Microsoft Windows [Version 6.0.6002]
Copyright (c) 2006 Microsoft Corporation. All rights reserved.
C:\Windows\system32>cd..
C:\Windows>cd..
C:\>iperf.exe -s -p 15000
------------------------------------------------------------
Server listening on TCP port 15000
TCP window size: 8.00 KByte (default)
------------------------------------------------------------
D:\>iperf.exe -c 192.168.255.201 -w 1m -p 15000
------------------------------------------------------------
Client connecting to 192.168.255.201, TCP port 15000
TCP window size: 1.00 MByte
------------------------------------------------------------
[988] local 192.168.255.48 port 58977 connected with 192.168.255.201 port 15000
[ ID] Interval Transfer Bandwidth
[988] 0.0-10.9 sec 24.6 MBytes 18.9 Mbits/sec
iperf.exe dead simple to use.
On the "server"
iperf.exe -p 1500 -s
where
-p is the listening port.
-s makes it the server
then on the guest
iperf.exe -c 192.168.0.1 -w 1m
where
-c makes it the client
192.168.0.1 is the ip or hostname of the iperf machine with -s
-w 1m is a TCP window of 1mb
Brilliant guys - I will check this jperf out. If ot can change the tcp/udp port on the fly as well would be a potential useful DoS tool for customers to be aware of and configure the network to protect against.....
SK
Yep, a second vote for jperf (iperf) here too. I use it all the time to prove that the network is not 'slow'. It's quite good at saturating links too if you ramp the connections up.