Already on ArticleSlash?

Forgot your password? Sign Up

Two types of host monitoring on the network

Dmitriy Stepanov
 


Visitors: 125

The host monitoring process is to control the amount of devices connected to the local network, services’ efficiency, and to gather the information on average and maximal loading level. This information gives additional opportunities to a system administrator: to react on occurred failures in time, to optimize the hardware’s and network device’s operation more effectively, and to plan the network upgrades as well.

There are two types of the host monitoring process: the server and client-server methods. The first one is the server-based periodical scanning of the whole range of IP addresses on the network, which allows detecting all the devices connected to it. This kind of scanning usually repeats every 5-10 minutes, which helps to gather the current and up-to-the-minute information. This method does not load the network with a lot of insignificant requests. The second type of the host monitoring process is reading the ARP table cache from network switches. This method is much faster than the previous one and does not require the great amount of requests. But its main drawback is that it cannot help to detect connected hosts, if they do not show any activity.

In comparison with the server host monitoring methods, which gather rather limited amount of data, the client-server methods could constantly read a lot of different computer’s parameters, and send them to the server for the further analysis. The main advantage of this kind of host monitoring is that the system administrator is able to build a fail-safe system. If there is no response from the client during the particular period of time, it is polled again. In addition, this method allows generating alerts automatically. In addition to the data on the device availability on the network, the client-server host monitoring method controls all the services that are launched on the remote PC, checks the proper protocols operation, and monitors opened ports. But at the same time, switches and printers are polled by sending ARP requests or just pinging. This method’s disadvantage is additional load on the monitoring PC. The RAM load can be rather high, which could be noticeable on old computers especially when other monitoring services are launched at the same time.

To use the obtained information, the mechanisms of visualization and reports’ generation are required regardless the chosen host monitoring method. Charts, diagrams, network graphs, and other drawings can be used as the data visualization methods. The diagrams on the amount of working hosts are especially convenient and useful. Besides, usually, the most of host monitoring programs allow the system administrator to view the information in tables, without the graphical representation. Reports can be generated on demand or automatically for a particular period of time.

By the reference to what has been said, it is necessary to keep in mind a few important factors while choosing a good host monitoring program:

1. An opportunity to organize a fail-safe system.

2. The graphical interface and tools for generating reports must be available.

3. The system’s operation principle.

4. Functionality.

Only with the host operation analysis, it is possible to create the effective host monitoring system with minimal load of client PCs and the network itself.

(571)

Article Source:


 
Rate this Article: 
 
Monitoring Eye Movements
Rated 4 / 5
based on 5 votes
ArticleSlash

Related Articles:

Improving you Network Monitoring With Network Management Software

by: Norbert Kimble (April 03, 2012) 
(Computers and Technology/Software)

There is No I in Network Monitoring

by: David Link (June 16, 2008) 
(Computers and Technology)

The Implication of CALEA Compliance on Network Monitoring Services

by: Caitlina Fuller (June 08, 2007) 
(Legal/Cyber Law)

Using Network Bandwidth Monitoring Program for Estimating Employees ..

by: Dmitriy Stepanov (June 08, 2012) 
(Computers and Technology/Software)

British Ante AW-BM1600 large network alarm host

by: Zerry Xu (March 30, 2011) 
(Computers and Technology)

Affiliate Marketing Tips Choosing Between a Free Web Host Or Paid Web Host

by: Angela Tay (June 23, 2008) 
(Internet and Businesses Online/Affiliate Revenue)

Online Network Marketing Two Types of Customers in Your MLM Business

by: Marco Abanico (June 28, 2008) 
(Home Based Business/Network Marketing)

Network Marketing System Types - 3 Kinds of Systems You Must Have To Be ..

by: Joe Shaw (September 03, 2007) 
(Home Based Business/Network Marketing)

Monitoring Stocks

by: Vijay Kumar Sharma (January 13, 2009) 
(Investing/Stocks)

Monitoring Eye Movements

by: Sarah Freeland (July 30, 2007) 
(Computers and Technology)