SlideShare a Scribd company logo
1 of 21
Chapter 7
Resource Monitoring & Management
1
Outline
Bandwidth
• Definition
• Bandwidth management
• Tools for bandwidth management
File & Mail Servers
Network Printers
Remote Administration
Resource Monitoring & Management 2
Bandwidth (Definition)
In communications, the difference between the highest and lowest
frequencies available for transmission in any given range.
• It is measured in HZ
In networking, the transmission capacity of a computer or a
communications channel, stated in megabits per second (Mbps)
Resource Monitoring & Management
3
Bandwidth management
It is a generic term that describes the various techniques, technologies,
tools and policies employed by an organization to enable the most efficient
use of its bandwidth resources.
It is defined as a process of allocating bandwidth resources to critical
applications on a network.
It aims to improve performance of an Internet connection by removing
unnecessary traffic.
• The aim of managing network capacity is to have the right amount of bandwidth in
the right place at the right time for the right set of users and applications.
Through efficient use, we can achieve both the minimization of
unnecessary bandwidth consumption and the delivery of the best possible
levels of service to users.
Resource Monitoring & Management 4
Bandwidth management
Often bandwidth management may be applied on the WAN segment that
connects the institution to the greater Internet.
It may also be applied on critical internal segments, such as segments
connecting campus residence halls to the rest of the network.
Bandwidth management is a dynamic approach that provides
adaptability, feasibility and efficiency for real-world network operations.
Resource Monitoring & Management
5
Bandwidth Management activities
Bandwidth management requires three activities:
• Monitoring
• Policy and ,
• Implementation.
Resource Monitoring & Management
6
Monitoring
Monitoring is important for defining and enforcing policy
• Network monitoring informs the process of creating an enforceable
policy that reflects the actual needs of the user group.
• It is also required to diagnose faults and troubleshooting of the network.
Resource Monitoring & Management
7
Policy
Without an “Acceptable Internet Usage Policy” no amount of bandwidth
is enough to satisfy the demands of an unrestricted user community.
Frequently it is the minority that consumes the majority bandwidth.
In this situation, user education is far more productive than technical
solutions.
The institution’s policy needs to be understood and enforced.
It becomes the responsibility of the network administrators to find out
which users are not adhering to the policy and to interact with them on a face-
to-face level.
Resource Monitoring & Management 8
Implementation
There are number of tools and techniques that help network administrators to
ensure that bandwidth is being managed properly and policy is adhered.
The key components are:
• Network Analyzers - for monitoring traffic;
• Firewalls - for blocking malicious and unwanted traffic;
• Anti-Virus - for protecting network;
• Caches - for efficiently using bandwidth,
• Traffic Shapers - for prioritizing and controlling traffic; and
• Quota Systems - for managing user behavior.
Resource Monitoring & Management 9
It is a networked computer used to store files for access by other client
computers on the network
On larger networks, the file server runs a special network operating system.
On smaller installations, the file server may run a PC operating system
supplemented by peer-to-peer networking software.
Resource Monitoring & Management 10
File Server
Mail - In the networking world, e-mail, rather than the postal service.
Email servers can be of two types:
1. Incoming Mail Server (POP3, IMAP)
2. Outgoing Mail Server (SMTP)
Resource Monitoring & Management 11
Mail Servers
The incoming mail server is the server associated with an email address account.
There cannot be more than one incoming mail server for an email account.
In order to download your emails, you must have the correct settings configured
in your email client program.
Popular protocols are POP3 and IMAP
Post Office Protocol (POP) - the latest version is POP3 and it is an Internet mail
server protocol that provides an incoming mail storage mechanism
Internet Mail Access Protocol (IMAP)- is a protocol that defines how users can
access and store incoming e-mail messages.
Resource Monitoring & Management 12
Incoming Mail Server
Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for
sending emails.
SMTP provides a direct end-to-end mail delivery, which is rather unusual;
most mail systems use store-and-forward protocols
The outgoing mail server can belong to your ISP or to the server where you
setup your email account.
Resource Monitoring & Management 13
Outgoing Mail Server
POP3 – port 110
IMAP – port 143
SMTP – port 25
Secure SMTP (SSMTP) – port 465
Secure IMAP (IMAP4-SSL) – port 585
IMAP4 over SSL (IMAPS) – port 993
Secure POP3 (SSL-POP) – port 995
Resource Monitoring & Management 14
The main email ports are
The network should be configured for sharing printers to enable network printing.
Local printer, shared printer, and network printer are the three basic printing
configurations used while designing a network and configuring printers.
Resource Monitoring & Management 15
Network Printers
Network printer has network interface card and it is directly
connected to LAN via Ethernet cable, it has its own IP address
and accessible throughout the subnet.
Network printer is used for large organizations where you need to
visualize and manage the printing activities, independently.
Resource Monitoring & Management 16
Network Printers
It is refers to any method of controlling a computer from a remote location
(i.e. a computer in the next room or one on the other side of the world).
Any computer with an Internet connection, TCP/IP or on a Local Area Network
can be remotely administered.
Resource Monitoring & Management 17
Remote Administration
Shutdown
• Shutting down or rebooting another computer over a network
Accessing Peripherals
• Using a network device, like printer
• Retrieving streaming data, much like a CCTV system
Modifying
• Editing another computer's registry settings
• Modifying system services
• Installing software on another machine
• Modifying logical groups
Resource Monitoring & Management 18
Common tasks for which remote administration is used
Viewing
• Remotely assisting others
• Supervising computer or internet usage
Hacking
• Computers infected with malware such as Trojans sometimes open back
doors into computer systems which allows malicious users to hack into and
control the computer. Such users may then add, delete, modify or execute
files on the computer to their own ends.
Resource Monitoring & Management 19
Common tasks for which remote administration is used
Windows
• Windows based devices come with Microsoft's Microsoft Management
Console, Windows Registry Editor and various command-line utilities
that may be used to administrate a remote machine.
• One form of remote administration is remote desktop software, and
Windows includes a Remote Desktop Connection client for this purpose.
Non-Windows
• Linux, UNIX and BSD support remote administration via remote login,
typically via SSH (The use of the Telnet protocol has been phased out due
to security concerns).
• Apple Remote Desktop provides Macintosh users with remote
administration capabilities.
Resource Monitoring & Management 20
Popular Software for Remote Administration
Questions
21

More Related Content

Similar to Chapter 7 - Resource Monitoring & Management.ppt

Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Identify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfIdentify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfMeresa Hiluf`
 
Lecture notes -001
Lecture notes -001Lecture notes -001
Lecture notes -001Eric Rotich
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information SystemDr Jasbeer Singh
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
this is the slide design for chapter 4 of reource monitoring and mamangemnt
this is the  slide design for chapter 4 of reource monitoring and mamangemntthis is the  slide design for chapter 4 of reource monitoring and mamangemnt
this is the slide design for chapter 4 of reource monitoring and mamangemnthaile468688
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
Well_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfWell_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfHari Prasetyo Utomo
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slideAbhishek Kesharwani
 

Similar to Chapter 7 - Resource Monitoring & Management.ppt (20)

Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
Identify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfIdentify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdf
 
Lecture notes -001
Lecture notes -001Lecture notes -001
Lecture notes -001
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
 
Chapter04
Chapter04Chapter04
Chapter04
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Network administration Book
Network administration BookNetwork administration Book
Network administration Book
 
Os unit i
Os unit iOs unit i
Os unit i
 
this is the slide design for chapter 4 of reource monitoring and mamangemnt
this is the  slide design for chapter 4 of reource monitoring and mamangemntthis is the  slide design for chapter 4 of reource monitoring and mamangemnt
this is the slide design for chapter 4 of reource monitoring and mamangemnt
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Well_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdfWell_Monitoring_System_DataComm_Technology.pdf
Well_Monitoring_System_DataComm_Technology.pdf
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
 

More from gadisaAdamu

Chapter 1. Introduction to Software Engineering.pptx
Chapter 1. Introduction to Software Engineering.pptxChapter 1. Introduction to Software Engineering.pptx
Chapter 1. Introduction to Software Engineering.pptxgadisaAdamu
 
Chapter_2_Software_Development_Life_Cycle_and_Process_Models.pptx
Chapter_2_Software_Development_Life_Cycle_and_Process_Models.pptxChapter_2_Software_Development_Life_Cycle_and_Process_Models.pptx
Chapter_2_Software_Development_Life_Cycle_and_Process_Models.pptxgadisaAdamu
 
Chapter 4 Software Project Planning.pptx
Chapter 4 Software Project Planning.pptxChapter 4 Software Project Planning.pptx
Chapter 4 Software Project Planning.pptxgadisaAdamu
 
Chapter 5 Software Design of software engineering.pptx
Chapter 5 Software Design of software engineering.pptxChapter 5 Software Design of software engineering.pptx
Chapter 5 Software Design of software engineering.pptxgadisaAdamu
 
Chapter_2_Network_Operating_System_NOS_and_Windows_Network_Concepts.pptx
Chapter_2_Network_Operating_System_NOS_and_Windows_Network_Concepts.pptxChapter_2_Network_Operating_System_NOS_and_Windows_Network_Concepts.pptx
Chapter_2_Network_Operating_System_NOS_and_Windows_Network_Concepts.pptxgadisaAdamu
 
Chapter 8 - nsa Introduction to Linux.ppt
Chapter 8 -  nsa Introduction to Linux.pptChapter 8 -  nsa Introduction to Linux.ppt
Chapter 8 - nsa Introduction to Linux.pptgadisaAdamu
 
Derartu Habtamu research Presentation.pptx
Derartu Habtamu  research Presentation.pptxDerartu Habtamu  research Presentation.pptx
Derartu Habtamu research Presentation.pptxgadisaAdamu
 
Chapter five software Software Design.pptx
Chapter five software  Software Design.pptxChapter five software  Software Design.pptx
Chapter five software Software Design.pptxgadisaAdamu
 
OSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfOSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfgadisaAdamu
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 
IP Address in data communication and computer notework.ppt
IP Address in data communication and computer notework.pptIP Address in data communication and computer notework.ppt
IP Address in data communication and computer notework.pptgadisaAdamu
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxgadisaAdamu
 
Ch1Intro.pdf Computer organization and org.
Ch1Intro.pdf Computer organization and org.Ch1Intro.pdf Computer organization and org.
Ch1Intro.pdf Computer organization and org.gadisaAdamu
 
Computer application-chapter four lecture note. pptx
Computer application-chapter four lecture note. pptxComputer application-chapter four lecture note. pptx
Computer application-chapter four lecture note. pptxgadisaAdamu
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxgadisaAdamu
 
Chapter 03-Number System-Computer Application.pptx
Chapter 03-Number System-Computer Application.pptxChapter 03-Number System-Computer Application.pptx
Chapter 03-Number System-Computer Application.pptxgadisaAdamu
 
Chapter one-Introduction to Computer.pptx
Chapter one-Introduction to Computer.pptxChapter one-Introduction to Computer.pptx
Chapter one-Introduction to Computer.pptxgadisaAdamu
 
Chapter Three, four, five and six.ppt ITEtx
Chapter Three, four, five and six.ppt ITEtxChapter Three, four, five and six.ppt ITEtx
Chapter Three, four, five and six.ppt ITEtxgadisaAdamu
 
Chapter One & Two.pptx introduction to emerging Technology
Chapter One & Two.pptx introduction to emerging TechnologyChapter One & Two.pptx introduction to emerging Technology
Chapter One & Two.pptx introduction to emerging TechnologygadisaAdamu
 
Compiler chapter six .ppt course material
Compiler chapter six .ppt course materialCompiler chapter six .ppt course material
Compiler chapter six .ppt course materialgadisaAdamu
 

More from gadisaAdamu (20)

Chapter 1. Introduction to Software Engineering.pptx
Chapter 1. Introduction to Software Engineering.pptxChapter 1. Introduction to Software Engineering.pptx
Chapter 1. Introduction to Software Engineering.pptx
 
Chapter_2_Software_Development_Life_Cycle_and_Process_Models.pptx
Chapter_2_Software_Development_Life_Cycle_and_Process_Models.pptxChapter_2_Software_Development_Life_Cycle_and_Process_Models.pptx
Chapter_2_Software_Development_Life_Cycle_and_Process_Models.pptx
 
Chapter 4 Software Project Planning.pptx
Chapter 4 Software Project Planning.pptxChapter 4 Software Project Planning.pptx
Chapter 4 Software Project Planning.pptx
 
Chapter 5 Software Design of software engineering.pptx
Chapter 5 Software Design of software engineering.pptxChapter 5 Software Design of software engineering.pptx
Chapter 5 Software Design of software engineering.pptx
 
Chapter_2_Network_Operating_System_NOS_and_Windows_Network_Concepts.pptx
Chapter_2_Network_Operating_System_NOS_and_Windows_Network_Concepts.pptxChapter_2_Network_Operating_System_NOS_and_Windows_Network_Concepts.pptx
Chapter_2_Network_Operating_System_NOS_and_Windows_Network_Concepts.pptx
 
Chapter 8 - nsa Introduction to Linux.ppt
Chapter 8 -  nsa Introduction to Linux.pptChapter 8 -  nsa Introduction to Linux.ppt
Chapter 8 - nsa Introduction to Linux.ppt
 
Derartu Habtamu research Presentation.pptx
Derartu Habtamu  research Presentation.pptxDerartu Habtamu  research Presentation.pptx
Derartu Habtamu research Presentation.pptx
 
Chapter five software Software Design.pptx
Chapter five software  Software Design.pptxChapter five software  Software Design.pptx
Chapter five software Software Design.pptx
 
OSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfOSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdf
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
IP Address in data communication and computer notework.ppt
IP Address in data communication and computer notework.pptIP Address in data communication and computer notework.ppt
IP Address in data communication and computer notework.ppt
 
ERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptxERROR DETECTION data communication and computer network.pptx
ERROR DETECTION data communication and computer network.pptx
 
Ch1Intro.pdf Computer organization and org.
Ch1Intro.pdf Computer organization and org.Ch1Intro.pdf Computer organization and org.
Ch1Intro.pdf Computer organization and org.
 
Computer application-chapter four lecture note. pptx
Computer application-chapter four lecture note. pptxComputer application-chapter four lecture note. pptx
Computer application-chapter four lecture note. pptx
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Chapter 03-Number System-Computer Application.pptx
Chapter 03-Number System-Computer Application.pptxChapter 03-Number System-Computer Application.pptx
Chapter 03-Number System-Computer Application.pptx
 
Chapter one-Introduction to Computer.pptx
Chapter one-Introduction to Computer.pptxChapter one-Introduction to Computer.pptx
Chapter one-Introduction to Computer.pptx
 
Chapter Three, four, five and six.ppt ITEtx
Chapter Three, four, five and six.ppt ITEtxChapter Three, four, five and six.ppt ITEtx
Chapter Three, four, five and six.ppt ITEtx
 
Chapter One & Two.pptx introduction to emerging Technology
Chapter One & Two.pptx introduction to emerging TechnologyChapter One & Two.pptx introduction to emerging Technology
Chapter One & Two.pptx introduction to emerging Technology
 
Compiler chapter six .ppt course material
Compiler chapter six .ppt course materialCompiler chapter six .ppt course material
Compiler chapter six .ppt course material
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

Chapter 7 - Resource Monitoring & Management.ppt

  • 2. Outline Bandwidth • Definition • Bandwidth management • Tools for bandwidth management File & Mail Servers Network Printers Remote Administration Resource Monitoring & Management 2
  • 3. Bandwidth (Definition) In communications, the difference between the highest and lowest frequencies available for transmission in any given range. • It is measured in HZ In networking, the transmission capacity of a computer or a communications channel, stated in megabits per second (Mbps) Resource Monitoring & Management 3
  • 4. Bandwidth management It is a generic term that describes the various techniques, technologies, tools and policies employed by an organization to enable the most efficient use of its bandwidth resources. It is defined as a process of allocating bandwidth resources to critical applications on a network. It aims to improve performance of an Internet connection by removing unnecessary traffic. • The aim of managing network capacity is to have the right amount of bandwidth in the right place at the right time for the right set of users and applications. Through efficient use, we can achieve both the minimization of unnecessary bandwidth consumption and the delivery of the best possible levels of service to users. Resource Monitoring & Management 4
  • 5. Bandwidth management Often bandwidth management may be applied on the WAN segment that connects the institution to the greater Internet. It may also be applied on critical internal segments, such as segments connecting campus residence halls to the rest of the network. Bandwidth management is a dynamic approach that provides adaptability, feasibility and efficiency for real-world network operations. Resource Monitoring & Management 5
  • 6. Bandwidth Management activities Bandwidth management requires three activities: • Monitoring • Policy and , • Implementation. Resource Monitoring & Management 6
  • 7. Monitoring Monitoring is important for defining and enforcing policy • Network monitoring informs the process of creating an enforceable policy that reflects the actual needs of the user group. • It is also required to diagnose faults and troubleshooting of the network. Resource Monitoring & Management 7
  • 8. Policy Without an “Acceptable Internet Usage Policy” no amount of bandwidth is enough to satisfy the demands of an unrestricted user community. Frequently it is the minority that consumes the majority bandwidth. In this situation, user education is far more productive than technical solutions. The institution’s policy needs to be understood and enforced. It becomes the responsibility of the network administrators to find out which users are not adhering to the policy and to interact with them on a face- to-face level. Resource Monitoring & Management 8
  • 9. Implementation There are number of tools and techniques that help network administrators to ensure that bandwidth is being managed properly and policy is adhered. The key components are: • Network Analyzers - for monitoring traffic; • Firewalls - for blocking malicious and unwanted traffic; • Anti-Virus - for protecting network; • Caches - for efficiently using bandwidth, • Traffic Shapers - for prioritizing and controlling traffic; and • Quota Systems - for managing user behavior. Resource Monitoring & Management 9
  • 10. It is a networked computer used to store files for access by other client computers on the network On larger networks, the file server runs a special network operating system. On smaller installations, the file server may run a PC operating system supplemented by peer-to-peer networking software. Resource Monitoring & Management 10 File Server
  • 11. Mail - In the networking world, e-mail, rather than the postal service. Email servers can be of two types: 1. Incoming Mail Server (POP3, IMAP) 2. Outgoing Mail Server (SMTP) Resource Monitoring & Management 11 Mail Servers
  • 12. The incoming mail server is the server associated with an email address account. There cannot be more than one incoming mail server for an email account. In order to download your emails, you must have the correct settings configured in your email client program. Popular protocols are POP3 and IMAP Post Office Protocol (POP) - the latest version is POP3 and it is an Internet mail server protocol that provides an incoming mail storage mechanism Internet Mail Access Protocol (IMAP)- is a protocol that defines how users can access and store incoming e-mail messages. Resource Monitoring & Management 12 Incoming Mail Server
  • 13. Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. SMTP provides a direct end-to-end mail delivery, which is rather unusual; most mail systems use store-and-forward protocols The outgoing mail server can belong to your ISP or to the server where you setup your email account. Resource Monitoring & Management 13 Outgoing Mail Server
  • 14. POP3 – port 110 IMAP – port 143 SMTP – port 25 Secure SMTP (SSMTP) – port 465 Secure IMAP (IMAP4-SSL) – port 585 IMAP4 over SSL (IMAPS) – port 993 Secure POP3 (SSL-POP) – port 995 Resource Monitoring & Management 14 The main email ports are
  • 15. The network should be configured for sharing printers to enable network printing. Local printer, shared printer, and network printer are the three basic printing configurations used while designing a network and configuring printers. Resource Monitoring & Management 15 Network Printers
  • 16. Network printer has network interface card and it is directly connected to LAN via Ethernet cable, it has its own IP address and accessible throughout the subnet. Network printer is used for large organizations where you need to visualize and manage the printing activities, independently. Resource Monitoring & Management 16 Network Printers
  • 17. It is refers to any method of controlling a computer from a remote location (i.e. a computer in the next room or one on the other side of the world). Any computer with an Internet connection, TCP/IP or on a Local Area Network can be remotely administered. Resource Monitoring & Management 17 Remote Administration
  • 18. Shutdown • Shutting down or rebooting another computer over a network Accessing Peripherals • Using a network device, like printer • Retrieving streaming data, much like a CCTV system Modifying • Editing another computer's registry settings • Modifying system services • Installing software on another machine • Modifying logical groups Resource Monitoring & Management 18 Common tasks for which remote administration is used
  • 19. Viewing • Remotely assisting others • Supervising computer or internet usage Hacking • Computers infected with malware such as Trojans sometimes open back doors into computer systems which allows malicious users to hack into and control the computer. Such users may then add, delete, modify or execute files on the computer to their own ends. Resource Monitoring & Management 19 Common tasks for which remote administration is used
  • 20. Windows • Windows based devices come with Microsoft's Microsoft Management Console, Windows Registry Editor and various command-line utilities that may be used to administrate a remote machine. • One form of remote administration is remote desktop software, and Windows includes a Remote Desktop Connection client for this purpose. Non-Windows • Linux, UNIX and BSD support remote administration via remote login, typically via SSH (The use of the Telnet protocol has been phased out due to security concerns). • Apple Remote Desktop provides Macintosh users with remote administration capabilities. Resource Monitoring & Management 20 Popular Software for Remote Administration