Describe specific remote network monitoring events

Assignment Help Computer Networking
Reference no: EM13807046

ABC Technologies: Network Monitoring

You are working as the network administrator in ABC technologies. Your company's network has been experiencing many issues and consistent outages because of the lack of any monitoring or alarm setups very often recently.

You spend most of your time fighting outages just to get the network back online until the next outage or bottleneck occurs. Finally, you convince your manager to let you seek a monitoring software package from a variety of leading vendors that specialize in these packages with the hopes that it will give you notifications of events that are exceeding thresholds as well as quick diagnosis on events on the network.

On the basis of your understanding of the above scenario, create a 2- to 3-page report in a Microsoft Word document that includes answers to the following:

  • Which leading vendor monitoring package would you choose? Provide rationale for the reason you chose it. Include two other vendor monitoring packages to demonstrate a comparison between other products.
  • Analyze and describe specific remote network monitoring (RMON) events that you would capture statistics on?
  • Which thresholds you would establish on the network along with various alarms that you would setup to proactively address any upcoming issues?
  • Describe in detail the reasons and benefits for each of the thresholds and alarms you would have setup on your network as well as the information that would be provided from the RMON events.

Reference no: EM13807046

Questions Cloud

Placement of a warehouse in a logistical system : Analyze the primary drivers of logistics network design, including providing rationale to support the placement of a warehouse in a logistical system.
Define commentators in both the academic and popular media : Evaluate a minimum of four perspectives on this topic expressed by justices of the Supreme Court, leaders in other branches of government, and commentators in both the academic and popular media.
Write a paper about the social media idintity : Write a paper about The Social Media Idintity.
Define maximum stripping ratio : Calculate required output by a single excavator appropriate to this production and select an appropriate machine - Calculate cycle times for trucks.
Describe specific remote network monitoring events : Analyze and describe specific remote network monitoring (RMON) events that you would capture statistics on? Which thresholds you would establish on the network along with various alarms that you would setup to proactively address any upcoming issues
Foundations of control : Control is very important in the management environment and community. In your lessons, you viewed a case study video on Dunkin' Donuts.
Problems based on the mean values : A worker with a score of 9.0 or less is considered very unhappy with his/her job. Approximately how many workers are very unhappy with their jobs?
Describe the three principles of ip security : Describe 'The Three Principles of IP Security'. Cite references as well as a detailed explanation for the same. Explain how you would as an employee of a company practice those principles
Outline your ideology and state the general principles : Choose a party and ideology. Outline your ideology and state the general principles

Reviews

Write a Review

Computer Networking Questions & Answers

  Website management plan

Quality Assurance: What approaches will be used to ensure that the site functions as expected at launch and in the future? How will the website be

  Network that covers a large geographic area

A network that covers a large geographic area is most commonly referred to as a(n)

  Identify issues that can affect network efficiency

Identify issues that can affect network efficiency based on connectivity type. Provide examples of how ISP connectivity service types, such as DSL, CATV, or FTTH, can dictate what options are available for connectivity

  Explain four periodic events for real-time system

Assume that four events need 35,20,10, and x me=sec of CPU time, respectively. Dtermine the largest value of x for which system is schedulable?

  Ethernet networking technology

Based on the article by Semeilogy et al. (2007), why have some researchers recommended redesigning the Ethernet networking technology from the ground up

  Nmap feature to guess the os of the host

Is Nmap able to recognize operating system running on each system? Is there any Nmap feature which can be utilized to guess OS of host?

  Part-11 generalize the basic approaches we used for making

part-11 generalize the basic approaches we used for making the best out of best effort service for real-time

  A company with headquarters at 1 talavera rd north ryde

a company with headquarters at 1 talavera rd north ryde wishes to obtain internet access. they require unlimited data

  Recognize at least five 5 it-related laws and regulations

countries have imposed international laws in their own ways based around many factors. such factors include social

  In her paper developing an effective metrics program

in her paper developing an effective metrics program rosenberg described a group of sample goals questions and metrics.

  Tcb subsets are said to leverage purely hierarchical

tcb subsets are said to leverage purely hierarchical domains ordered by privilege.explain the relation between these

  Design a secure authentication technology

Make a list of access points internal and external (remote). Design a secure authentication technology and network security for GFI

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd