0% found this document useful (0 votes)
25 views3 pages

Identify Network Problem

The document discusses setting up a network monitoring log to monitor network activity. It describes key features of network monitoring systems such as detecting failures and measuring performance metrics. It outlines requirements for an effective network monitoring tool such as real-time monitoring, comprehensive capabilities, scalability, automation, and user management.

Uploaded by

hawassapoly2015
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views3 pages

Identify Network Problem

The document discusses setting up a network monitoring log to monitor network activity. It describes key features of network monitoring systems such as detecting failures and measuring performance metrics. It outlines requirements for an effective network monitoring tool such as real-time monitoring, comprehensive capabilities, scalability, automation, and user management.

Uploaded by

hawassapoly2015
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Information sheet 1.

Setting up an appropriate log to monitor network


activity

Network monitoring refers to the practice of overseeing the operation of a computer


network using specialized management software tools. Network monitoring systems are
used to ensure availability and overall performance of computers (hosts) and network
services. These systems are typically employed on larger scale corporate and university
IT networks.
Key Features in Network Monitoring
A network monitoring system is capable of detecting and reporting failures of devices or
connections. It normally measures the processor (CPU) utilization of hosts, the network
bandwidth utilization of links, and other aspects of operation. It will often send
messages (sometimes called watchdog messages) over the network to each host to
verify it is responsive to requests. When failures, unacceptably slow response, or other
unexpected behaviour is detected, these systems send additional messages called
alerts to designated locations (such as a management server, an email address, or a
phone number) to notify system administrators.
The term network monitoring describes the use of a system that constantly monitors a
computer network for slow or failing components and that notifies the network
administrator (via email, SMS or other alarms) in case of outages. It is a subset of the
functions involved in network management.
Network Monitoring Tools
Networks are the fundamentals behind businesses worldwide. It plays a pivotal role in
serving your employees for administrative purposes and your clients across the
continents. The networks help you keep information in a centralized location -
accessible to those who need and restrict every other inbound request. So how do you
provide continuous top-notch end user experience and maintain your rapidly evolving
network? Only by monitoring the availability, health, and performance of your networks
over time.
The need for network monitor tools
The importance of networks in a business environment is immense, employing
sophisticated, network performance monitoring tools is vital. With a network monitoring
solution, you can avoid potential network pitfalls.
 Network monitoring solutions aid IT admins by:
 Providing complete visibility into the IT infrastructure
 Keeping them updated of the network's state in real time
 Identifying issues before the end users are affected
 Tracking and troubleshooting performance issues early
Apart from the above, with the help of network monitoring systems, admins can now
make more informed IT decisions which help in improving business continuity.
 Requirements of a network monitoring tool

While selecting a network monitoring tool for your IT environment, it is important to


weigh in your current requirements and also your future needs. Some of the essential
elements that a network monitoring tool requires are:
 Real time monitoring
 Comprehensive monitoring capabilities
 Scalability
 Automation
 User Management
Commonly measured metrics are response time, availability and uptime, although both
consistency and reliability metrics are starting to gain popularity. The widespread
addition of WAN optimization devices is having an adverse effect on most network
monitoring tools -- especially when it comes to measuring accurate end-to-end
response time because they limit round trip visibility.

Status request failures - such as when a connection cannot be established, it times-out,


or the document or message cannot be retrieved - usually produce an action from the
monitoring system. These actions vary - an alarm may be sent to the resident system
admin, automatic fail over systems may be activated to remove the troubled server from
duty until it can be repaired.
Network management refers to the activities, methods, procedures, and tools that
pertain to the operation, administration, maintenance, and provisioning of networked
systems.

1. Operation deals with keeping the network (and the services that the network
provides) up and running smoothly. It includes monitoring the network to spot
problems as soon as possible, ideally before users are affected.
2. Administration deals with keeping track of resources in the network and how they
are assigned. It includes all the "housekeeping" that is necessary to keep the
network under control.
3. Maintenance is concerned with performing repairs and upgrades for example, when
equipment must be replaced, when a router needs a patch for an operating system
image, when a new switch is added to a network. Maintenance also involves
corrective and preventive measures to make the managed network run "better",
such as adjusting device configuration parameters.
4. Provisioning is concerned with configuring resources in the network to support a
given service.
5. Set appropriate log to monitor and notify problems

You might also like