN.what are the metrics needs to be considered

Posted on 2011-09-08
2
365 Views
Last Modified: 2012-05-12
how to  measure network performance in LAN.what are the metrics needs to be considered
0
Comment
Question by:greensuman
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 14

Expert Comment

by:JAN PAKULA
ID: 36502003
download that

http://www.totusoft.com/lanspeed1.html

and measure
by typing for example

\\servername\c$

JAN MA CCNA
0
 
LVL 32

Accepted Solution

by:
Kamran Arshad earned 500 total points
ID: 36508399
Hi,

You can check the speed of the Network using IPerf.

Iperf      dast.nlanr.net/Projects/Iperf      Open-Source

You can check the Reading and Writing speed using the tool above.

For security audit you may use;

Open Vulnerability Assesment System       www.openvas.org
Nessus      www.nessus.org
GFI LanGuard      www.gfi.com
Retina Network Security Scanner      www.eeye.com
SAINT      www.saintcorporation.com
QualysGuard      www.qualys.com
ManageEngine Security Manager      www.securitymanagerplus.com
OutScan      outpost24.com
Vulnerability Scanner      www.scanverify.com
Rapid7      www.nexpose.com
NSAuditor      www.nsauditor.com
0

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question