IT18GOWSIKKKUMARK202
65 views
17 slides
Aug 26, 2024
Slide 1 of 17
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
About This Presentation
helps in network monitor
Size: 731.7 KB
Language: en
Added: Aug 26, 2024
Slides: 17 pages
Slide Content
PROJECT PROPOSAL NETWORKING PROJECT MEMBERS AHAMED HUSSAIN J, GLADSON J, GOWSIKK KUMAR K , PRAVEEN N K S R INSTITUTE FOR ENGINEERING AND TECHNOLOGY An Autonomous Institution (Approved by AICTE, Affiliated to Anna University, Accredited by NAAC (A+) & NBA) Department of Information Technology FACULTY CO-ORDINATORS Dr. N. Saravanan, HOD/IT Mr. G. Mohesh Kumar, AP/IT Ms. K. Shanmuga Priya, AP/IT
Outline Network Network Monitoring Systems Monitoring Tools Problem Definition Future Enhancement 2
Network What is NETWORK: A network is a group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources . Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system. 3
Cost-effective resource sharing. Network gaming. Overcoming geographic separation. Allowing information sharing. Allows File sharing. Increase in efficiency. Flexibility. Importance of Network 4
Types A computer network is mainly of four types: LAN(Local Area Network) PAN(Personal Area Network) MAN(Metropolitan Area Network) WAN(Wide Area Network) 5
Communication And Collaboration Internet Access Data Sharing And File Transfer Resource Sharing Social Media Online Entertainment IOT(Internet of Things) Usages of Network 6
Network Monitoring System Network monitoring is the process of constantly monitoring a computer network for problems such as slow traffic or component failure. Network monitoring provides the information that network administrators need to determine, in real time, whether a network is running optimally . 7
Network Monitoring Tools Network monitoring tools are software solutions designed to monitor the performance, availability, and security of computer networks. Nagios Zabbix Wireshark PRTG Network Monitor 8
Why do we need it Network Traffic Monitoring (NTM) is a network analytic tool that observes local area network usage and provides a statistical display of uploads and downloads in a network. The network display monitor displays following information: Source address of the system that sends frame to the network. The protocol that was used to send the frame. 9
Destination address of the system where the frame will be received Data of the message that is sent. Capturing is the process by which a network monitor collects the information. All the information is stored by default in capture buffer. Also, one can apply restrictions on the information to be captured by the system and the data to be displayed on the monitor. 10
Problem Definition Previous Network Monitoring Tools Are Not User Friendly. The Security Was Not The Primary Objective. Restoral Capabilities Were Not A Big Issue. Traffic Rerouting Was Not A Prominent Feature In Their Inventory. 11
SNMP Simple Network Management Protocol (SNMP) is an application layer protocol that uses UDP port number 161/162. SNMP is used to monitor the network, detect network faults, and sometimes even used to configure remote devices. 12
DRAWBACKS IN EXISTING NETWORK MONITORING TOOLS 13 Complex Configuration : Many network monitoring tools require complex and often technical configurations, which can be challenging for users who are new to the tool or lack in-depth networking knowledge. Scalability Challenges : Some tools struggle to scale effectively as the network size grows or as the number of monitored devices and services increases. Performance issues might arise, impacting the tool's ability to provide accurate and timely monitoring.
Steep Learning Curve : Learning to use and configure some network monitoring tools can be time-consuming and require a significant investment of effort, especially for users who are new to the tool or network monitoring concepts. Insufficient Security Monitoring: Network monitoring tools might not provide comprehensive security monitoring features, leaving potential blind spots in identifying and mitigating security threats. 14