remote monitoring techniques in computer networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar presentation
Active In SP

Posts: 582
Joined: Apr 2010
04-06-2010, 10:57 PM

Network monitoring is the information collection function of network management and The purpose of network monitoring is the collecting of useful information from various parts of the network (for problems caused by overloaded and/or crashed servers, network connections or other devices..etc). so that the network can be managed and controlled using the collected information and most of the network devices are located in remote locations (may be in www). These devices do not usually have directly connected terminals so that network management application cannot monitor their statuses easily. Thus, network monitoring techniques are developed to allow network management applications to check the states of their network devices. As more and more network devices are used to build bigger networks, network monitoring techiques are expanded to monitoring networks as a whole and the Commonly measured metrics are response time and availability

basic goals for network monitoring

¢ Performance monitoring
¢ Fault monitoring
¢ Account monitoring

Performance monitoring

Performance monitoring deals with measuring the performance of the network. There are three important issues in performance monitoring.
1. performance monitoring information is usually used to plan future network expansion and locate current network usage problems.
2. the time frame of performance monitoring must be long enough to establish a network behavior model.
3. choosing what to measure is important. There are too many measureable things in a network. But the list of items to be measured should be meaningful and cost effective.

Fault monitoring

Fault monitoring deals with measuring the problems in the network. There are two important issues in fault monitoring.
1. fault monitoring deals with various layers of the network. When a problem occurs, it can be at different layers of the network. Thus it is important to know which layer is having problem.
2.fault monitoring requires establishing a normal characteristics of the network in an extended period of time. There are always errors in the network but when there are errors, it does not mean the network is having persistent problems. Some of these errors are expected to occur. For example, noise in a network link can cause transmission errors.

Account monitoring

Account monitoring deals with how users use the network. The network keeps a record of what devices of the network are used by users and how often they are used. This type of information is used for billing user for network usage, and for predicting future network usage

A good network monitoring system must have the functions
IP SLA Reports ,Logical Grouping, Trending ,Trend Prediction, Auto Discovery ,Agent ,SNMP ,Syslog,Plugins, Triggers / Alerts, WebApp ,Distributed Monitoring ,Inventory ,Data Storage Method, Maps, Access Control ,IPv6

directed circuit approach to remote monitoring is one of the method of remote monitoring which uses SNMP (simple network management protocol) and a NIC (network interface card) to broadcast the alarm over an Internet connection to the remote monitoring provider that can track the data to follow trends in parametric data for diagnostic and troubleshooting purposes)

read more

Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
21-09-2010, 12:08 PM

we already said About remote monitoring techniques in computer networks

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  dewatering techniques ppt jaseelati 0 388 17-02-2015, 02:14 PM
Last Post: jaseelati
Question Optimal Stochastic Location Updates in Mobile Ad Hoc Networks Guest 5 1,542 01-05-2014, 09:10 AM
Last Post: Guest
Last Post: seminar project topic
  Link Positions Matter: A Non-Commutative Routing Metric for Wireless Mesh Networks Guest 0 438 27-06-2013, 09:03 PM
Last Post: Guest
  wireless power theft monitoring system Guest 2 1,031 21-05-2013, 12:35 PM
Last Post: study tips
  An Adaptive Opportunistic Routing for Wireless Ad-hoc Networks Guest 1 877 20-05-2013, 09:38 AM
Last Post: study tips
  documentation of RFID and ZIGBEE based manufacturing and monitoring system Guest 0 532 20-04-2013, 02:32 PM
Last Post: Guest
  fast data collection in tree based wireless sensor networks vodafonehutch 1 757 18-04-2013, 09:41 AM
Last Post: study tips
  data base monitoring of power systems and fault detection using GPS Guest 0 557 15-04-2013, 06:19 PM
Last Post: Guest
  Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Guest 0 455 05-04-2013, 10:56 AM
Last Post: Guest