SlideShare uma empresa Scribd logo
1 de 21
Introduction
 Computer Networks play an increasingly
  important role in today’s technological
  age
 But before the transfer of any
  information between the computers it is
  essential to know if this transfer can
  actually take place
 For this, it is important to check if the
  computers ready for data transfer are up
  in the network or not
Network connection
diagram
Fundamentals of Network
Monitoring
   The purpose of network monitoring is the
    collecting of useful information from various
    parts of the network so that the network can
    be managed and controlled using the collected
    information
   Network monitoring techniques are developed
    to allow network management applications to
    check the states of their network devices
   As more and more network devices are used
    to build bigger networks, network monitoring
    techniques are expanded to monitoring
    networks as a whole
Three basic goals of network
monitoring:
 Performance monitoring
 Fault monitoring
 Account monitoring
A list of network indicators
   Circuit Availability: The actual time that a
    user can dial up to a network and the
    network connection is available for the user
   Node Availability: The actual time that a
    user can use network nodes, multiplexers
    and routers without having error
   Blocking Factor: The number of user
    who cannot access the network because of
    busy signal in theory
   Response Time: The time to transmit a
    signal and receive a response for the
    signal
Ideal network monitoring
system
 Integration
 Productivity
 Efficiency
Sources of data
   Measurement of metrics
     This refers to the method of obtaining
      network data by measuring certain metrics
      regarding Network performance
     An example might be the measurement of
      packet round trip times and packet loss
Basic terminology
   LAN: Ex – inside school, office building
   MAN: Ex - telephone lines
   WAN: Ex – within a town or city
 Network switch
 Router
 Port number
 IP address
Network monitoring tools
   Ping
Network monitoring tools
   Trace Route
Network monitoring tools
   Switch port mapper
Introduction to ping
 What is PING?
 How does ping helps?
 Why should we use ping?
Using the ping command
   Syntax: xxx: xxx: xxx: xxx
   To check connectivity by using the ping
    command, at the command prompt, type
    ping and the IP address you want to
    reach
Example of ping
   The following example illustrates how to send
    two pings, each 1,450 bytes in size, to IP
    address 10.3.1.131:
   C:>ping 10.3.1.131 -t
    Pinging 10.3.1.131 with 1450 bytes of data:
    Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32
    Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32
    Ping statistics for 10.3.1.131:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
    Approximate roundtrip times in milliseconds:
    Minimum = 0ms, Maximum = 10ms, Average = 2ms
Conclusion
   Network Monitoring System is the system
    which monitors the system which is connected
    in LAN. In case our server, networks are
    crashed due to overload of other devices.
   It is easy to understand for user that if color
    changes to Green it means that the system is
    up in a network, if color changes to Red then it
    means that system is down in a network
   For justifying the system is present or not in
    network there are some tools of network
    monitoring system like PING, Trace route,
    switch port mapper
Reference
   Books
     Computer Networking by author James
      Kurose and Keith Ross
     Computer network and interface by author
      Furrosion
   Links
     www.wikipedia.org
     http://www.devdaily.com/java/java-ping-class
Network monitoring system
Network monitoring system

Mais conteúdo relacionado

Mais procurados

SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)Mohammad Awais Javaid
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesrahul kundu
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
Network Management
Network ManagementNetwork Management
Network Managementazura787
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring SystemRofiq Fauzi
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)Krishna Kahar
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)Joud Khattab
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network managementbhavikaorg
 

Mais procurados (20)

SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Network Management
Network ManagementNetwork Management
Network Management
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Snmp
SnmpSnmp
Snmp
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
Network management
Network managementNetwork management
Network management
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Snmp
SnmpSnmp
Snmp
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
SNMP
SNMPSNMP
SNMP
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
 

Destaque

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring SystemGirish Naik
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring BasicsRob Dunn
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert SystemSupawit Wannapila
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
Question for job interviewing
Question for job interviewingQuestion for job interviewing
Question for job interviewingMelly Gunawan
 
dark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemdark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemDeepak Dangi
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms pptMoeCrotty
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...ASHOKKUMAR RAMAR
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne ArchitectureSevOne
 
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy   igc 2013 roorkeeAbhishek, tarachand and satyanarayana reddy   igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkeeTarachand Veeragattapu
 
Samlight manual
Samlight manualSamlight manual
Samlight manualdiendomtpd
 

Destaque (19)

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert System
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
PRTG
PRTGPRTG
PRTG
 
Prtg network monitor
Prtg network monitorPrtg network monitor
Prtg network monitor
 
Question for job interviewing
Question for job interviewingQuestion for job interviewing
Question for job interviewing
 
Answer the question
Answer the questionAnswer the question
Answer the question
 
dark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemdark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_system
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms ppt
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
FLEXAP WATCHER
FLEXAP WATCHERFLEXAP WATCHER
FLEXAP WATCHER
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne Architecture
 
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy   igc 2013 roorkeeAbhishek, tarachand and satyanarayana reddy   igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
 
Factory Test Systems
Factory Test SystemsFactory Test Systems
Factory Test Systems
 
Samlight manual
Samlight manualSamlight manual
Samlight manual
 

Semelhante a Network monitoring system

A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layerclaudle200415
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSKrishna Nanda
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batchJaimin Jani
 
Server congestion control
Server congestion controlServer congestion control
Server congestion controlIJCNCJournal
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security SolutionNishant Pawar
 
Group 3 Presen.pptx
Group 3 Presen.pptxGroup 3 Presen.pptx
Group 3 Presen.pptxStudyvAbhi
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd Iaetsd
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 

Semelhante a Network monitoring system (20)

A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
3. transport layer
3. transport layer3. transport layer
3. transport layer
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security Solution
 
Group 3 Presen.pptx
Group 3 Presen.pptxGroup 3 Presen.pptx
Group 3 Presen.pptx
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 

Mais de MyPresentations Services (7)

Before - after slides
Before - after slidesBefore - after slides
Before - after slides
 
Testing of hypothesis
Testing of hypothesisTesting of hypothesis
Testing of hypothesis
 
Pioneer Technologies, Pune
Pioneer Technologies, PunePioneer Technologies, Pune
Pioneer Technologies, Pune
 
Neel Engineers and Contractors
Neel Engineers and ContractorsNeel Engineers and Contractors
Neel Engineers and Contractors
 
Tourist Places of India
Tourist Places of IndiaTourist Places of India
Tourist Places of India
 
English Proverbs A-Z
English Proverbs A-ZEnglish Proverbs A-Z
English Proverbs A-Z
 
Cricket World Cup 2011
Cricket World Cup 2011Cricket World Cup 2011
Cricket World Cup 2011
 

Último

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Network monitoring system

  • 1.
  • 2. Introduction  Computer Networks play an increasingly important role in today’s technological age  But before the transfer of any information between the computers it is essential to know if this transfer can actually take place  For this, it is important to check if the computers ready for data transfer are up in the network or not
  • 4. Fundamentals of Network Monitoring  The purpose of network monitoring is the collecting of useful information from various parts of the network so that the network can be managed and controlled using the collected information  Network monitoring techniques are developed to allow network management applications to check the states of their network devices  As more and more network devices are used to build bigger networks, network monitoring techniques are expanded to monitoring networks as a whole
  • 5. Three basic goals of network monitoring:  Performance monitoring  Fault monitoring  Account monitoring
  • 6. A list of network indicators  Circuit Availability: The actual time that a user can dial up to a network and the network connection is available for the user  Node Availability: The actual time that a user can use network nodes, multiplexers and routers without having error  Blocking Factor: The number of user who cannot access the network because of busy signal in theory  Response Time: The time to transmit a signal and receive a response for the signal
  • 7. Ideal network monitoring system  Integration  Productivity  Efficiency
  • 8. Sources of data  Measurement of metrics  This refers to the method of obtaining network data by measuring certain metrics regarding Network performance  An example might be the measurement of packet round trip times and packet loss
  • 9.
  • 10. Basic terminology  LAN: Ex – inside school, office building  MAN: Ex - telephone lines  WAN: Ex – within a town or city  Network switch  Router  Port number  IP address
  • 13. Network monitoring tools  Switch port mapper
  • 14.
  • 15. Introduction to ping  What is PING?  How does ping helps?  Why should we use ping?
  • 16. Using the ping command  Syntax: xxx: xxx: xxx: xxx  To check connectivity by using the ping command, at the command prompt, type ping and the IP address you want to reach
  • 17. Example of ping  The following example illustrates how to send two pings, each 1,450 bytes in size, to IP address 10.3.1.131:  C:>ping 10.3.1.131 -t Pinging 10.3.1.131 with 1450 bytes of data: Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32 Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32 Ping statistics for 10.3.1.131: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss), Approximate roundtrip times in milliseconds: Minimum = 0ms, Maximum = 10ms, Average = 2ms
  • 18. Conclusion  Network Monitoring System is the system which monitors the system which is connected in LAN. In case our server, networks are crashed due to overload of other devices.  It is easy to understand for user that if color changes to Green it means that the system is up in a network, if color changes to Red then it means that system is down in a network  For justifying the system is present or not in network there are some tools of network monitoring system like PING, Trace route, switch port mapper
  • 19. Reference  Books  Computer Networking by author James Kurose and Keith Ross  Computer network and interface by author Furrosion  Links  www.wikipedia.org  http://www.devdaily.com/java/java-ping-class