Loading...

COMPUTER NETWORKING  

>

LEARNING OUTCOME 5

NETWORK MONITORING

Network monitoring is the process of continuously observing and analyzing the performance, availability, and security of a computer network. It is a critical component of network management, ensuring that networks operate efficiently, reliably, and securely.

Justification for Network Monitoring:

AGENT AND AGENTLESS MONITORING

Agent monitoring and agentless monitoring are two distinct approaches to network monitoring, each with its own advantages and disadvantages.

Agent monitoring involves installing software agents on monitored devices to collect performance data and metrics. These agents run on the devices and send the collected data to a central monitoring server. Agent monitoring provides fine-grained and detailed insights into device performance, resource utilization, and health status.

Agentless monitoring extracts performance data and metrics from devices without deploying software agents. It utilizes network protocols and APIs to collect data directly from devices or from network infrastructure equipment. Agentless monitoring is less intrusive and reduces the overhead on monitored devices.

Here's a table summarizing the key differences between agent and agentless monitoring:

Feature Agent Monitoring Agentless Monitoring
Data collection Uses software agents installed on devices Extracts data directly from devices or network infrastructure
Payload size Larger payload due to agent data Smaller payload as data is collected from network
Intrusiveness More intrusive due to agent installation Less intrusive as no agents are installed
Deployment complexity Requires agent installation on all monitored devices Requires network configuration and access to device APIs
Scalability Can handle large numbers of devices if agents are lightweight and efficient Scalability depends on network bandwidth and device performance
Granularity of data Provides detailed insights into device performance and health Less granular data due to reliance on network-level data

MONITORING FORMS

Active, passive, and performance monitoring are three main approaches to network monitoring, each with its own characteristics and applications.

Active Monitoring

Active monitoring involves sending probes or test traffic to monitored devices to elicit responses and measure their performance. This approach provides real-time insights into network performance and can be used to proactively detect issues before they impact users.

Passive Monitoring

Passive monitoring collects data from existing network traffic without injecting any test traffic. It relies on analyzing network traffic patterns, device logs, and SNMP traps to identify potential problems and assess overall network health.

Performance Monitoring

Performance monitoring focuses on measuring and analyzing network performance metrics, such as latency, bandwidth utilization, and response times. It helps identify bottlenecks, optimize network traffic flow, and ensure that the network is meeting performance expectations.

Key Differences

Feature Active Monitoring Passive Monitoring Performance Monitoring
Data collection Injects test traffic to elicit responses Collects data from existing network traffic Focuses on specific performance metrics
Proactive detection Can proactively detect issues Relies on analyzing historical data Identifies performance bottlenecks
Real-time visibility Provides real-time insights into network performance Provides historical and current network health Measures network performance metrics
Intrusiveness More intrusive due to test traffic injection Less intrusive as it doesn't inject test traffic Intrusiveness depends on the specific metrics
Applications Troubleshooting, real-time performance monitoring Network health assessment, capacity planning Network optimization, performance benchmarking

NETWORK MONITORING PLAN

Introduction

This network monitoring plan outlines the procedures and guidelines for monitoring the performance, availability, and security of the organization's network infrastructure. The plan aims to ensure that the network operates efficiently, reliably, and securely, minimizing downtime, preventing security breaches, and supporting business continuity.

Scope

This plan encompasses the entire network infrastructure, including network devices, servers, applications, and network traffic. It covers both physical and virtual network components.

Objectives

Monitoring Tools and Techniques

Monitoring Metrics

Monitoring Frequency

Monitoring Responsibilities

Reporting and Communication

Network monitoring data will be analyzed and reported regularly to relevant stakeholders, including network management, IT leadership, and business stakeholders. Reports will include summaries of network health, performance trends, security events, and any ongoing issues or concerns.

Incident Response

A formal incident response plan will be implemented to address network incidents, including security breaches, major outages, and performance degradations. The plan will outline clear procedures for identifying, containing, and remediating network incidents.

Continuous Improvement

This network monitoring plan will be reviewed and updated periodically to reflect changes in network infrastructure, business requirements, and security threats. Regular reviews will ensure that the plan remains effective and aligned with organizational goals.

Conclusion

This network monitoring plan provides a framework for effectively monitoring the organization's network infrastructure to ensure its performance, availability, and security. By implementing the plan, the organization can minimize downtime, prevent security breaches, and support business continuity.

PROBLEM INDICATORS

Simple Network Management Protocol (SNMP)

SNMP is a standard protocol for managing and monitoring network devices, such as routers, switches, and servers. It allows network administrators to collect information about the performance, configuration, and health of network devices, and to send commands to configure or modify those devices.

SNMP is a simple protocol that is based on a request-response model. A network management system (NMS) sends a request to an SNMP agent on a network device, and the agent responds with the requested information. The NMS can then use this information to monitor the device or to take corrective action.

SNMP is a widely used protocol for network management. It is supported by a wide range of network devices and NMSs.

Windows Management Instrumentation (WMI)

WMI is a standard protocol for managing and monitoring Windows-based systems. It allows administrators to collect information about the configuration, performance, and health of Windows-based systems, and to send commands to manage those systems.

WMI is a more complex protocol than SNMP. It is based on a hierarchical model that represents the Windows system as a collection of objects. Each object has a set of properties and methods. Administrators can query objects to retrieve information about the system, and they can invoke methods to perform actions on the system.

WMI is supported by all Windows XP and later systems.

Ping

Ping is a network utility that is used to test whether a network device is reachable. It works by sending a packet of data to the device and then waiting for a response. If the device is reachable, it will respond to the ping packet. If the device is not reachable, the ping packet will time out.

Ping is a simple but useful tool for troubleshooting network connectivity problems. It can be used to identify whether a device is turned on and whether it is responding to network requests.

Isolating Faults in Line with Problem Indicators

When troubleshooting network problems, it is important to isolate the fault to the specific network device or component that is causing the problem. This can be done by using a combination of tools and techniques, including SNMP, WMI, and ping.

SNMP and WMI can be used to collect information about the performance, configuration, and health of network devices. This information can be used to identify devices that are experiencing problems.

Ping can be used to test whether a device is reachable. This can be used to isolate the problem to a specific device or segment of the network.

Once the fault has been isolated, it can be repaired or replaced.

Here is an example of how to use SNMP, WMI, and ping to isolate a network problem:

A user reports that they are unable to access a network share. The network administrator uses ping to test whether the user's computer can reach the network share. If the ping is successful, the administrator uses SNMP to query the network share to see if it is responding to requests. If the network share is not responding to requests, the administrator uses WMI to query the network share to see if it is experiencing any problems.

By using a combination of SNMP, WMI, and ping, the network administrator is able to isolate the problem to the network share. The administrator can then repair or replace the network share to resolve the problem.

NETWORK MONITORING MAPS

Network monitoring maps are visual representations of a network infrastructure, providing a clear overview of the network's topology, components, and connections. These maps are crucial for network administrators to effectively monitor, troubleshoot, and manage the network.

Horizontal Plane

The horizontal plane of a network monitoring map refers to the physical layout of the network, typically depicted as a two-dimensional representation of the network topology. It shows the physical location of network devices, such as routers, switches, and servers, along with their connections. This view is essential for understanding the physical layout of the network and identifying potential cabling or infrastructure issues.

Vertical Plane

The vertical plane of a network monitoring map represents the logical structure of the network, often depicted as a layered model. It shows the different layers of the network stack, such as the physical layer, data link layer, network layer, transport layer, application layer, and other relevant layers. This view helps in understanding the logical organization of the network and identifying potential issues related to specific network protocols or layers.

Viewpoint

The viewpoint of a network monitoring map refers to the perspective from which the network is represented. Common viewpoints include:

X-Y Line

The x-y line in a network monitoring map represents the physical coordinates of network devices. It allows for precise positioning of devices on the map, enabling accurate representation of the physical layout of the network. This is particularly useful for large or complex networks with multiple locations or buildings.

Network monitoring maps provide valuable insights into the network's structure, performance, and potential issues. By utilizing these maps effectively, network administrators can optimize network performance, minimize downtime, and ensure the efficient operation of the network.

Diagnosing network problems

Effectively diagnosing network problems requires a systematic approach that involves gathering information, identifying symptoms, analyzing data, and implementing solutions. Here's a step-by-step guide to network problem diagnosis:

1. Gather Information:

2. Identify Symptoms:

3. Analyze Data:

4. Implement Solutions:

5. Monitor and Verify:

Network Problem Diagnosis Approaches:

A problem resolution record

A problem resolution record, also known as a trouble ticket or incident report, documents the process of identifying, troubleshooting, and resolving a network or IT issue. It serves as a comprehensive record of the problem, the steps taken to resolve it, and the outcome.

Key components of a problem resolution record:

Benefits of maintaining problem resolution records:

Business continuity (BC) and disaster recovery (DR)

Business continuity (BC) and disaster recovery (DR) are strategies that organizations implement to ensure the continuation of critical business operations in the event of an unexpected disruption or disaster. These strategies are crucial for minimizing downtime, preventing financial losses, and safeguarding the reputation and brand of an organization.

Business Continuity Planning:

Business continuity planning (BCP) focuses on maintaining the continuity of essential business functions and processes during and after a disruptive event. It involves identifying critical business processes, assessing potential risks, and developing plans to restore operations as quickly as possible.

Key elements of business continuity planning include:

Disaster Recovery Planning:

Disaster recovery planning (DRP) focuses on restoring critical IT systems and infrastructure following a disaster. It involves creating detailed plans for recovering data, applications, and network connectivity to resume normal operations.

Key elements of disaster recovery planning include:

Benefits of Implement BC and DR Strategies:

End of Outcome Quiz

1 of 20

    Quiz Score

    Percentage: 0%

    Answered Questions: 0

    Correct Answers: 0

    Faults: