SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 11 (November 2014), PP.49-53
49
Analysis of IT Monitoring Using Open Source Software
Techniques: A Review
Ravikant sahu1
, Samta Gajhbhiye2
1
M.E. student, Computer Science and Engineering Department, CSVTU, Bhilai FET, SSGI, Bhilai, India
2
Prof., Computer Science and Engineering Department, CSVTU, Bhilai FET, SSGI, Bhilai, India.
Abstract:- The Network administrators usually rely on generic and built-in monitoring tools for network
security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up
monitoring tools and techniques as the network grows, over time. Without this, there can be network
performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to
monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network
infrastructure in an agile manner. Network security monitoring involves collecting network packet data,
segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related
questions. The purpose is to know in real-time what is happening on the network at a detailed level, and
strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router
Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load
on network links. It allows the user to see traffic load on a network over time in graphical form.
Keywords:- network security, packet, monitoring, segregating, network.
I. INTRODUCTION
The present deals with the methodologies and approaches adopted by the researchers in the field of IT
monitoring system using OSS light weight MRTG., It has been observed that the classification processes of
network and server cluster have been done using graphical approaches. In the recent time it has been also
observed that soft-computing technique OSS is making room in the classification process of IT monitoring
systems. Most researchers have adopted either enterprise level or licenses based. In this area of research, a very
little amount of work has been done using open source software coding technique. So for this one technique
have been done for IT industry by most of the researchers.
II. LITERATURE SURVEY
Several works on passive measurement systems have been proposed in the literature over the last few
years. The IT monitoring of network and server cluster has great significant to explore types of plant and
explain the usage of open source software for very new ideas share in best performance and optimization for this
techniques witch in a major concern of today‟s and future‟s mankind, however it is very time consuming task,
which is usually executed by present botanists. For monitoring hues network and server cluster in any lager IT
originations relevant discriminating features. Most time best services perform a proactive services a client side.
The best light weight and very fast performance low cost and very reliable this research work is focus.
Although the task of monitoring whether a device is up or down may seem relatively simple, the
potential consequences of the outcome of this check can be huge for an organization reliant on IT systems. The
intention of this article was to demonstrate how IT monitoring functions from a tiered approach, from simple
monitoring of whether a device is responsive, through to using Proactive services 24x7 to view the health of
services, view cost of a service being down, and to see how business service availability may impact an
organization.
From the literature it has been also found that IT monitoring graphical light weight representing [1] M.
Kodialam, T.V. Lakshman, Dynamic routing of restorable bandwidth-guaranteed tunnels using aggregated
network resource usage information, IEEE/ACM Transactions on Networking 11 (3) (2003) 399–410. [2] M.
Jain, C. Dovrolis, End-to-end available bandwidth: measurement methodology, dynamics and relation with TCP
throughput, in: Proceedings of ACM SIGCOMM, August 2002. [3] M. Jain, C. Dovrolis, Pathload: a
measurement tool for end-to-end available bandwidth, in: Proceedings of Passive and Active Measurement
Workshop, March 2002. [4] N. Hu, P. Steenkiste, Evaluation and characterization of available bandwidth
probing techniques, IEEE JSAC Special Issue in Internet and WWW Measurement, Mapping, and Modeling 21
(6) (2003) 879–894. [5] C. Dovrolis, P. Ramanathan, D. Moore, What do packet dispersion techniques measure?
Proceedings of IEEE INFOCOM 2 (Apr.) (2001) 905–914. [6] V. Ribeiro, R. Riedi, R. Baraniuk, J. Navratil, L.
Cottrell, pathChirp: efficient available bandwidth estimation for network paths, in: Proceedings of Passive and
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
50
Active Measurements Workshop, April 2003. [7] J. Strauss, D. Katabi, F. Kaashoek, A measurement study of
available bandwidthestimation tools, in: Proceedingsof Internet Measurement Conference, Miami, Florida,
October 2003. [8] T. Oetiker, Monitoring your IT gear: the MRTG story, IEEE IT Professional 3 (6) (2001) 44–
48. [9] G. Jin, B.L. Tierney, System capability effects on algorithms for network bandwidth measurement, in:
Proceedings of Internet Measurement Conference, Miami, Florida, October 2003. [10] M. Jain, C. Dovrolis, Ten
fallacies and pitfalls on end-toend available bandwidth estimation, in: Proceedings of Internet Measurement
Conference, Taormina, Italy, and October 2004. [11] L. Angrisani, S. DAntonio, M. Vadursi, G. Ventre,
Performance comparison of different techniques for available bandwidth measurement in packet-switch ed
networks, in: Proceedings of VECIMS03, Lugano, Switzerland, July 2003, pp. 212–217.
III. PROBLEM IDENTIFICATION AND SOLUTION METHODOLOGY
All IT monitoring using open source software‟s techniques is very difficult task when different.
This situation prompted the development of the Multi Router Traffic Grapher. Every five minutes, it
queried the „„Octet Counters‟‟ of the university‟s internet Gateway router. From this data, the average transfer
rate of the Internet link was derived for every five minute interval and a web page was generated with four
graphs showing the transfer rates for the last day, week, month, and year. The visual presentation on the
Web allowed everyone with a web browser to monitor the status of the link. presents an MRTG-
generated web page. While the availability of these graphs did of course not increase the capacity of the link, the
performance data provided by MRTG proved to be a key argument to convince management that a faster
Internet link was indeed needed.
A. How MRTG works
The MRTG logged its data to an ASCII file, rewriting it every five minutes, constantly consolidating it,
so that the log file would not grow over time. The log file did only store slightly more data than was needed to
draw the graphs on the web page. The graphs ere Converted to GIF format by piping a graph in PNM format to
the pnmto gif tool from the PBM package. This setup limited MRTG to monitor about 20 router ports from a
workstation.
A second obstacle for potential users was that MRTG required snmp get from the CMU NMP package.
This package proved to be rather difficult to compile on various platforms at that time. In the meantime, I had
left De Montfort University and was working at the Swiss Federal Institute of Technology. There I had no
responsibility for the campus network and the Internet link was sufficiently fast. MRTG was not one of my top
priority projects anymore. Because the CMU SNMP library did not compile on Solaris I had not even a working
installation of MRTG. This all changed when Dave Rand <daver@bungi.com> got interested in MRTG and
contributed a small C program called rate up. Rate up solved MRTG‟s performance problem by implementing
the two most CPU intensive tasks in C and thus moving them out of the MRTG Perl script. Rateup did the
logfile rewriting and the graph generation. Rate up initiated the development of MRTG-2.x. First, I modified
rate up to use Thomas Boutell‟s GD library [5] which enabled it to generate GIF files much faster than pnmtogif.
Second, the SNMP Portability problem was solved by switching from CMU‟ ssnmpget to Simon Leinen‟s Perl
SNMP module [4], written in pure Perl and thus making it virtually platform independent.
Fig 1 Multi Router Grapher (MRTG) Graphical Presentation
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
51
B. The IT monitoring system working module
IT monitoring allows you to create your own views to group the devices logically and manage them
from one place. This option helps you manage the devices under each geographical location and assign
authorized access to the business views. A Network delay in preventing a fault from occurring, or repairing a
damage in a lesser turn-around time requires a fool-proof alerting mechanism where the concerned engineer gets
to know the source of the problem by way of a meaningful alert. Scalability of the Solution All said and done, a
network monitoring solution must not take a beating and crash or it must do so with a warning at the least!A
server on which you host the monitoring solution, or the monitoring application itself is as susceptible as the
other resources on the network. Having a redundant server take over and provide un-interrupted monitoring.
IV. IMPLEMENTATION RESULTS AND DISCUSSIONS
The experimental setup of the work that has been carried over NIC Chhattisgarh state Data centers IT
monitoring system. The developed open source code are based on the near most efficient 70% other IT
monitoring software‟s and very optimal that a compare.
Fig. 2 Host status server and network cluster
So now we have templates to reduce our time-to-value, our only time consuming task is adding these
hosts “hostname by hostname”. Again, innovation in monitoring has deemed this an unnecessary evil – with the
creation of auto discovery.
Auto-discovery, in its most simplistic form, allows a monitoring system to “go out” and scan a
predefined subnet or network and find devices on that network. In our Windows example, we can scan the
subnet and discover all hosts on that network and import them into our monitoring system, ready to be modified
and have host templates added to.
The development of IT monitoring system knowledge-base consists of various steps. The experimental
setups involved in framing of knowledge-based module.
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
52
Fig 3 Server cluster service status
This gives us a great view into how each of these components is doing. What we want now is to look at
it holistically; for example as a website rather than a series of objects. To do this, Monitoring software vendors /
APM vendors have created “business process monitoring”.
V. CONCLUSION AND FUTURE SCOPE
Considerable amount of work has been done IT monitoring system using different approaches. The
present work has carried out for IT monitoring of open source software‟s techniques base on Nagios Core:
Provides the core set of monitoring and alerting capabilities and used monitoring engine. Perl: The primary
programming language used Catalyst: Web application framework used for building the web application
MySQL: A relational database used for configuration, runtime (Berkley Light Wight Database) Net-SNMP:
Provides SNMP support MRTG : Provides lightweight 2D graphing Nagvis Network infrastructure Graph
Webmin Web base Desboard Controlling utility OS : Linux.
For further study, IT monitoring network cluster and server cluster open source software‟s community
allays new updates forums and modification the new concept of IT monitoring system best optimum solution the
24x7 monitoring for IT service providers proactive services that a client location best and fast new ideas. The
development open source code has to be very flexible. It means it not only work with present research problem
but beneficial for other research problems.
ACKNOWLEDGMENT
The real spirit of achieving a goal is through the way of excellence and austerious discipline. I want to
thank SSGI, Bhilai, India, for providing me the necessary software, tools and other resources to deliver my
research work. I acknowledge with gratitude and humanity my indebtedness to Prof. Samta Gajbhiye, FET,
SSGI, SSTC, Bhilai, under whose guidance I had the privilege to complete this paper..
REFERENCES
[1]. A. Danalis and Constantinos Dovrolis. Anemos: An autonomous network monitoring system. In In
Proceedings of the 4th Passive and Active Measurements (PAM) Workshop, April2003.
[2]. Aditya Akella, Srinivasan Seshan, and Anees Shaikh. An empirical evaluation of wide-areaInternet
bottlenecks. In Proc.ACM IMC, October2003.
[3]. Kostas G. Anagnostakis, Michael B.Greenwald, and RaphaelS.Ryger. cing: Measuring network-
internal delays using only existing infrastructure. In Proc. IEEE INFOCOM, April2003.
[4]. GiuseppeDi Battista, Maurizio Patrignani, and Maurizio Pizzonia. Computing the types of the
relationships between autonomously stems. InProc. IEEEINFOCOM, April2003.
[5]. Jean-ChrysostomeBolot.End-to-endpakcetdepayandlossbehaviorintheInternet.InProc.ACM
SIGCOMM‟93, San Francisco, CA, September1993.
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
53
[6]. Tian Bu, Nick Duffield, Francesco Lo Presti, and Don Towsley. Network tomography on general
topologies. In Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement
and modeling of computer systems, pages 21–30.ACM Press, 2002.
[7]. R.Carterand M.Crovella. Measuring bottleneck link speed in packet-switch works. Technical report,
Boston University Computer Science Department, March 1996
[8]. Meeyoung Cha, Sue Moon, Chong-Dae Park, and Aman Shaikh. Positioning Relay Nodesin ISP
Networks. In Proc. IEEE INFOCOM, March 2005.
[9]. Y. Chen, D. Bindel, H. Song, and R. H. Katz. An algebraic approach to practical And scalable over
laynet work monitoring. In Proc. ACM GCOMM,August2004.
[10]. Yanghua Chu, Aditya Ganjam, T. S. Eugene Ng, Sanjay G. Rao, Kunwadee Sripanid kulchai, Jibin
Zhan, andHui Zhang. Early experience withan Internet broadcast system based on overlay multicast. In
Prof. of USENIX Annual Technical Conference, June2004.
[11]. Leonard Ciavattone, Alfred Morton, and Gomathi Ramachandran. Standardized Active measurements
on a tier 1 ip backbone. In IEEE Communications Magazine, pages90–97, San Francisco, CA,
June2003.

More Related Content

What's hot

Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...IRJET Journal
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network SecurityIRJET Journal
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...IJCNCJournal
 
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmzBaha Rababah
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET Journal
 
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2
IRJET-  	  Design and Implementation 4G Scenario on Qualnet 5.0.2IRJET-  	  Design and Implementation 4G Scenario on Qualnet 5.0.2
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2IRJET Journal
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring Systemsweta dargad
 
Ista presentation-android
Ista presentation-androidIsta presentation-android
Ista presentation-androidvinaykumar R
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challengesTELKOMNIKA JOURNAL
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
 
Error performance of jpeg and watermark
Error performance of jpeg and watermarkError performance of jpeg and watermark
Error performance of jpeg and watermarkijsptm
 
B530429_FinalDissertation
B530429_FinalDissertationB530429_FinalDissertation
B530429_FinalDissertationJasjoot Mudhar
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelIRJET Journal
 
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...ijseajournal
 
A VNF modeling approach for verification purposes
A VNF modeling approach for verification purposesA VNF modeling approach for verification purposes
A VNF modeling approach for verification purposesIJECEIAES
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageIRJET Journal
 

What's hot (20)

Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network Security
 
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...
 
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmz
 
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
IRJET- Review on Network Intrusion Detection using Recurrent Neural Network A...
 
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2
IRJET-  	  Design and Implementation 4G Scenario on Qualnet 5.0.2IRJET-  	  Design and Implementation 4G Scenario on Qualnet 5.0.2
IRJET- Design and Implementation 4G Scenario on Qualnet 5.0.2
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Ista presentation-android
Ista presentation-androidIsta presentation-android
Ista presentation-android
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challenges
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
Error performance of jpeg and watermark
Error performance of jpeg and watermarkError performance of jpeg and watermark
Error performance of jpeg and watermark
 
B530429_FinalDissertation
B530429_FinalDissertationB530429_FinalDissertation
B530429_FinalDissertation
 
An Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride ModelAn Analysis on Software Defined Wireless Network using Stride Model
An Analysis on Software Defined Wireless Network using Stride Model
 
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...
 
A VNF modeling approach for verification purposes
A VNF modeling approach for verification purposesA VNF modeling approach for verification purposes
A VNF modeling approach for verification purposes
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
 

Viewers also liked

Zdrava vyziva chudnutie
Zdrava vyziva chudnutieZdrava vyziva chudnutie
Zdrava vyziva chudnutieakoschudnut
 
Centrum redukcie vahy
Centrum redukcie vahyCentrum redukcie vahy
Centrum redukcie vahyakoschudnut
 
Ako zdravo schudnut
Ako zdravo schudnutAko zdravo schudnut
Ako zdravo schudnutakoschudnut
 
Zdrave stravovanie
Zdrave stravovanieZdrave stravovanie
Zdrave stravovanieakoschudnut
 
Zdrave stravovanie a vyziva
Zdrave stravovanie a vyzivaZdrave stravovanie a vyziva
Zdrave stravovanie a vyzivaakoschudnut
 
Reference Images
Reference ImagesReference Images
Reference ImagesAkiTenshi
 
How To Use Social Media To Get A Job
How To Use Social Media To Get A JobHow To Use Social Media To Get A Job
How To Use Social Media To Get A Jobloomer77
 

Viewers also liked (8)

Zdrava vyziva chudnutie
Zdrava vyziva chudnutieZdrava vyziva chudnutie
Zdrava vyziva chudnutie
 
Zdrave ranajky
Zdrave ranajkyZdrave ranajky
Zdrave ranajky
 
Centrum redukcie vahy
Centrum redukcie vahyCentrum redukcie vahy
Centrum redukcie vahy
 
Ako zdravo schudnut
Ako zdravo schudnutAko zdravo schudnut
Ako zdravo schudnut
 
Zdrave stravovanie
Zdrave stravovanieZdrave stravovanie
Zdrave stravovanie
 
Zdrave stravovanie a vyziva
Zdrave stravovanie a vyzivaZdrave stravovanie a vyziva
Zdrave stravovanie a vyziva
 
Reference Images
Reference ImagesReference Images
Reference Images
 
How To Use Social Media To Get A Job
How To Use Social Media To Get A JobHow To Use Social Media To Get A Job
How To Use Social Media To Get A Job
 

Similar to Analysis of IT Monitoring Using Open Source Software Techniques: A Review

Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET Journal
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceIRJET Journal
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)CSCJournals
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET Journal
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Response time optimization for vulnerability management system by combining ...
Response time optimization for vulnerability management  system by combining ...Response time optimization for vulnerability management  system by combining ...
Response time optimization for vulnerability management system by combining ...IJECEIAES
 
IRJET- A Study on IOT Approach for Monitoring Water Quality using MQTT Al...
IRJET-  	  A Study on IOT Approach for Monitoring Water Quality using MQTT Al...IRJET-  	  A Study on IOT Approach for Monitoring Water Quality using MQTT Al...
IRJET- A Study on IOT Approach for Monitoring Water Quality using MQTT Al...IRJET Journal
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat appIRJET Journal
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Networkijircee
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTIRJET Journal
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET Journal
 
Cloud data management
Cloud data managementCloud data management
Cloud data managementambitlick
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismIRJET Journal
 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...IJECEIAES
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET Journal
 
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud EnvironmentIRJET Journal
 

Similar to Analysis of IT Monitoring Using Open Source Software Techniques: A Review (20)

Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of Service
 
PacketsNeverLie
PacketsNeverLiePacketsNeverLie
PacketsNeverLie
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
Ije v4 i2International Journal of Engineering (IJE) Volume (3) Issue (4)
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data TransmissionIRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Response time optimization for vulnerability management system by combining ...
Response time optimization for vulnerability management  system by combining ...Response time optimization for vulnerability management  system by combining ...
Response time optimization for vulnerability management system by combining ...
 
IRJET- A Study on IOT Approach for Monitoring Water Quality using MQTT Al...
IRJET-  	  A Study on IOT Approach for Monitoring Water Quality using MQTT Al...IRJET-  	  A Study on IOT Approach for Monitoring Water Quality using MQTT Al...
IRJET- A Study on IOT Approach for Monitoring Water Quality using MQTT Al...
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
 
Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...Software engineering based self-checking process for cyber security system in...
Software engineering based self-checking process for cyber security system in...
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 
IRJET- Analysis of Forensics Tools in Cloud Environment
IRJET-  	  Analysis of Forensics Tools in Cloud EnvironmentIRJET-  	  Analysis of Forensics Tools in Cloud Environment
IRJET- Analysis of Forensics Tools in Cloud Environment
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Analysis of IT Monitoring Using Open Source Software Techniques: A Review

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 11 (November 2014), PP.49-53 49 Analysis of IT Monitoring Using Open Source Software Techniques: A Review Ravikant sahu1 , Samta Gajhbhiye2 1 M.E. student, Computer Science and Engineering Department, CSVTU, Bhilai FET, SSGI, Bhilai, India 2 Prof., Computer Science and Engineering Department, CSVTU, Bhilai FET, SSGI, Bhilai, India. Abstract:- The Network administrators usually rely on generic and built-in monitoring tools for network security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up monitoring tools and techniques as the network grows, over time. Without this, there can be network performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network infrastructure in an agile manner. Network security monitoring involves collecting network packet data, segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related questions. The purpose is to know in real-time what is happening on the network at a detailed level, and strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load on network links. It allows the user to see traffic load on a network over time in graphical form. Keywords:- network security, packet, monitoring, segregating, network. I. INTRODUCTION The present deals with the methodologies and approaches adopted by the researchers in the field of IT monitoring system using OSS light weight MRTG., It has been observed that the classification processes of network and server cluster have been done using graphical approaches. In the recent time it has been also observed that soft-computing technique OSS is making room in the classification process of IT monitoring systems. Most researchers have adopted either enterprise level or licenses based. In this area of research, a very little amount of work has been done using open source software coding technique. So for this one technique have been done for IT industry by most of the researchers. II. LITERATURE SURVEY Several works on passive measurement systems have been proposed in the literature over the last few years. The IT monitoring of network and server cluster has great significant to explore types of plant and explain the usage of open source software for very new ideas share in best performance and optimization for this techniques witch in a major concern of today‟s and future‟s mankind, however it is very time consuming task, which is usually executed by present botanists. For monitoring hues network and server cluster in any lager IT originations relevant discriminating features. Most time best services perform a proactive services a client side. The best light weight and very fast performance low cost and very reliable this research work is focus. Although the task of monitoring whether a device is up or down may seem relatively simple, the potential consequences of the outcome of this check can be huge for an organization reliant on IT systems. The intention of this article was to demonstrate how IT monitoring functions from a tiered approach, from simple monitoring of whether a device is responsive, through to using Proactive services 24x7 to view the health of services, view cost of a service being down, and to see how business service availability may impact an organization. From the literature it has been also found that IT monitoring graphical light weight representing [1] M. Kodialam, T.V. Lakshman, Dynamic routing of restorable bandwidth-guaranteed tunnels using aggregated network resource usage information, IEEE/ACM Transactions on Networking 11 (3) (2003) 399–410. [2] M. Jain, C. Dovrolis, End-to-end available bandwidth: measurement methodology, dynamics and relation with TCP throughput, in: Proceedings of ACM SIGCOMM, August 2002. [3] M. Jain, C. Dovrolis, Pathload: a measurement tool for end-to-end available bandwidth, in: Proceedings of Passive and Active Measurement Workshop, March 2002. [4] N. Hu, P. Steenkiste, Evaluation and characterization of available bandwidth probing techniques, IEEE JSAC Special Issue in Internet and WWW Measurement, Mapping, and Modeling 21 (6) (2003) 879–894. [5] C. Dovrolis, P. Ramanathan, D. Moore, What do packet dispersion techniques measure? Proceedings of IEEE INFOCOM 2 (Apr.) (2001) 905–914. [6] V. Ribeiro, R. Riedi, R. Baraniuk, J. Navratil, L. Cottrell, pathChirp: efficient available bandwidth estimation for network paths, in: Proceedings of Passive and
  • 2. Analysis of IT Monitoring Using Open Source Software Techniques: A Review 50 Active Measurements Workshop, April 2003. [7] J. Strauss, D. Katabi, F. Kaashoek, A measurement study of available bandwidthestimation tools, in: Proceedingsof Internet Measurement Conference, Miami, Florida, October 2003. [8] T. Oetiker, Monitoring your IT gear: the MRTG story, IEEE IT Professional 3 (6) (2001) 44– 48. [9] G. Jin, B.L. Tierney, System capability effects on algorithms for network bandwidth measurement, in: Proceedings of Internet Measurement Conference, Miami, Florida, October 2003. [10] M. Jain, C. Dovrolis, Ten fallacies and pitfalls on end-toend available bandwidth estimation, in: Proceedings of Internet Measurement Conference, Taormina, Italy, and October 2004. [11] L. Angrisani, S. DAntonio, M. Vadursi, G. Ventre, Performance comparison of different techniques for available bandwidth measurement in packet-switch ed networks, in: Proceedings of VECIMS03, Lugano, Switzerland, July 2003, pp. 212–217. III. PROBLEM IDENTIFICATION AND SOLUTION METHODOLOGY All IT monitoring using open source software‟s techniques is very difficult task when different. This situation prompted the development of the Multi Router Traffic Grapher. Every five minutes, it queried the „„Octet Counters‟‟ of the university‟s internet Gateway router. From this data, the average transfer rate of the Internet link was derived for every five minute interval and a web page was generated with four graphs showing the transfer rates for the last day, week, month, and year. The visual presentation on the Web allowed everyone with a web browser to monitor the status of the link. presents an MRTG- generated web page. While the availability of these graphs did of course not increase the capacity of the link, the performance data provided by MRTG proved to be a key argument to convince management that a faster Internet link was indeed needed. A. How MRTG works The MRTG logged its data to an ASCII file, rewriting it every five minutes, constantly consolidating it, so that the log file would not grow over time. The log file did only store slightly more data than was needed to draw the graphs on the web page. The graphs ere Converted to GIF format by piping a graph in PNM format to the pnmto gif tool from the PBM package. This setup limited MRTG to monitor about 20 router ports from a workstation. A second obstacle for potential users was that MRTG required snmp get from the CMU NMP package. This package proved to be rather difficult to compile on various platforms at that time. In the meantime, I had left De Montfort University and was working at the Swiss Federal Institute of Technology. There I had no responsibility for the campus network and the Internet link was sufficiently fast. MRTG was not one of my top priority projects anymore. Because the CMU SNMP library did not compile on Solaris I had not even a working installation of MRTG. This all changed when Dave Rand <daver@bungi.com> got interested in MRTG and contributed a small C program called rate up. Rate up solved MRTG‟s performance problem by implementing the two most CPU intensive tasks in C and thus moving them out of the MRTG Perl script. Rateup did the logfile rewriting and the graph generation. Rate up initiated the development of MRTG-2.x. First, I modified rate up to use Thomas Boutell‟s GD library [5] which enabled it to generate GIF files much faster than pnmtogif. Second, the SNMP Portability problem was solved by switching from CMU‟ ssnmpget to Simon Leinen‟s Perl SNMP module [4], written in pure Perl and thus making it virtually platform independent. Fig 1 Multi Router Grapher (MRTG) Graphical Presentation
  • 3. Analysis of IT Monitoring Using Open Source Software Techniques: A Review 51 B. The IT monitoring system working module IT monitoring allows you to create your own views to group the devices logically and manage them from one place. This option helps you manage the devices under each geographical location and assign authorized access to the business views. A Network delay in preventing a fault from occurring, or repairing a damage in a lesser turn-around time requires a fool-proof alerting mechanism where the concerned engineer gets to know the source of the problem by way of a meaningful alert. Scalability of the Solution All said and done, a network monitoring solution must not take a beating and crash or it must do so with a warning at the least!A server on which you host the monitoring solution, or the monitoring application itself is as susceptible as the other resources on the network. Having a redundant server take over and provide un-interrupted monitoring. IV. IMPLEMENTATION RESULTS AND DISCUSSIONS The experimental setup of the work that has been carried over NIC Chhattisgarh state Data centers IT monitoring system. The developed open source code are based on the near most efficient 70% other IT monitoring software‟s and very optimal that a compare. Fig. 2 Host status server and network cluster So now we have templates to reduce our time-to-value, our only time consuming task is adding these hosts “hostname by hostname”. Again, innovation in monitoring has deemed this an unnecessary evil – with the creation of auto discovery. Auto-discovery, in its most simplistic form, allows a monitoring system to “go out” and scan a predefined subnet or network and find devices on that network. In our Windows example, we can scan the subnet and discover all hosts on that network and import them into our monitoring system, ready to be modified and have host templates added to. The development of IT monitoring system knowledge-base consists of various steps. The experimental setups involved in framing of knowledge-based module.
  • 4. Analysis of IT Monitoring Using Open Source Software Techniques: A Review 52 Fig 3 Server cluster service status This gives us a great view into how each of these components is doing. What we want now is to look at it holistically; for example as a website rather than a series of objects. To do this, Monitoring software vendors / APM vendors have created “business process monitoring”. V. CONCLUSION AND FUTURE SCOPE Considerable amount of work has been done IT monitoring system using different approaches. The present work has carried out for IT monitoring of open source software‟s techniques base on Nagios Core: Provides the core set of monitoring and alerting capabilities and used monitoring engine. Perl: The primary programming language used Catalyst: Web application framework used for building the web application MySQL: A relational database used for configuration, runtime (Berkley Light Wight Database) Net-SNMP: Provides SNMP support MRTG : Provides lightweight 2D graphing Nagvis Network infrastructure Graph Webmin Web base Desboard Controlling utility OS : Linux. For further study, IT monitoring network cluster and server cluster open source software‟s community allays new updates forums and modification the new concept of IT monitoring system best optimum solution the 24x7 monitoring for IT service providers proactive services that a client location best and fast new ideas. The development open source code has to be very flexible. It means it not only work with present research problem but beneficial for other research problems. ACKNOWLEDGMENT The real spirit of achieving a goal is through the way of excellence and austerious discipline. I want to thank SSGI, Bhilai, India, for providing me the necessary software, tools and other resources to deliver my research work. I acknowledge with gratitude and humanity my indebtedness to Prof. Samta Gajbhiye, FET, SSGI, SSTC, Bhilai, under whose guidance I had the privilege to complete this paper.. REFERENCES [1]. A. Danalis and Constantinos Dovrolis. Anemos: An autonomous network monitoring system. In In Proceedings of the 4th Passive and Active Measurements (PAM) Workshop, April2003. [2]. Aditya Akella, Srinivasan Seshan, and Anees Shaikh. An empirical evaluation of wide-areaInternet bottlenecks. In Proc.ACM IMC, October2003. [3]. Kostas G. Anagnostakis, Michael B.Greenwald, and RaphaelS.Ryger. cing: Measuring network- internal delays using only existing infrastructure. In Proc. IEEE INFOCOM, April2003. [4]. GiuseppeDi Battista, Maurizio Patrignani, and Maurizio Pizzonia. Computing the types of the relationships between autonomously stems. InProc. IEEEINFOCOM, April2003. [5]. Jean-ChrysostomeBolot.End-to-endpakcetdepayandlossbehaviorintheInternet.InProc.ACM SIGCOMM‟93, San Francisco, CA, September1993.
  • 5. Analysis of IT Monitoring Using Open Source Software Techniques: A Review 53 [6]. Tian Bu, Nick Duffield, Francesco Lo Presti, and Don Towsley. Network tomography on general topologies. In Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 21–30.ACM Press, 2002. [7]. R.Carterand M.Crovella. Measuring bottleneck link speed in packet-switch works. Technical report, Boston University Computer Science Department, March 1996 [8]. Meeyoung Cha, Sue Moon, Chong-Dae Park, and Aman Shaikh. Positioning Relay Nodesin ISP Networks. In Proc. IEEE INFOCOM, March 2005. [9]. Y. Chen, D. Bindel, H. Song, and R. H. Katz. An algebraic approach to practical And scalable over laynet work monitoring. In Proc. ACM GCOMM,August2004. [10]. Yanghua Chu, Aditya Ganjam, T. S. Eugene Ng, Sanjay G. Rao, Kunwadee Sripanid kulchai, Jibin Zhan, andHui Zhang. Early experience withan Internet broadcast system based on overlay multicast. In Prof. of USENIX Annual Technical Conference, June2004. [11]. Leonard Ciavattone, Alfred Morton, and Gomathi Ramachandran. Standardized Active measurements on a tier 1 ip backbone. In IEEE Communications Magazine, pages90–97, San Francisco, CA, June2003.