SlideShare a Scribd company logo
Introduction
 Computer Networks play an increasingly
  important role in today’s technological
  age
 But before the transfer of any
  information between the computers it is
  essential to know if this transfer can
  actually take place
 For this, it is important to check if the
  computers ready for data transfer are up
  in the network or not
Network connection
diagram
Fundamentals of Network
Monitoring
   The purpose of network monitoring is the
    collecting of useful information from various
    parts of the network so that the network can
    be managed and controlled using the collected
    information
   Network monitoring techniques are developed
    to allow network management applications to
    check the states of their network devices
   As more and more network devices are used
    to build bigger networks, network monitoring
    techniques are expanded to monitoring
    networks as a whole
Three basic goals of network
monitoring:
 Performance monitoring
 Fault monitoring
 Account monitoring
A list of network indicators
   Circuit Availability: The actual time that a
    user can dial up to a network and the
    network connection is available for the user
   Node Availability: The actual time that a
    user can use network nodes, multiplexers
    and routers without having error
   Blocking Factor: The number of user
    who cannot access the network because of
    busy signal in theory
   Response Time: The time to transmit a
    signal and receive a response for the
    signal
Ideal network monitoring
system
 Integration
 Productivity
 Efficiency
Sources of data
   Measurement of metrics
     This refers to the method of obtaining
      network data by measuring certain metrics
      regarding Network performance
     An example might be the measurement of
      packet round trip times and packet loss
Basic terminology
   LAN: Ex – inside school, office building
   MAN: Ex - telephone lines
   WAN: Ex – within a town or city
 Network switch
 Router
 Port number
 IP address
Network monitoring tools
   Ping
Network monitoring tools
   Trace Route
Network monitoring tools
   Switch port mapper
Introduction to ping
 What is PING?
 How does ping helps?
 Why should we use ping?
Using the ping command
   Syntax: xxx: xxx: xxx: xxx
   To check connectivity by using the ping
    command, at the command prompt, type
    ping and the IP address you want to
    reach
Example of ping
   The following example illustrates how to send
    two pings, each 1,450 bytes in size, to IP
    address 10.3.1.131:
   C:>ping 10.3.1.131 -t
    Pinging 10.3.1.131 with 1450 bytes of data:
    Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32
    Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32
    Ping statistics for 10.3.1.131:
    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
    Approximate roundtrip times in milliseconds:
    Minimum = 0ms, Maximum = 10ms, Average = 2ms
Conclusion
   Network Monitoring System is the system
    which monitors the system which is connected
    in LAN. In case our server, networks are
    crashed due to overload of other devices.
   It is easy to understand for user that if color
    changes to Green it means that the system is
    up in a network, if color changes to Red then it
    means that system is down in a network
   For justifying the system is present or not in
    network there are some tools of network
    monitoring system like PING, Trace route,
    switch port mapper
Reference
   Books
     Computer Networking by author James
      Kurose and Keith Ross
     Computer network and interface by author
      Furrosion
   Links
     www.wikipedia.org
     http://www.devdaily.com/java/java-ping-class
Network monitoring system
Network monitoring system

More Related Content

What's hot

Wireshark
WiresharkWireshark
Wireshark
Sourav Roy
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network managementbhavikaorg
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
Prince JabaKumar
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
Shyama Bhuvanendran
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
Network Slides
Network SlidesNetwork Slides
Network Slidesiarthur
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
Student
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
SolarWinds
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
 
Wireshark
Wireshark Wireshark
Wireshark
antivirusspam
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
Ravi Teja Reddy
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
Sourav Roy
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
iberrywifisecurity
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
SibenConor
 
10 Steps to Improve Your Network Monitoring
10 Steps to Improve Your Network Monitoring10 Steps to Improve Your Network Monitoring
10 Steps to Improve Your Network Monitoring
HelpSystems
 

What's hot (20)

Wireshark
WiresharkWireshark
Wireshark
 
Network management
Network managementNetwork management
Network management
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Network Slides
Network SlidesNetwork Slides
Network Slides
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Wireshark
Wireshark Wireshark
Wireshark
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptxNETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
NETWORK INFRASTRUCTURE MANAGEMENT-mod1_1.pptx
 
10 Steps to Improve Your Network Monitoring
10 Steps to Improve Your Network Monitoring10 Steps to Improve Your Network Monitoring
10 Steps to Improve Your Network Monitoring
 

Viewers also liked

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
Girish Naik
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert System
Supawit Wannapila
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
Nafaâ TAYACHI
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
ManageEngine, Zoho Corporation
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
Rofiq Fauzi
 
Question for job interviewing
Question for job interviewingQuestion for job interviewing
Question for job interviewingMelly Gunawan
 
dark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemdark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemDeepak Dangi
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
LiveAction Next Generation Network Management Software
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms pptMoeCrotty
 
Network management objective
Network management objectiveNetwork management objective
Network management objective
Dhani Ahmad
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...ASHOKKUMAR RAMAR
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne Architecture
SevOne
 
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy   igc 2013 roorkeeAbhishek, tarachand and satyanarayana reddy   igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
Tarachand Veeragattapu
 
Factory Test Systems
Factory Test SystemsFactory Test Systems
Factory Test Systems
RekaNext Capital
 
Samlight manual
Samlight manualSamlight manual
Samlight manual
diendomtpd
 

Viewers also liked (20)

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert System
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
PRTG
PRTGPRTG
PRTG
 
Prtg network monitor
Prtg network monitorPrtg network monitor
Prtg network monitor
 
Question for job interviewing
Question for job interviewingQuestion for job interviewing
Question for job interviewing
 
Answer the question
Answer the questionAnswer the question
Answer the question
 
dark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_systemdark_territory_switch_monitoring_ptc_system
dark_territory_switch_monitoring_ptc_system
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms ppt
 
Network management objective
Network management objectiveNetwork management objective
Network management objective
 
Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
FLEXAP WATCHER
FLEXAP WATCHERFLEXAP WATCHER
FLEXAP WATCHER
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
 
The SevOne Architecture
The SevOne ArchitectureThe SevOne Architecture
The SevOne Architecture
 
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy   igc 2013 roorkeeAbhishek, tarachand and satyanarayana reddy   igc 2013 roorkee
Abhishek, tarachand and satyanarayana reddy igc 2013 roorkee
 
Factory Test Systems
Factory Test SystemsFactory Test Systems
Factory Test Systems
 
Samlight manual
Samlight manualSamlight manual
Samlight manual
 

Similar to Network monitoring system

A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
Alexander Decker
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
IJERA Editor
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
IJERA Editor
 
3. transport layer
3. transport layer3. transport layer
3. transport layer
TageleBerihun
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
eSAT Publishing House
 
Network protocols
Network protocolsNetwork protocols
Network protocols
Abiud Orina
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
claudle200415
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Krishna Nanda
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
Jaimin Jani
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
SimarpreetKaur735622
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
IJCNCJournal
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
Roman Brovko
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security Solution
Nishant Pawar
 
Group 3 Presen.pptx
Group 3 Presen.pptxGroup 3 Presen.pptx
Group 3 Presen.pptx
StudyvAbhi
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
eSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
eSAT Publishing House
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
Iaetsd Iaetsd
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
PataniMenu
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
cscpconf
 

Similar to Network monitoring system (20)

A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
3. transport layer
3. transport layer3. transport layer
3. transport layer
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
Computer networks Module 3 Transport layer
Computer networks Module 3 Transport layerComputer networks Module 3 Transport layer
Computer networks Module 3 Transport layer
 
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLSComputer Communication Networks- TRANSPORT LAYER PROTOCOLS
Computer Communication Networks- TRANSPORT LAYER PROTOCOLS
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Multipath TCP as Security Solution
Multipath TCP as Security SolutionMultipath TCP as Security Solution
Multipath TCP as Security Solution
 
Group 3 Presen.pptx
Group 3 Presen.pptxGroup 3 Presen.pptx
Group 3 Presen.pptx
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
NOS Unit.pdf
NOS Unit.pdfNOS Unit.pdf
NOS Unit.pdf
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 

More from MyPresentations Services

Before - after slides
Before - after slidesBefore - after slides
Before - after slides
MyPresentations Services
 
Testing of hypothesis
Testing of hypothesisTesting of hypothesis
Testing of hypothesis
MyPresentations Services
 
Pioneer Technologies, Pune
Pioneer Technologies, PunePioneer Technologies, Pune
Pioneer Technologies, Pune
MyPresentations Services
 
Neel Engineers and Contractors
Neel Engineers and ContractorsNeel Engineers and Contractors
Neel Engineers and Contractors
MyPresentations Services
 
Tourist Places of India
Tourist Places of IndiaTourist Places of India
Tourist Places of India
MyPresentations Services
 
English Proverbs A-Z
English Proverbs A-ZEnglish Proverbs A-Z
English Proverbs A-Z
MyPresentations Services
 
Cricket World Cup 2011
Cricket World Cup 2011Cricket World Cup 2011
Cricket World Cup 2011
MyPresentations Services
 

More from MyPresentations Services (7)

Before - after slides
Before - after slidesBefore - after slides
Before - after slides
 
Testing of hypothesis
Testing of hypothesisTesting of hypothesis
Testing of hypothesis
 
Pioneer Technologies, Pune
Pioneer Technologies, PunePioneer Technologies, Pune
Pioneer Technologies, Pune
 
Neel Engineers and Contractors
Neel Engineers and ContractorsNeel Engineers and Contractors
Neel Engineers and Contractors
 
Tourist Places of India
Tourist Places of IndiaTourist Places of India
Tourist Places of India
 
English Proverbs A-Z
English Proverbs A-ZEnglish Proverbs A-Z
English Proverbs A-Z
 
Cricket World Cup 2011
Cricket World Cup 2011Cricket World Cup 2011
Cricket World Cup 2011
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Network monitoring system

  • 1.
  • 2. Introduction  Computer Networks play an increasingly important role in today’s technological age  But before the transfer of any information between the computers it is essential to know if this transfer can actually take place  For this, it is important to check if the computers ready for data transfer are up in the network or not
  • 4. Fundamentals of Network Monitoring  The purpose of network monitoring is the collecting of useful information from various parts of the network so that the network can be managed and controlled using the collected information  Network monitoring techniques are developed to allow network management applications to check the states of their network devices  As more and more network devices are used to build bigger networks, network monitoring techniques are expanded to monitoring networks as a whole
  • 5. Three basic goals of network monitoring:  Performance monitoring  Fault monitoring  Account monitoring
  • 6. A list of network indicators  Circuit Availability: The actual time that a user can dial up to a network and the network connection is available for the user  Node Availability: The actual time that a user can use network nodes, multiplexers and routers without having error  Blocking Factor: The number of user who cannot access the network because of busy signal in theory  Response Time: The time to transmit a signal and receive a response for the signal
  • 7. Ideal network monitoring system  Integration  Productivity  Efficiency
  • 8. Sources of data  Measurement of metrics  This refers to the method of obtaining network data by measuring certain metrics regarding Network performance  An example might be the measurement of packet round trip times and packet loss
  • 9.
  • 10. Basic terminology  LAN: Ex – inside school, office building  MAN: Ex - telephone lines  WAN: Ex – within a town or city  Network switch  Router  Port number  IP address
  • 13. Network monitoring tools  Switch port mapper
  • 14.
  • 15. Introduction to ping  What is PING?  How does ping helps?  Why should we use ping?
  • 16. Using the ping command  Syntax: xxx: xxx: xxx: xxx  To check connectivity by using the ping command, at the command prompt, type ping and the IP address you want to reach
  • 17. Example of ping  The following example illustrates how to send two pings, each 1,450 bytes in size, to IP address 10.3.1.131:  C:>ping 10.3.1.131 -t Pinging 10.3.1.131 with 1450 bytes of data: Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32 Reply from 10.3.1.131: bytes=1450 time<10ms TTL=32 Ping statistics for 10.3.1.131: Packets: Sent = 2, Received = 2, Lost = 0 (0% loss), Approximate roundtrip times in milliseconds: Minimum = 0ms, Maximum = 10ms, Average = 2ms
  • 18. Conclusion  Network Monitoring System is the system which monitors the system which is connected in LAN. In case our server, networks are crashed due to overload of other devices.  It is easy to understand for user that if color changes to Green it means that the system is up in a network, if color changes to Red then it means that system is down in a network  For justifying the system is present or not in network there are some tools of network monitoring system like PING, Trace route, switch port mapper
  • 19. Reference  Books  Computer Networking by author James Kurose and Keith Ross  Computer network and interface by author Furrosion  Links  www.wikipedia.org  http://www.devdaily.com/java/java-ping-class