+1-415-670-9189
info@expertsmind.com
Discuss the impact of failure prediction
Course:- Computer Networking
Reference No.:- EM132284002




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

Server Availability Monitoring and Metrics.

Assignment Description

Monitoring availability of servers and services is one of the core issues that companies face in their day to day operations. However, there are always some challenges such as at what metrics the availability of hardware, services and applications may be considered. Additionally, it is important to understand that what resources are being used by the servers and services while being up and running.

For further reading, could refer to the article "IT Infrastructure-Monitoring Tools". The article is available on the IEEE Explore, which could be easily accessed.

The assessment requires students to compare server availability monitoring tools Including (1) Nagios Core, (2) Ganglia, (3) CollectD, (4) Spiceworks, (5) Cacti, (6) Zabbix, (7) Icinga, (8) OpenNMS, and (9) WhatsUp Gold, in terms of the metrics given in the following. The students are required to submit a report, which includes:

1. Comparison of the above server availability monitoring tools to check their performance in terms of:

a) Disk usage
b) CPU monitoring
c) Process Monitoring
d) Bandwidth Monitoring
e) Resource Measuring
f) Overall availability

2. Discuss and evaluate in detail the server availability monitoring architecture.

3. Propose a solution to avoid data vulnerability in server availability monitoring tools.

4. Discuss the impact of failure prediction on server availability monitoring.

References

J. Hernantes, G. Gallardo and N. Serrano, "IT Infrastructure-Monitoring Tools" in IEEE Software, vol. 32, no. 04, pp. 88-93, 2015.doi: 10.1109/MS.2015.96




Put your comment
 
View Conversion
Minimize
  1. user image
    len2284002

    Comparison /18 Finding is clearly linked and well justified Evaluation /7 Exceptional evaluation of server availability monitoring Identification and Analysis /6 Identified the security and privacy issues and provided excellent justification Propose /4 Exceptional proposal of avoiding data vulnerability Conclusion /3 Logic is clear and easy to follow with strong arguments Reference style /3 Clear styles with excellent source of references.

  2. user image
    len2284002

    Grade Mark HD 40 – 50 Excellent Introduction /4 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Report Layout /5 Exceptional report layout, style and language used

  3. user image
    len2284002

    Evaluation Discuss and evaluate in detail the server availability monitoring architecture. 7 Identification and Analysis Discuss in detail and draw Server availability monitoring architecture. 6 Propose Propose and evaluate a solution to avoid data vulnerability in server availability monitoring tools 4 Conclusion Write summary of the report 3 Reference style Follow IEEE reference style 3 Total 50

  4. user image
    len2284002

    Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 4 Report Layout Report layout, style and language 5 Comparison To compare server availability monitoring tools such as (1) Nagios Core, (2) Ganglia, (3) CollectD, (4) Spiceworks, (5) Cacti, (6) Zabbix, (7) Icinga, (8) OpenNMS, and (9) WhatsUp Gold, in terms of: a. Disk usage b. CPU monitoring c. Process Monitoring d. Bandwidth Monitoring e. Resource Measuring f. Overall availability 18



Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
Protocol 47 or GRE is one of the most flexible IP protocols in networking but it is insecure. Discuss the many uses of GRE and how you could secure it across insecure networ
Specify your protocol by listing the different messages that will be used by your application layer protocol. You must clearly specify the contents of each message by prov
Research both legacy and VoIP telecommunications. Determine which one is more secure and why.Define what it is and how it will be used in the telecommunications model. Provide
Display all the Last Names from the Customers table and any associated OrdersIDs from the Orders Table. Show the Last Name even if they do not have any associated orders. Or
You were hired as the manager for network services at a medium-sized firm. This firm has 3 offices in 3 American cities. Recently, the firm upgraded its network environment
Why does HTTP at the application layer uses TCP while DNS uses UDP when it passes its message packet with overhead to the Transport Layer and then hand it off to the Network
Acme Computing Corp. has remote sites in Port Clinton and Napoleon in addition to their main site in Toledo. There are currently 29 devices connected to the network in Toledo.
For AES with a 128 bit block length and a 128-bit key length, what is the output of the first round of AES if the plaintext consists of 128 1's and the first subkey also consi