Solved

Network latency test

Posted on 2013-01-16
6
584 Views
Last Modified: 2013-03-26
I want to test the latency before opening office branches between several sites, what is the best tool to do this (e.g from one country to another)
0
Comment
Question by:Seni
6 Comments
 
LVL 7

Expert Comment

by:SvenIA
ID: 38782637
Use the 'ping -t' command in the command prompt
0
 
LVL 25

Assisted Solution

by:Tony Giangreco
Tony Giangreco earned 250 total points
ID: 38782644
The quickest way to test latence is using ping. You need the IP of each remote office. After you have it, ping it and record the settings.

You can also save the ping test results in a log file so you have a baseline of the results you received. It can be opened and read at any time.

Click Start, Run, and type in CMD.
If the dos box that opens, type these commands with the proper IP's per remote office.

Example: Ping 100.100.100.100 > c:\Office1-Ping.txt
Example: Ping 100.100.100.200 > c:\Office2-Ping.txt

If the results are high or you have a communications problem with on office run a tracert

Tracert 100.100.100.100 > c:\Office1-Tracert.txt

Hope this helps!
0
 

Author Comment

by:Seni
ID: 38782682
Thanks all,

any other test methods/tools please
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 11

Expert Comment

by:rharland2009
ID: 38782725
If you have access to workstations/servers at either end, I like using iperf.
It tests effective bandwidth between two points. Pair this with some ping information and you have good pipe/latency information moving forward.

http://iperf.sourceforge.net/
0
 
LVL 25

Accepted Solution

by:
madunix earned 250 total points
ID: 38850818
netpipe for latency and ping for packet loss.
0
 

Author Closing Comment

by:Seni
ID: 39021173
netpipe gave me good results
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now