Computer Sciences and Information Technology
Topic:
Network Monitoring: Fundamental and Standards
Write 2 page research paper on Network Monitoring: Fundamental and Standards

3 Sources
Please include at least one reference from book, newspaper or some other source other than the Internet.
Network Monitoring: Fundamental and Standards
Network monitoring enables network management by providing the necessary information that can enable quick problem identification. The network is the backbone of the I.T. infrastructure; thus, monitoring the performance is essential. Networks can get consistently changed when admins are asked to add new users or add their applications and software to the network. Consistent changes can impact the network’s ability to perform. Lack of network management can make it hard to identify the root cause of a problem. Therefore, network monitoring is essential to identify problematic trends and to mitigate the consequences (Wong 39).
Network monitoring fundamentals require an organized protocol that can automate the process. The first protocol is to check the network equipment. Regardless of the type of network used, it is essential to Question Assignment the network equipment. For instance, all the traffic in the network must pass through the switch or a router. Therefore, such systems entail the traffic information that flows through the system. Common network devices include routers, firewalls, switches, and servers (Canavan 54).
The primary goals of network monitoring include account monitoring, performance monitoring, and fault monitoring. The way data passes through a network can provide reliable information between two connected nodes. For instance, private networks connect customers to websites and remote users to central offices. The connection occurs in the routers. The connection data packet has an I.P. address that sends information from one location to another. The router’s role is to receive the data packet and forward it to the private network. However, the data pack must pass through a firewall to protect the network system from bad traffic. When the firewall detects terrible traffic, it can block it from getting into the private network.
Network monitoring systems (NMS) are designed to discover the ongoing of the network. M.S. entail monitoring templates that are vendor specific. The vendor-specific templates define how to monitor a device. For instance, the templates used to monitor the dell server will differ from what is used to monitor Cisco Router. Moreover, NMS differ in their discovery capabilities. After completing the process, a normal NMS automatically assigns an appropriate device role to the discovered device. Some NMS may fail to discover how devices are connected to a network. It can identify a server but will fail to identify the connected switch. Research shows that effective network monitoring requires more than knowing wants on a network. It requires one to know how it is all connected (Engel 6).
Effective monitoring requires mapping where one must visualize the network, thus mitigation troubleshooting problems. NMS exposes the admins to a vast range of monitors by providing turnkey device roles that dictate what to monitor. Admins must keep an eye on the significant 5 network devices, including latency, ping availability, CPU, disk, memory, and interface utilization. NMS can notify the admins when there is a default in the network system by alerting them vial text or email. NMS provides real-time historical reporting, thus enabling the admins to validate their designs and keep up with the trends that could impact the network’s ability to deliver the desired results. Network monitoring is a continuous life cycle of analysis, design, and re-design (Engel 6). The process is essential because it detects the performance issues of a network and solves it. Regular network monitoring enables the admin to isolate and fix problems quickly. Most NMS are customizable to enable the admin to assess the condition of the entire network. Customized NAMS can be designed to serve the entire system, including clients, managers, and business owners systems.

Works cited
Wong, Edmund. “Network Monitoring Fundamentals and Standards.” Computer Science (2010),39.
Canavan, John E. Fundamentals of network security. Artech House, 2011,54-56.
Engel, Ferdinand, et al. “Network monitoring.” U.S. Patent No. 6,115,393. 5 Sep. 2014,6-9.

Published by
Essays
View all posts