SlideShare a Scribd company logo
1 of 21
Introduction
 Computer Networks play an increasingly
  important role in today’s technological
  age
 But before the transfer of any
  information between the computers it is
  essential to know if this transfer can
  actually take place
 For this, it is important to check if the
  computers ready for data transfer are up
  in the network or not
Network connection
diagram
Fundamentals of Network
Monitoring
   The purpose of network monitoring is the
    collecting of useful information from various
    parts of the network so that the network can
    be managed and controlled using the collected
    information
   Network monitoring techniques are developed
    to allow network management applications to
    check the states of their network devices
   As more and more network devices are used
    to build bigger networks, network monitoring
    techniques are expanded to monitoring
    networks as a whole
Three basic goals of network
monitoring:
 Performance monitoring
 Fault monitoring
 Account monitoring
A list of network indicators
   Circuit Availability: The actual time that a
    user can dial up to a network and the
    network connection is available for the user
   Node Availability: The actual time that a
    user can use network nodes, multiplexers
    and routers without having error
   Blocking Factor: The number of user
    who cannot access the network because of
    busy signal in theory
   Response Time: The time to transmit a
    signal and receive a response for the
    signal
Ideal network monitoring
system
 Integration
 Productivity
 Efficiency
Sources of data
   Measurement of metrics
     This refers to the method of obtaining
      network data by measuring certain metrics
      regarding Network performance
     An example might be the measurement of
      packet round trip times and packet loss
Basic terminology
   LAN: Ex – inside school, office building
   MAN: Ex - telephone lines
   WAN: Ex – within a town or city
 Network switch
 Router
 Port number
 IP address
Network monitoring tools
   Ping
Network monitoring tools
   Trace Route
Network monitoring tools
   Switch port mapper
Introduction to ping
 What is PING?
 How does ping helps?
 Why should we use ping?
Using the ping command
   Syntax: xxx: xxx: xxx: xxx
   To check connectivity by using the ping
    command, at the command prompt, type
    ping and the IP address you want to
    reach
Example of ping
   The following example illustrates how to send
    two pings, each 1,450 bytes in size, to IP
    address 10.3.1.131:
   C:>ping 10.3.1.131 -t
    Pinging 10.3.1.131 with 1450 bytes of data:
    Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32
    Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32
    Ping statistics for 10.3.1.131:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
    Approximate roundtrip times in milliseconds:
    Minimum = 0ms, Maximum = 10ms, Average = 2ms
Conclusion
   Network Monitoring System is the system
    which monitors the system which is connected
    in LAN. In case our server, networks are
    crashed due to overload of other devices.
   It is easy to understand for user that if color
    changes to Green it means that the system is
    up in a network, if color changes to Red then it
    means that system is down in a network
   For justifying the system is present or not in
    network there are some tools of network
    monitoring system like PING, Trace route,
    switch port mapper
Reference
   Books
     Computer Networking by author James
      Kurose and Keith Ross
     Computer network and interface by author
      Furrosion
   Links
     www.wikipedia.org
     http://www.devdaily.com/java/java-ping-class
Network monitoring system
Network monitoring system

More Related Content

What's hot

What's hot (20)

Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Kali linux useful tools
Kali linux useful toolsKali linux useful tools
Kali linux useful tools
 
Cisco Packet Tracer Overview
Cisco Packet Tracer OverviewCisco Packet Tracer Overview
Cisco Packet Tracer Overview
 
SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)
 
Wireshark
WiresharkWireshark
Wireshark
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Firewall
FirewallFirewall
Firewall
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
10 Steps to Improve Your Network Monitoring
10 Steps to Improve Your Network Monitoring10 Steps to Improve Your Network Monitoring
10 Steps to Improve Your Network Monitoring
 
Nmap
NmapNmap
Nmap
 
Wireshark - presentation
Wireshark - presentationWireshark - presentation
Wireshark - presentation
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
VPN
VPNVPN
VPN
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Ns2
Ns2Ns2
Ns2
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 

Viewers also liked

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring SystemGirish Naik
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert SystemSupawit Wannapila
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Question for job interviewing
Question for job interviewingQuestion for job interviewing
Question for job interviewingMelly Gunawan
 
dark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemdark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemDeepak Dangi
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms pptMoeCrotty
 
Network management objective
Network management objectiveNetwork management objective
Network management objectiveDhani Ahmad
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...ASHOKKUMAR RAMAR
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne ArchitectureSevOne
 
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy   igc 2013 roorkeeAbhishek, tarachand and satyanarayana reddy   igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkeeTarachand Veeragattapu
 
Samlight manual
Samlight manualSamlight manual
Samlight manualdiendomtpd
 

Viewers also liked (19)

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert System
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
PRTG
PRTGPRTG
PRTG
 
Network management
Network managementNetwork management
Network management
 
Prtg network monitor
Prtg network monitorPrtg network monitor
Prtg network monitor
 
Question for job interviewing
Question for job interviewingQuestion for job interviewing
Question for job interviewing
 
Answer the question
Answer the questionAnswer the question
Answer the question
 
dark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemdark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_system
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms ppt
 
Network management objective
Network management objectiveNetwork management objective
Network management objective
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
FLEXAP WATCHER
FLEXAP WATCHERFLEXAP WATCHER
FLEXAP WATCHER
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne Architecture
 
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy   igc 2013 roorkeeAbhishek, tarachand and satyanarayana reddy   igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
 
Factory Test Systems
Factory Test SystemsFactory Test Systems
Factory Test Systems
 
Samlight manual
Samlight manualSamlight manual
Samlight manual
 

Similar to Network monitoring system

A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layerclaudle200415
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSKrishna Nanda
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batchJaimin Jani
 
Server congestion control
Server congestion controlServer congestion control
Server congestion controlIJCNCJournal
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security SolutionNishant Pawar
 
Group 3 Presen.pptx
Group 3 Presen.pptxGroup 3 Presen.pptx
Group 3 Presen.pptxStudyvAbhi
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd Iaetsd
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 

Similar to Network monitoring system (20)

A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
3. transport layer
3. transport layer3. transport layer
3. transport layer
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security Solution
 
Group 3 Presen.pptx
Group 3 Presen.pptxGroup 3 Presen.pptx
Group 3 Presen.pptx
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 

More from MyPresentations Services (7)

Before - after slides
Before - after slidesBefore - after slides
Before - after slides
 
Testing of hypothesis
Testing of hypothesisTesting of hypothesis
Testing of hypothesis
 
Pioneer Technologies, Pune
Pioneer Technologies, PunePioneer Technologies, Pune
Pioneer Technologies, Pune
 
Neel Engineers and Contractors
Neel Engineers and ContractorsNeel Engineers and Contractors
Neel Engineers and Contractors
 
Tourist Places of India
Tourist Places of IndiaTourist Places of India
Tourist Places of India
 
English Proverbs A-Z
English Proverbs A-ZEnglish Proverbs A-Z
English Proverbs A-Z
 
Cricket World Cup 2011
Cricket World Cup 2011Cricket World Cup 2011
Cricket World Cup 2011
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Network monitoring system

  • 1.
  • 2. Introduction  Computer Networks play an increasingly important role in today’s technological age  But before the transfer of any information between the computers it is essential to know if this transfer can actually take place  For this, it is important to check if the computers ready for data transfer are up in the network or not
  • 4. Fundamentals of Network Monitoring  The purpose of network monitoring is the collecting of useful information from various parts of the network so that the network can be managed and controlled using the collected information  Network monitoring techniques are developed to allow network management applications to check the states of their network devices  As more and more network devices are used to build bigger networks, network monitoring techniques are expanded to monitoring networks as a whole
  • 5. Three basic goals of network monitoring:  Performance monitoring  Fault monitoring  Account monitoring
  • 6. A list of network indicators  Circuit Availability: The actual time that a user can dial up to a network and the network connection is available for the user  Node Availability: The actual time that a user can use network nodes, multiplexers and routers without having error  Blocking Factor: The number of user who cannot access the network because of busy signal in theory  Response Time: The time to transmit a signal and receive a response for the signal
  • 7. Ideal network monitoring system  Integration  Productivity  Efficiency
  • 8. Sources of data  Measurement of metrics  This refers to the method of obtaining network data by measuring certain metrics regarding Network performance  An example might be the measurement of packet round trip times and packet loss
  • 9.
  • 10. Basic terminology  LAN: Ex – inside school, office building  MAN: Ex - telephone lines  WAN: Ex – within a town or city  Network switch  Router  Port number  IP address
  • 13. Network monitoring tools  Switch port mapper
  • 14.
  • 15. Introduction to ping  What is PING?  How does ping helps?  Why should we use ping?
  • 16. Using the ping command  Syntax: xxx: xxx: xxx: xxx  To check connectivity by using the ping command, at the command prompt, type ping and the IP address you want to reach
  • 17. Example of ping  The following example illustrates how to send two pings, each 1,450 bytes in size, to IP address 10.3.1.131:  C:>ping 10.3.1.131 -t Pinging 10.3.1.131 with 1450 bytes of data: Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32 Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32 Ping statistics for 10.3.1.131: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss), Approximate roundtrip times in milliseconds: Minimum = 0ms, Maximum = 10ms, Average = 2ms
  • 18. Conclusion  Network Monitoring System is the system which monitors the system which is connected in LAN. In case our server, networks are crashed due to overload of other devices.  It is easy to understand for user that if color changes to Green it means that the system is up in a network, if color changes to Red then it means that system is down in a network  For justifying the system is present or not in network there are some tools of network monitoring system like PING, Trace route, switch port mapper
  • 19. Reference  Books  Computer Networking by author James Kurose and Keith Ross  Computer network and interface by author Furrosion  Links  www.wikipedia.org  http://www.devdaily.com/java/java-ping-class