Module 1 Assignment - Copy
Module 1 Assignment - Copy
UWF
2
Table of Contents
Introduction.................................................................................................................................................3
Network Monitoring Tools...........................................................................................................................4
Recommended Tools...................................................................................................................................5
Network Monitoring Challenges..................................................................................................................6
Conclusion...................................................................................................................................................6
References...................................................................................................................................................6
3
network administrators to obtain data, perform appropriate tasks, and identify the problems in the
network. Network Performance Monitoring collects data by flow data, Simple Network Management,
Flow data is generated from network devices and provides information about the network
traffic. It’s configured in routers and switches to collect IP traffic data. Its advantage is that it gives a
quick general overview which can save time in identifying the problem.
Packet capture gives detailed traffic on one end to another. It shows how much of the
information is being transferred over a certain amount of time and can be in the form of graphs. There
are two forms of packet capturing which are network tapping and port mirroring. Both involve using the
switches. Network tap monitors the destination and the switch while port mirroring sends copy of the
packet to another port (Network Performance Monitoring: How to Measure Network Performance,
2023).
Simple Network Management Protocol is a component of the Internet Protocol Suite used to
monitor devices with networks such as printers, routers, and so on. It collects information such as
operational status, bandwidth, and errors. This method is mainly used to observe problems regarding
network connection between devices (SNMP: Understanding Simple Network Management Protocol,
2020).
network. If neglect occurs while monitoring, then disrupted network will occur which can create issues
from frustrating customers to hurting businesses. It is also a form of cybersecurity protecting valuable
information and preventing threats from breaching the system. Any information leaked by a security
4
breach or threats is very damaging to any company which means that this is a top priority in network
monitoring. Many businesses rely on the Internet for working and advertising and is important that the
network is maintained for optimal productivity (Network Performance Monitoring: How to Measure
different types of monitoring (traffic flow, packet loss, latency, etc.). Due to the nature of network-related
data and the fact that malicious traffic can appear legitimate, it is important to track multiple data points
While the quantity of traffic moving through a network doesn’t paint a complete picture of
network health by itself, it is still an important metric to track to get a general sense of the state of the
network. One option that is free is Argus. Argus collects various data points related to traffic flow and
stores them so that they can be translated into XML files (Keshav, 2006).
Analyzing data packets (also known as “packet sniffing”) at the micro and micro levels can
provide valuable insights into the data being transmitted across a network. One of the most well-known
tools used for packet sniffing is Wireshark. Wireshark understands both data encapsulation as well as the
abstraction of networks (Pandit, 2021). It can analyze packets in real-time, as well as analyze packets that
have already been captured/saved to a file. Data can be read from a variety of protocols, such as
Latency should be kept to a minimum to ensure that data is delivered between any given points
in a network in a timely manner. A free and widely available tool for monitoring latency is the ‘ping’
command. Ping uses ICMP (Internet Control Message Protocol) to measure latency. It is typically
accessed via the operating system’s command line console. Although manual, it is a good way to quickly
Recommended Tools
Before diving into specific tool recommendations, it is important to establish a few key best
practices for network monitoring. Before any monitoring tools are implemented, it is important to
establish baselines, based on expected network behavior, for all key metrics. This will allow admins to set
thresholds that allow them to be proactive. For example, if a baseline for latency is properly established,
and a threshold is set at an ideal level above that baseline (at a level where the latency isn’t client-
impacting but is still out of the ordinary), then this will allow admins to be alerted when latency meets
that threshold. They will then be able to take corrective action before users/clients are impacted.
Additionally, network monitoring tools should provide a holistic view of the network/the flow of data
through the network, and they should have built-in reporting capabilities that show trends over-time,
OpManager allows for detailed tracking of a multitude of metrics via an intuitive, clear user interface. It
has several built-in options for creating topology maps and dashboards for metric monitoring, and it
allows admins to run ad-hoc/scheduled reports. Additionally, it has a companion app that is available for
both Android and iOS, which allows admins to easily keep tabs on the health of their networks no matter
Network Monitor. It allows for detailed monitoring of every device, application, and service on a given
network, and it has a highly customizable reporting suite. Also, it features automatic network discovery,
which allows for quick setup of any new devices added to the network. Like OpManager, PRTG Network
When evaluating network monitoring tools, it’s important to consider the size/complexity of the
network, SLAs, size/location of the team members that oversee the network, as well as any networking
6
issues the organization has dealt with in the past. This will allow the organization to select the most
consider. One of the main challenges is root cause identification. While network monitoring provides
large volumes of data in the way of logs/error messages/etc., being able to pinpoint the root cause of a
specific issue can still be challenging due to the amount of data that needs to be analyzed. Having a deep
understanding of the network and how all the components interact with each other can help with this.
Another challenge with network monitoring is the effective utilization of the data collected by the
monitoring tools. Having a good understanding of the types of network issues that are most detrimental
to the organization is key to getting the most out of all the data being collected (ManageEngine
OpManager, n.d.).
Conclusion
Network Performance Monitoring's main priority is to maintain and collect information regarding the
network performance. It is important because many customers and companies rely on quality networks
to efficiently get certain performances achieved. Latency, data packets, and traffic flows are important
features when looking for tools to monitor the network. Certain tools such as OpManager and Paessler
PRTG are used to monitor these features and have their own specialties. Challenges such as identifying
root cause and data collection must be considered before choosing the right tools for network
performance monitoring.
7
References
Abdullahi, A. (2022). Best Network Latency Testing Tools. Retrieved from Enterprise Networking Planet:
https://www.enterprisenetworkingplanet.com/guides/best-network-latency-testing-tools/
Gillis, A. S. (n.d.). Network Performance Monitoring (NPM). Retrieved from Tech Target:
https://www.techtarget.com/searchnetworking/definition/network-performance-monitoring
Keshav, T. (2006). A Survey of Network Performance Monitoring Tools. St. Louis: University of
Washington.
Network Performance Monitoring: How to Measure Network Performance. (2023). Retrieved from
Kaseya: https://www.kaseya.com/blog/network-performance-monitoring/#:~:text=It%20helps
%20them%20detect%20issues,helps%20and%20prevents%20cybersecurity%20breaches.
Ninja, T. (2023). Network Monitoring & Management Best Practices for 2023. Retrieved from NinjaOne:
https://www.ninjaone.com/blog/network-monitoring-management-best-practices-for-
beginners/
SNMP: Understanding Simple Network Management Protocol. (2020). Retrieved from Kaseya:
https://www.kaseya.com/blog/snmp-simple-network-management-protocol/