Install A Loopback Adapter In Windows 7

The Microsoft Loopback adapter is a groovy little tool originally designed for testing network configurations.  Over time however, many other uses have been found for it such as networking two computers together without using a cross-over Ethernet cable, and connecting virtual machines to the internet.  We’ve covered setup for the loopback adapter in XP and Vista but for reasons unknown Microsoft annoyingly has decided to hide the “Add New Hardware wizard” in Windows 7.  This changes the setup process around and can make it very difficult to start, so here is a new groovy How-To guide just for installing the Windows 7 Loopback adapter!

How To Setup A Loopback Adapter On Windows 7
1. Click the Start Menu Orb. In the search box Type hdwwiz and then Click the hdwwize.exeprogram link.
image
2. Now the Add Hardware wizard should be open.  Click Next through the first page, and then on the second Select Install the hardware that I manually select from a list (Advanced)Click Next to continue.
Windows 7 Networking Screenshot - click the install the hardware that I manually select forma list (Advanced)
2. Scroll down the list and Select Network Adapters then Click Next.
Windows 7 Networking Screenshot  - select network adapters
3. Give the next window a moment to load, and then Click Microsoft and Select Microsoft Loopback Adapter.
Windows 7 Networking Screenshot select microsoft > microsoft loopback adapter
Now the Microsoft Loopback Adapter should be installed and it will show up in your network connections window.  From here you can easily configure your adapter to do whatever you’d like!  Groovy!
Windows 7 Networking Screenshot - the Microsoft Loopback adapter visible in the network connections window

http://www.omnisecu.com/basic-networking/index.php

very imp blog

How Hackers attack networks and a Hacker's mindset

Footprint analysis or Reconnaissance: Footprint analysis or Reconnaissance is the first step typically performed by a network hacker. In Footprint analysis or Reconnaissance, hacker gathers information about the target network. Footprint analysis or Reconnaissance is to map the addresses, devices, operating systems, application running in the target network.
Footprint analysis or Reconnaissance helps attacker to tailor an attack plan to exploit known vulnerabilitiesconfiguration errors in the target network.
Attackers use many information which are available in the internet like DNS lookups to find the name and IP address of the target network, WHOIS information to find the contact details name server names etc.
Launch Attack: After performing Footprint analysis or Reconnaissance, hacker gain much information about the target network. The next step is to launch an attack on the target network based of the found vulnerabilities.
Escalate privileges: If the hacker gained access as an normal unprivileged user, then the next step to to escalate the user account to gain administrator-level privilege.
Jump to other servers and devices: Once the hacker is inside the internal network, then he can gain access to other devices inside. Collect additional information like applications running, operating systems, user ids, password etc.
Install Back Doors: After compromising servers and collected the information he required, hacker then try to install and configure back door or remote-control hacking tools to gain access to the system in future. A backdoor application allow the hacker future access to the compromised machines. or to
Hide the Tracks: After performing attack and installed back door applications, next step is to hide the tracks so that the hacker can hide the attack from administrators. Hackers do perform many actions for this. For example, deleting the log files.
Leverage the compromised network: Finally, hackers start using the target network. They can steal or destroy the target network data, bring servers down, or attack another organization using the target network's systems.

How to provide better security to your enterprise network

As a network security administrator, your job is to provide better security to the enterprise network. Listed below are some tips which are successfully implemented in many organizations to bring better security to the enterprise network.
Compartmentalization: The different network resourses and data in every network is of different importance and sensitivity. Enterprise network resourses and data of different sensitivity should be located in different security zones. Access to Enterprise network resourses and data stores should be provided through highly controlled communication mechanisms.
Defense in Depth: The idea behind Defense in Depth is that security is implemented everywhere possible in an enterprise network (layered protection). Network security devices are employed in different places of enterprise network. Security of network systems and consists of different technologies with different protection levels.
Rule of Least Privilege: Rule of least privilege states only minimal access is provided to the required network resources. Only minimal level of access required to complete a business tasks only must be assigned.

Adequate Protection: Aqurate current and relevent protection mechanisms must be installed in the network.

Information Hiding: Only the information that is required to complete a business task must be provided to the employees.
Separation of duties and job rotation: Separation of duties and job rotation helps in better implementation of enterprise security policies and reducing vulnerabilities.
Auditing: Auditing aims in keeping track of what is happening in network and find any security hole.

How Hackers attack networks and a Hacker's mindset

Footprint analysis or Reconnaissance: Footprint analysis or Reconnaissance is the first step typically performed by a network hacker. In Footprint analysis or Reconnaissance, hacker gathers information about the target network. Footprint analysis or Reconnaissance is to map the addresses, devices, operating systems, application running in the target network.
Footprint analysis or Reconnaissance helps attacker to tailor an attack plan to exploit known vulnerabilitiesconfiguration errors in the target network.
Attackers use many information which are available in the internet like DNS lookups to find the name and IP address of the target network, WHOIS information to find the contact details name server names etc.
Launch Attack: After performing Footprint analysis or Reconnaissance, hacker gain much information about the target network. The next step is to launch an attack on the target network based of the found vulnerabilities.
Escalate privileges: If the hacker gained access as an normal unprivileged user, then the next step to to escalate the user account to gain administrator-level privilege.
Jump to other servers and devices: Once the hacker is inside the internal network, then he can gain access to other devices inside. Collect additional information like applications running, operating systems, user ids, password etc.
Install Back Doors: After compromising servers and collected the information he required, hacker then try to install and configure back door or remote-control hacking tools to gain access to the system in future. A backdoor application allow the hacker future access to the compromised machines. or to
Hide the Tracks: After performing attack and installed back door applications, next step is to hide the tracks so that the hacker can hide the attack from administrators. Hackers do perform many actions for this. For example, deleting the log files.
Leverage the compromised network: Finally, hackers start using the target network. They can steal or destroy the target network data, bring servers down, or attack another organization using the target network's systems.

Different Classes of Network attacks and how to defend them

Passive attack: A passive attack is a type of attack where the attacker simply monitor the network activity as a part of reconnaissance. A passive attack is difficult to detect, because the attacker is not actively attacking any target machine or participating in network traffc. An example of a passive attack is an attacker capturing packets from the network.
Prevention: Potential threats from Passive attacks can be eliminated by implementing good network encryption.
Active attack: Active attack is a type of attack where the attacker actively launching attack against the target servers. In active attack the attacker is actively sending traffic that can be detected.
Prevention: Active attacks can be prevented by using Firewalls and IPS (Intrusion Prevention Systems).
Close-in attack: A Close-in attack is a type of attack where the attacker is physically close to the target system. Attacker can the the advantages of being physically close to the target devices.
Prevention: Good physical security can prevent Close-in attacks.
Insider attack: An insider attack is an attack from inside users, who use their access credentials and knowledge of the network to attack the target machines.
Prevention: Good layer 2 security, authentication and physical security can prevent Insider attacks.
Distribution attack: Distribution attacks are the attacks using backdoors introduced to hardware or software systems at the time of manufacture. Once the hardware or software became functional, attackers can leverage the backdoor to attack the target devices.
Prevention: Trusted hardware/software vendors and integrity checks can prevent Distribution attacks.

Types of Network Attacks against Confidentiality, Integrity and Avilability

Network Attacks against Confidentiality

Attackers can use many methods to compromise confidentiality. Following are some of the common methods:
Packet Capturing (Packet Sniffing):  Packet Capturing (Packet Sniffing) is a type of  network attack where the attacker capture the data packets (typically Ethernet frames)  in  travel.  Once the data is captured, the attacker can  read the sensitive data like passwords or card numbers, if the network traffic is not encrypted. The most widely used packet capture software is Wireshark.
Note: Wireshark is not a hacking tool, it is a well known network protocol analyzer used to troubleshoot network problems. But hackers misuse Wireshark with bad intentions.
Password Attacks: Password based attacks are used to hack the passwords of users of a target computer to gain access.  Two types of password attacks are dictionary based attack (where an attacker tries each of the words in a dictionary or commonly used passwords to hack the user password) and brute force attack (where an attacker tries every single possible password combinations using Brute Force hacking tools to hack the user password).
 Port Scanning and Ping Sweeps: Port Scanning is a type of network attack, where the attacker tries to discover the services running on a target computer by scanning the TCP/UDP ports. Here the attacker tries to establish connection to the TCP/UDP ports to find out which ports are open on a target computer. After finding which TCP/UDP ports are open, the attacker can find out which service is running on a target computer and which software product is running on a target computer. Finally attacker can attack and hack the target computer negotiating vulnerability in that software product.
A ping sweep is another kind of network attack where the intruder sends ping ICMP ECHO packets to a a range of IP addresses to find out which one respond with an ICMP ECHO REPLY . Thus the attacker can identify which computers are up and which computers are down.
Dumpster Diving: Dumpster diving is searching through company dumpsters for any information that can be useful for an attacker for attacking the network. Example: Serching for employee names, Software application product information, network infrastructure device make and models etc.
Wiretapping:  Wiretapping is a type of network attack where the attacker hacks the telecommunication devices listen to the phone calls of others.  
Keylogger: A keylogger is a program that runs in the background of a computer, logging the user’s keystrokes. After a user enters a password, it is stored in the log created by the keylogger and forwarded to the attacker.
Phishing and Pharming: Phishing is an attempt to hack sensitive information (usually financial information like bank userid/password credit card details etc), by sending unsolicited emails with faks URLs. Pharming is another network attack aimed at redirecting the traffic of one website to another website.
Social Engineering: Social Engineering is type of attack in which someone with very good interactive skills manipulates others into revealing information about network that can be used to steal data.

Network Attacks against Integrity

Salami attacks: Salami attacks are a series of minor data security attacks that together result in a larger attack. For example, deducting a very small amount or money from a bank account which is not noticeable. But when the deduct very small amounts from large number of accounts, it become a huge amount.
Data diddling attacks: Data diddling is an illegal or unauthorized data alteration. Changing data before or as it is input into a computer or output. Example: Account executives can change the employee time sheet information of employees before entering to the HR payroll application.
Trust relationship attacks: Trust relationship attacks exploit the trust between different devices in a network.
Man-in-the-middle attacks: A man-in-the-middle attack is a type of network attack where the attacker sits between two devices that are communicating to manipulate the data as it moves between them.
Session hijacking attacks: Session hijacking is another type of network attack where the attacker hacks a computer session to gain unauthorized access to information or services in a computer system.f

Network Attacks against Avilability

DoS  (Denial of Service attacks): DOS Attack is a type of attack to a network server  with large number or service requests with it cannot handle. DoS (Denial of Service Attack) can causes the server to crash the server and legitimate users are denied the service.
DDoS (Distributed Denial of Service attacks ): Distributed Denial of Service attack (DDoS) is a type of DoS attack, originating from many attacking computers from different geographical regions.
SYN flood attacks and ICMP flood attacks: SYN flood attacks are type of attacks where attacker sends many TCPSYN packets to initiate a TCP connected, but never send a SYN-ACK pack back. In ICMP flood attack the victim computer is sent with many false ICMP packets.
Electrical power attacks: Attacks involve power loss, reduction, or spikes.
Server Room Environment attacks: Fire, Temperature, water, humidity etc

Types of hackers and how hackers are classified

Types of Hackers

"Hacker" is a loose term and has different meanings. Generally the term "Hacker" is someone who breaks into computer networks for the happiness he gets from the challenge of doint it or with some other intentions like stealing data for money or with political motivations.  Hackers are classified to different types. Some of them are listed below.
White Hat: A White Hat hacker is a computer network security professional and has non-malicious intent whenever he breaks into security systems. A White Hat hacker has deep knowledge in Computer Networking, Network Protocols and System Administration (at least three or four Operating Systems and very good skills in Scripting and Programming). White Hat hacker has also good knowledge in hacking tools and know how to program hacking tools. 
A White Hat hacker has the skills to break into networks but he uses his skills to protect organizations. A White Hat hacker can conduct vulnerability assessments and penetration tests are also known as an Ethical Hacker. Often White Hat hackers are employed by companies and organizations to check the vulnerabilities of their network and make sure that no hole is available in their network for an intruder.
Black Hat: A Black Hat hacker, also known as a cracker,  is a computer professional with deep knowledge in Computer Networking, Network Protocols and System Administration (at least three or four Operating Systems and very good skills in Scripting and Programming). Black Hat hacker has also good knowledge in many hacking tools and know how to program hacking tools. A Black Hat hacker uses his skills for unethical reasons. A Black Hat hacker always has malicious intention for intruding a network.  Example: To steal research data from a company, To steal money from credit cards, Hack Email Accounts etc.
Grey Hat: A Grey Hat hacker is someone who is between White Hat hacker and Black Hat hacker.  Grey Hat normally do the hacking without the permissions from the administrators of the network he is hacking. But he will expose the network vulnerabilities to the network admins and offer a fix for the vulnerability for money.
Script Kiddie: A Script Kiddie is basically a hacker amateur who doesn’t has much knowledge to program tools to breaks into computer networks. He often use downloaded hacking tools from internet written by other hackers/security experts.
Hacktivist: A Hacktivist is a hacker with political intentions. The hacktivist has the same skills as that of a hacker and uses the same tools as the hacker. The primary intention of an hacktivist is to bring public attention to a political matter.
Phreaker: Phreaker is a telecom network hacker who hacks a telephone system illegally to make calls without paying for them.

Network Threats and Countermeasures

A Threat can be defined as anything which is danger to an organization's Asset. Threats can be physical threat of network based threats. An attacker may exploit poorly configured network infrastructure devices like a firewall, router network servers or switches. Default settings network infrastructure devices, loose access controls, applications and operating system without proper updates etc. are vulnerabilities and can be exploited by an attacker.
Countermeasure is any action to prevent a threat against a vulnerability. Countermeasures can be of following types.
Administrative Countermeasures: Security policies, general procedures, accepted safety guidelines etc can be considered as Administrative Countermeasures.
Physical Countermeasures: Physical security for Server Rooms, Network Infrastructure devices, Data centers, Accident and Fire Prevention, Uninterrupted Power Supply, Video Surveillance etc can be considered as Physical Countermeasures.
Logical Countermeasures: Proper configuration of network Firewalls, application and operating system password security, IPS (Intrusion Prevention Systems), VPN (Virtual Private Network), etc are examples of Logical Countermeasures .

Enterprise Risk Management - Key Definitions

Business world is ever evolving. Many key business factors are complex in nature and unpredictable. Network Security and Enterprise Risk Management (ERM) are related. If Network Security measures are implemented properly, enterprise risks can be avoided to a large extent.
Risk assessment provides a mechanism for identifying which risks represent opportunities and which represent potential pitfalls. Enterprise risk assessments and proper security measures provide more clear view about internal or external business risks.
Key technical terms which Network Security administrators must know are 1) Asset, 2) Vulnerability, 3) Exploit, 4) Threat, 5) Attack, 6) Risk and 7) Countermeasures.
1) Asset: Asset is anything which the organization is invested and which is valuable to the organization. Examples: Properties, Vehicles, Heavy Equipments, Plants, Buildings, Employees, Computers, Data, Intellectual Properties etc. Protecting the organization's assets is the prime function of security (physical security or network security).
2) Vulnerability: Vulnerability can be defined as an exploitable weakness in a system or its design. Every system is human created. Chances for errors, mistakes are always there in every human created systems. Vulnerabilities are always there in Applications, Network Protocols, Operating Systems etc. Vulnerability can be exploited by an attacker to gain access to an organization's network.
3) Exploit: An Exploit can be defined as a way, method or tool which is used by an attacker, on a vulnerability, to cause damage to the target network or system. The exploit can be software that may cause a buffer overflow or a method of social engineering to hack a password.
4) Threat: Threat can be defined as anything danger to an Asset. Threats can be accidentally triggered or intentionally exploited.
5) Attack: Attack can be defined as action taken by an attacker to harm an asset.
6) Risk: The term "Risk" can be defined as potential for loss, compromise, damage, destruction or other negative consequence of an organization's Asset. Risk arises from a threat, multiple threats, exploiting vulnerability. Risk forms an adverse negative impact on an organization's Asset.
Risk = Asset + Threat + Vulnerability
7) Countermeasure: Countermeasure is an action initiated by the organization (typically security professionals) to mitigate a threat.

Primary Goals of Network Security - Confidentiality, Integrity and Availability

hree primary goals of Network Security are
• Confidentiality
• Integrity
• Availability
These three pillars of Network Security are often represented as CIA Triangle, as shown below.
CIA Triangle Confidentiality Integrity Availability
Confidentiality: The first goal of Network Security is "Confidentiality". The function of "Confidentiality" is in protecting precious business data (in storage or in motion) from unauthorized persons. Confidentiality part of Network Security makes sure that the data is available OLNY to intended and authorized persons. Access to business data should be only for those individuals who are permitted to use that data.
Confidentiality
Integrity: The second goal of Network Security is "Integrity". Integrity aims at maintaining and assuring the accuracy and consistency of data. The function of Integrity is to make sure that the date is accurate and reliable and is not changed by unauthorized persons or hackers. The data received by the recipient must be exactly same as the data sent from the sender, without change in even single bit of data.
Integrity
Availability: The third goal of network security is "Availability". The function of "Availability" in Network Security is to make sure that the Data, Network Resources or Network Services are continuously available to the legitimate users, whenever they require it.

What is Network Security and why we need Network Security

Network Security is a branch of computer science that involves in securing a computer network and network infrastructure devices to prevent unauthorized access, data theft, network misuse, device and data modification. Another function of Network Security is in preventing DoS (Denial of Service) attacks and assuring continuous service for legitimate network users. Network Security involves proactive defence methods and mechanisms to protect data, network and network devices from external and internal threats.
Data is the most precious factor of today’s businesses. Top business organizations spend billions of dollers every year to secure their computer networks and to keep their business data safe. Imagine the loss of all important research data on which the company has invested millions of dollers and working for years !!!
We are dependent on computers today for controlling large money transfers between banks, insurance, markets, telecommunication, electrical power distribution, health and medical fields, nuclear power plants, space research and satellites. We cannot negotiate security in these critical areas.
Computer Keyboard
As the complexity of the systems and the networks are increasing, vulnerabilities are also increasing and the task of securing the networks is becoming more complex.
data protected
This makes Network Security an essential part of today's businesses.

Boot Configuration Data (BCD), Windows 2008 Server

All the previous Microsoft Windows Server products since Windows NT have been using NT Loader (NTLDR) and boot.ini to control the boot process and to manage multi operating system environments. For a BIOS based computer that is booting from its hard drive, the BIOS reads the Master Boot Record (MBR) and transfers control to the Master Boot Record (MBR) code. Master Boot Record (MBR) then transfers control to the code that loads the Operating System. NT Loader (NTLDR) is then responsible for loading Windows. NTLDR uses the data from a text file named boot.ini kept on the root folder of the boot drive.
boot.ini text file contains an entry for each version Windows installed on that computer. If multiple versions of Windows are available, NTLDR displays the list of boot entries to allow the user to specify which one should be loaded. NTLDR then loads the Operating System which the user has selected.
Microsoft has re-engineered the entire boot process in Windows 2008 Server and a new concept of Boot Configuration Data (BCD) is introduced. The Boot Configuration Data (BCD) store contains boot configuration parameters and controls how the Windows 2008 Server Operating System is started. The Boot Configuration Data (BCD) replaces NTLDR in its functionality and the boot configuration data which was configured in boot.ini is now stored in a binary format which can be edited by the tool BCDEdit.exe. You can also use The Startup and recovery dialog box, System Configuration utility (Msconfig.exe), and BCD WMI provider to edit the Boot Configuration Data (BCD).
For BIOS-based Operating Systems, the Boot Configuration Data BCD) is located in the \Boot\Bcd directory of the active partition. For EFI–based operating systems the Boot Configuration Data (BCD) is located on the EFI system partition.
Following new boot applications are present in Windows 2008 Server.
• Bootmgr - Controls the boot flow
• Winload.exe - The Operating System Loader
• Winresume.exe - Operating System Resume Loader after a hibernation.

Source of Information: Microsoft White Paper on Boot Configuration Data

Windows 2008 Server Manager MMC snap-in

Server Manager is a new feature that is included in Windows Server 2008, which is centralized tool to guide system administrators through the process of installing, configuring, and managing server Roles and Features available with Windows 2008 Server.
Server Manager is launched automatically after Initial Configuration Tasks (ICT). You can select not to open the Server Manager at start-up by checking “Do not show me this console at logon” check box. If you select Server Manager not to start up automatically, it can still be accessed by the methods listed below.
• Open the Start menu, and then click Server Manager at the top of the menu.
• Select menu path Start > Administrative Tools > Server Manager.
• Right-click Computer, and then choose Manage.
• Open Run dialog box from start menu, type "servermanager.msc" and hit enter.
Server Manager is available as a Microsoft Management Console (MMC) snap-in and it provides information about server configuration, installed roles, status of installed roles, tools for adding and removing Windows 2008 roles and features. Server Manager contains the following elements.
• Initial Configuration Tasks (ICT)
• Add Roles Wizard
• Add Role Services Wizard
• Add Features Wizard
• Remove Roles Wizard
• Remove Role Services Wizard
• Remove Features Wizard
• Command-line tools

Server Manager MMC snap-in is shown below.
Server Manager

Windows 2008 Server Roles can be considered as the primary function of a server. Windows 2008 Server Features are minor function of a server that supports the functionality of a role.

Roles available in Windows 2008 Server


• Active Directory Certificate Services
• Active Directory Domain Services (AD DS)
• Active Directory Federation Services (AD FS)
• Active Directory Lightweight Directory Services (AD LDS)
• Active Directory Rights Management Services (AD RMS)
• Application Server
• DHCP Server
• DNS Server
• Fax Server
• File Services
• Network Policy and Access Services
• Print Services
• Terminal Services
• Universal Description, Discovery, and Integration (UDDI) Services
• Web Server (IIS)
• Windows Deployment Services

Features available in Windows 2008 Server


• NET Framework 3.0 Features
• BitLocker Drive Encryption
• BITS Server Extensions
• Connection Manager Administration Kit
• Desktop Experience
• Failover Clustering
• Group Policy Management
• Internet Printing Client
• Internet Storage Name Server
• LPR Port Monitor
• Message Queuing
• Multipath IO
• Network Load Balancing
• Peer Name Resolution Protocol
• Quality Windows Audio-Video Experience
• Remote Assistance
• Remote Differential Compression
• Remote Server Administration Tools
• Removable Storage Manager
• RPC over HTTP Proxy
• Simple TCP/IP Services
• SNMP Services
• SMTP Server
• Storage Manager for SAN
• Subsystem for UNIX-based Applications
• Telnet Client
• Telnet Server
• TFTP Client
• Windows Internal Database
• Windows PowerShell
• Windows Process ActivatitionService
• Windows Server Backup Features
• Windows System Resource Manager
• WINS Server
• Wireless LAN Services

Initial Configuration Tasks (ICT), how Initial Configuration Tasks (ICT) can be used to configure Windows 2008 server

Initial Configuration Tasks (ICT) is the replacement for the post-Setup Security Updates feature that was introduced in Windows Server 2003 Service Pack 1 (SP1). The Initial Configuration Tasks window will open at each startup, unless the "Do not show this window at logon" check box is selected. Initial Configuration Tasks (ICT) screen is shown below.
Initial Configuration Tasks
If you have disabled Initial Configuration Tasks (ICT), you can open it by running the command oobe.exe.
Three sections are available inside Initial Configuration Tasks (ICT) and these are explained below.
1) Provide computer information
2) Update This Server
3) Customize This Server

Provide computer information

In "provide computer information" section, you can set the time zone, configure the network and provide computer name and domain.

Update This Server

In "Update This Server" section, you can enable automatic updating and feedback and "download and install updates".

Customize This Server

In "Customize This Server" you can Add Roles, Add Features, Enable Remote Desktops and Configure Windows Firewall.

switch port checking tool

network testing tool



it is used to test your network connectivity from one end to another.





Image result for network cable testing tools 

Network Speed and Access Method

What speed can we expect from a 10base2 or 10baseT network ?
These networks are rated for 10 MBit : Bits, not Bytes !
With 8 Bits per Byte, the maximum theoretical throughput is 1.25 MByte,
but this value cannot be reached in reality.

Lets make a test and use System-Monitor to check it (assuming a proper cable installation, otherwise re-transmittions will slow the network down):
2 systems on the network.

test #1:
copy of one 30 Mbyte file
approx. 600 KByte/second


test#2:
copy of 1900 Files (18 MByte)
approx. 300 KByte/second

Reason #1:
Protocol overhead: In addition to the data itself, control-information is transmitted,
like to verify that the data has correctly arrived on the destination system.
That is also the reason, by test#2 has a lower throughput, because transferring
multiple files has a higher overhead than just a single file.


Reason #2:
10base2 and 10baseT Ethernet is based on CSMA/CD:
Carrier SenseMultiple Access / Collision Detection

Network throughput can also be impacted by Registry settings
(like with TCP/IP Registry settings)

Carrier Sense:
Before a system can start transmitting on a Network, it 'listens' on the cable for
a carrier signal (very much the same as when you pick up the phone and listen to
the dial-tone). Only when the cable is not busy with another data-transfer, it will
start the transmission.

Multiple Access:
As long there is no 'busy-signal' on the cable, any connected station can start
transmitting immediately.


Collision Detection:
It can happen, that 2 or more stations start transmitting at the same time, which causes
then a collision of the signal, which is then detected causing the transmitting systems
to abort, wait a little (length is randomly determined) before the systems try to access
the network cable again.



These collision with the need for re-transmissions is the main reason, why a 10base2
or 10baseT network cable cannot carry more than 70-75% of the theoretical throughput.
(to get more thoughput, you will need to use Twisted Pair Ethernet (100baseTX/100BaseT4)

Home » Software » 5 Free Tools to Test and Benchmark Your Network Speed 5 Free Tools to Test and Benchmark Your Network Speed

Network connections are very common nowadays. Not only it is used in corporate environments but at home as well due to the affordable broadband connection offered by our Internet Service Provider. Even a low end computer motherboard would probably come with a built-in network adapter. Setting up a local area network is so much easier today thanks to the multiple port router where all you need is just plug in the network cable and it will work right after going through a simple wizard configuration. Even wireless connection can be quickly and easily established by pressing the WPS button that is found on most newer generation routers.
Whether you are a computer technician, engineer or even a normal user, it is important to make sure that your network connection is working properly in order to achieve the fastest file download or transfer speed and a stable connection for streaming purposes. Here are 5 free network benchmarking tools that can be used to test your network speed between computers.
Read More:https://www.raymond.cc/blog/network-benchmark-test-your-network-speed/
1. LAN Speed Test (Lite)
LAN Speed Test
The Lite version is basically the free version of the shareware LAN Speed Test. It is an easy to use tool for measuring the speed on your LAN by copying a file to another computer that is located at the same local network. All you need to do is browse the location of another computer on the network where you have write access and click the Start Test button. You will then be prompted to set the file size of the dummy file to be transferred. The good thing about this tool is you don’t need to setup a master and client connectivity. You can also print the results at the end of the test.
If you are looking for a more powerful network tester, do take a look at the shareware version of LAN Speed Test that cost only $6 for a license. LAN Speed Test (Lite) is portable, small and works in Windows 2000 to Windows 7.

2. LANBench
LANBench
LANBench is also a free and portable utility that test the network using TCP only. You need to run LANBench on both computers, one as server and the other as client which will be the tester. The server part will only nee to click on the Listen button, while at the client side will require a bit of configuration such as specifying the server’s IP address from File > Configure. You can also define the test duration, packet size, connection and transfer mode. During benchmark you can see the live transfer rate and also the average performance.
Works on all Windows including 64-bit.

3. NetIO-GUI
NetIO-GUI
NETIO is actually a command line application for benchmarking the network throughput and there is a portable GUI version that works as a frontend. After downloading, run the extractor and followed by running NetIO-GUI.exe. You will also need to run NetIO-GUI on both computers that you want to test, one as client-mode and the other as server-mode. The server will only require to click on the Start server button while for the client, you will need to enter the server’s IP address and optionally selecting the choosing the protocol (TCP or UDP) that you want to test. NetIO will then test the connectivity based on a few different packetsize.

4. NetStress
NetStress
NetStress is a free and simple network benchmarking tool created as an internal tool by Nuts About Nets but is now being released to public. NetStress also requires to run on both computers that you want to test but the good thing about it is it can automatically find the receiver IP address. To run a test, click on the 0.0.0.0 beside the Remote Received IP and select the IP address that is listed in the window and click OK. The start button will then be enabled and clicking on it will start sending and measuring the TCP and UDP throughput.
A unique feature found in NetStress is the ability to change the MTU size where you can find in most internet optimization tool. My only gripe with NetStress is the inability to resize the window because it takes up the whole screen.

5. AIDA32
AIDA32 is actually the first and free version of the popular hardware information and benchmarking tool known as EVEREST and now AIDA64. AIDA32 comes with Network Benchmark plugin that is weirdly no longer found in EVEREST nor AIDA64. To run the network benchmark, download, unzip and run aida32.exe. Then click on the Plugin menubar followed by AIDA32 Network Benchmark. Just like most of the network benchmarking tools, you need to run the network benchmark plugin on both computers that you want to test.
AIDA32 Network Benchmark
On one computer, select Master from the drop down list located at the bottom of the window, go to the Bandwidth tab and click on the Start button. On another computer, select Slave, enter the IP address of the Master, go to Bandwidth tab and click Start. The Save button allows you to save the bandwidth chart in bitmap format.
Additional Note: There is another network benchmarking tool found in the popularPerformanceTest by PassMark software that comes with an advanced network testing tool. It can test both IPv4/IPv6 and allowing you to set the data block size and enable UDP bandwidth throttling. The advanced network test tool can be accessed from Advanced > Network in the menubar. Although PerformanceTest is a shareware, it can actually be used without limitations for 30 days. The status area shows the amount of data sent to server, CPU load, average/minimum/maximum speed which is enough to determine the consistency of the network speed.
Passmark Advanced Network Test