SlideShare uma empresa Scribd logo
1 de 21
Introduction
 Computer Networks play an increasingly
  important role in today’s technological
  age
 But before the transfer of any
  information between the computers it is
  essential to know if this transfer can
  actually take place
 For this, it is important to check if the
  computers ready for data transfer are up
  in the network or not
Network connection
diagram
Fundamentals of Network
Monitoring
   The purpose of network monitoring is the
    collecting of useful information from various
    parts of the network so that the network can
    be managed and controlled using the collected
    information
   Network monitoring techniques are developed
    to allow network management applications to
    check the states of their network devices
   As more and more network devices are used
    to build bigger networks, network monitoring
    techniques are expanded to monitoring
    networks as a whole
Three basic goals of network
monitoring:
 Performance monitoring
 Fault monitoring
 Account monitoring
A list of network indicators
   Circuit Availability: The actual time that a
    user can dial up to a network and the
    network connection is available for the user
   Node Availability: The actual time that a
    user can use network nodes, multiplexers
    and routers without having error
   Blocking Factor: The number of user
    who cannot access the network because of
    busy signal in theory
   Response Time: The time to transmit a
    signal and receive a response for the
    signal
Ideal network monitoring
system
 Integration
 Productivity
 Efficiency
Sources of data
   Measurement of metrics
     This refers to the method of obtaining
      network data by measuring certain metrics
      regarding Network performance
     An example might be the measurement of
      packet round trip times and packet loss
Basic terminology
   LAN: Ex – inside school, office building
   MAN: Ex - telephone lines
   WAN: Ex – within a town or city
 Network switch
 Router
 Port number
 IP address
Network monitoring tools
   Ping
Network monitoring tools
   Trace Route
Network monitoring tools
   Switch port mapper
Introduction to ping
 What is PING?
 How does ping helps?
 Why should we use ping?
Using the ping command
   Syntax: xxx: xxx: xxx: xxx
   To check connectivity by using the ping
    command, at the command prompt, type
    ping and the IP address you want to
    reach
Example of ping
   The following example illustrates how to send
    two pings, each 1,450 bytes in size, to IP
    address 10.3.1.131:
   C:>ping 10.3.1.131 -t
    Pinging 10.3.1.131 with 1450 bytes of data:
    Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32
    Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32
    Ping statistics for 10.3.1.131:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
    Approximate roundtrip times in milliseconds:
    Minimum = 0ms, Maximum = 10ms, Average = 2ms
Conclusion
   Network Monitoring System is the system
    which monitors the system which is connected
    in LAN. In case our server, networks are
    crashed due to overload of other devices.
   It is easy to understand for user that if color
    changes to Green it means that the system is
    up in a network, if color changes to Red then it
    means that system is down in a network
   For justifying the system is present or not in
    network there are some tools of network
    monitoring system like PING, Trace route,
    switch port mapper
Reference
   Books
     Computer Networking by author James
      Kurose and Keith Ross
     Computer network and interface by author
      Furrosion
   Links
     www.wikipedia.org
     http://www.devdaily.com/java/java-ping-class
Network monitoring system
Network monitoring system

Mais conteúdo relacionado

Mais procurados

Network management
Network managementNetwork management
Network managementMohd Arif
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and ManagementBry Cunal
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security pptSAIKAT BISWAS
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)sonangrai
 

Mais procurados (20)

5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Network management
Network managementNetwork management
Network management
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Wireshark
WiresharkWireshark
Wireshark
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 

Destaque

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring SystemGirish Naik
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert SystemSupawit Wannapila
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring SystemRofiq Fauzi
 
Question for job interviewing
Question for job interviewingQuestion for job interviewing
Question for job interviewingMelly Gunawan
 
dark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemdark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemDeepak Dangi
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms pptMoeCrotty
 
Network management objective
Network management objectiveNetwork management objective
Network management objectiveDhani Ahmad
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...ASHOKKUMAR RAMAR
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne ArchitectureSevOne
 
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy   igc 2013 roorkeeAbhishek, tarachand and satyanarayana reddy   igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkeeTarachand Veeragattapu
 
Samlight manual
Samlight manualSamlight manual
Samlight manualdiendomtpd
 

Destaque (19)

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert System
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
PRTG
PRTGPRTG
PRTG
 
Prtg network monitor
Prtg network monitorPrtg network monitor
Prtg network monitor
 
Question for job interviewing
Question for job interviewingQuestion for job interviewing
Question for job interviewing
 
Answer the question
Answer the questionAnswer the question
Answer the question
 
dark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemdark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_system
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms ppt
 
Network management objective
Network management objectiveNetwork management objective
Network management objective
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
FLEXAP WATCHER
FLEXAP WATCHERFLEXAP WATCHER
FLEXAP WATCHER
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne Architecture
 
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy   igc 2013 roorkeeAbhishek, tarachand and satyanarayana reddy   igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
 
Factory Test Systems
Factory Test SystemsFactory Test Systems
Factory Test Systems
 
Samlight manual
Samlight manualSamlight manual
Samlight manual
 

Semelhante a Network monitoring system

A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layerclaudle200415
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSKrishna Nanda
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batchJaimin Jani
 
Server congestion control
Server congestion controlServer congestion control
Server congestion controlIJCNCJournal
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security SolutionNishant Pawar
 
Group 3 Presen.pptx
Group 3 Presen.pptxGroup 3 Presen.pptx
Group 3 Presen.pptxStudyvAbhi
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd Iaetsd
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 

Semelhante a Network monitoring system (20)

A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
3. transport layer
3. transport layer3. transport layer
3. transport layer
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security Solution
 
Group 3 Presen.pptx
Group 3 Presen.pptxGroup 3 Presen.pptx
Group 3 Presen.pptx
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 

Mais de MyPresentations Services (7)

Before - after slides
Before - after slidesBefore - after slides
Before - after slides
 
Testing of hypothesis
Testing of hypothesisTesting of hypothesis
Testing of hypothesis
 
Pioneer Technologies, Pune
Pioneer Technologies, PunePioneer Technologies, Pune
Pioneer Technologies, Pune
 
Neel Engineers and Contractors
Neel Engineers and ContractorsNeel Engineers and Contractors
Neel Engineers and Contractors
 
Tourist Places of India
Tourist Places of IndiaTourist Places of India
Tourist Places of India
 
English Proverbs A-Z
English Proverbs A-ZEnglish Proverbs A-Z
English Proverbs A-Z
 
Cricket World Cup 2011
Cricket World Cup 2011Cricket World Cup 2011
Cricket World Cup 2011
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Network monitoring system

  • 1.
  • 2. Introduction  Computer Networks play an increasingly important role in today’s technological age  But before the transfer of any information between the computers it is essential to know if this transfer can actually take place  For this, it is important to check if the computers ready for data transfer are up in the network or not
  • 4. Fundamentals of Network Monitoring  The purpose of network monitoring is the collecting of useful information from various parts of the network so that the network can be managed and controlled using the collected information  Network monitoring techniques are developed to allow network management applications to check the states of their network devices  As more and more network devices are used to build bigger networks, network monitoring techniques are expanded to monitoring networks as a whole
  • 5. Three basic goals of network monitoring:  Performance monitoring  Fault monitoring  Account monitoring
  • 6. A list of network indicators  Circuit Availability: The actual time that a user can dial up to a network and the network connection is available for the user  Node Availability: The actual time that a user can use network nodes, multiplexers and routers without having error  Blocking Factor: The number of user who cannot access the network because of busy signal in theory  Response Time: The time to transmit a signal and receive a response for the signal
  • 7. Ideal network monitoring system  Integration  Productivity  Efficiency
  • 8. Sources of data  Measurement of metrics  This refers to the method of obtaining network data by measuring certain metrics regarding Network performance  An example might be the measurement of packet round trip times and packet loss
  • 9.
  • 10. Basic terminology  LAN: Ex – inside school, office building  MAN: Ex - telephone lines  WAN: Ex – within a town or city  Network switch  Router  Port number  IP address
  • 13. Network monitoring tools  Switch port mapper
  • 14.
  • 15. Introduction to ping  What is PING?  How does ping helps?  Why should we use ping?
  • 16. Using the ping command  Syntax: xxx: xxx: xxx: xxx  To check connectivity by using the ping command, at the command prompt, type ping and the IP address you want to reach
  • 17. Example of ping  The following example illustrates how to send two pings, each 1,450 bytes in size, to IP address 10.3.1.131:  C:>ping 10.3.1.131 -t Pinging 10.3.1.131 with 1450 bytes of data: Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32 Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32 Ping statistics for 10.3.1.131: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss), Approximate roundtrip times in milliseconds: Minimum = 0ms, Maximum = 10ms, Average = 2ms
  • 18. Conclusion  Network Monitoring System is the system which monitors the system which is connected in LAN. In case our server, networks are crashed due to overload of other devices.  It is easy to understand for user that if color changes to Green it means that the system is up in a network, if color changes to Red then it means that system is down in a network  For justifying the system is present or not in network there are some tools of network monitoring system like PING, Trace route, switch port mapper
  • 19. Reference  Books  Computer Networking by author James Kurose and Keith Ross  Computer network and interface by author Furrosion  Links  www.wikipedia.org  http://www.devdaily.com/java/java-ping-class