Propose solution to avoid data vulnerability

Assignment Help Computer Networking
Reference no: EM132293246

Server Availability Monitoring and Metrics.

Purpose of the assessment

The purpose of the assignment is to compare free (open source) server monitoring tools based on the basic metrics of checking availability. Students will be able to complete the following ULOs:

1. Analyse and compare various server management systems
2. Compare emerging tools and techniques for system managemen

Assignment Description

Monitoring availability of servers and services is one of the core issues that companies face in their day to day operations. However, there are always some challenges such as at what metrics the availability of hardware, services and applications may be considered. Additionally, it is important to understand that what resources are being used by the servers and services while being up and running.

For further reading, could refer to the article "IT Infrastructure-Monitoring Tools". The article is available on the IEEE Explore, which could be easily accessed.

The assessment requires students to compare server availability monitoring tools Including (1) Nagios Core, (2) Ganglia, (3) CollectD, (4) Spiceworks, (5) Cacti, (6) Zabbix, (7) Icinga, (8) OpenNMS, and (9) WhatsUp Gold, in terms of the metrics given in the following. The students are required to submit a report, which includes:

1. Comparison of the above server availability monitoring tools to check their performance in terms of:

a) Disk usage
b) CPU monitoring
c) Process Monitoring
d) Bandwidth Monitoring
e) Resource Measuring
f) Overall availability

2. Discuss and evaluate in detail the server availability monitoring architecture.

3. Propose a solution to avoid data vulnerability in server availability monitoring tools.

4. Discuss the impact of failure prediction on server availability monitoring.

References

J. Hernantes, G. Gallardo and N. Serrano, "IT Infrastructure-Monitoring Tools" in IEEE Software, vol. 32, no. 04, pp. 88-93, 2015.doi: 10.1109/MS.2015.96

Verified Expert

In the task, server availability monitoring tools for checking performance has been compared. In addition, the server availability is evaluated along with proposal of a solution to avoid data vulnerability in server availability monitoring tools are discussed. The Impact of failure prediction on server availability monitoring are described in the solution.

Reference no: EM132293246

Questions Cloud

Identify ethical issues related to ICT : Identify ethical issues related to ICT - critically evaluate solutions to ethical problems - Analyse the ethical issue from the perspective of the Australian
How would you measure the succcess of the implementation : What kind of items should be taken into consideration prior to implementing a CDSS? How would you measure the succcess of the implementation
Develop building services design documentation : BBE102 Sustainable Building Services - Holmesglen - develop and produce a comprehensive document that evaluates and appraises all the relevant information
Need an analysis of two survey data sets : Instructions: Need an analysis (a write up) of 2 Survey data sets individually. And then need a comparison and a contrast of the 2 data sets
Propose solution to avoid data vulnerability : MN506 - System Management - Server Availability Monitoring and Metrics - Melbourne Institute of Technology - Propose a solution to avoid data vulnerability
Create a forecast - convert all the case data : Create a forecast, convert all the case data into a realistic P&L for the initiative and find the baseline net present value (profits and losses)
Penetration testing project for ecommerce website : Penetration Testing Project for eCommerce Website - Potential risks and threats to the eCommerce website and their web server - Expected outcomes
Identify a key management challenge : MBA 501 - Managing Organizations - Identify a key management challenge faced by an organization of your choice - Discuss the key dimensions of Planning
Determine the activation energy for the catalyzed reaction : Determine the activation energy for the catalyzed reaction (assuming T = 25°C). Show your work - what are the first order rate constant (kuncat)

Reviews

len2293246

4/25/2019 4:34:26 AM

Submission Guidelines ? All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  How to choose a packet analysis or network management tool

Packet Capture - Discuss how to choose a packet analysis or network management tool given various network configurations

  Describe the seven layers in the osi network model

What is a circuit? What is a client? What is a server? Why are network layers important? Describe the seven layers in the OSI network model and what they do.

  Mobile-network environment the need for information

In today's distributed, global, mobile-network environment the need for information risk management in organizations has never been greater.

  What is the router prompt for the privileged exec mode

What command is used to enter the router's privileged mode?

  What are the predominant electronic and physical threats

Write a 200- to 300-word response to the following question: What are the predominant electronic and physical threats to communications networks

  Create visual examples for four topographies

Create visual examples for four topographies- a bus, ring, star and mesh topography. Copy and paste the provided shapes below into a Microsoft Word document.

  Networks and telecommunications

(TCO A) Based on the examples in the text, if you were asked to formulate a plan for a regional drive-in restaurant chain's efforts to use information technology to attract customers.

  Develop a questionnaire to gather requirements from users

MN621 Advanced Network Design Assessment - Human factors in network analysis and design, MIT Australia. Develop a questionnaire to gather requirements from user

  Write a report on network design and management trends

Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization and security.

  What is the largest attack volume as of the papers writing

What's the largest attack volume (in Gbps) as of the paper's writing? What percentage of companies were hit by a DDoS attack in 2013?

  What encryption algorithm is being used for confidentiality

Which version of SSL/TLS protocol is being use? What encryption algorithm is being used for confidentiality? What hashing algorithm is being used for integrity?

  Web or database server level control

Operating system level control, Web or database server level control, Keep in mind that each control should focus on a specific topic and offer the following structure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd