Description
TASK - 1
a. Summarize the attached research article in two to three pages. the summary should include the main idea presented in the paper with appropriate explanation.
b. Write your reflection on the network management architecture from the research paper.(advantages, disadvantages, etc)
c. Proper Referencing and documentation.
TASK - 2
As a network manager for a small/medium company, you are required to be aware of the health of your LAN and help in taking decisions regarding its growth, security and utilization rules by remotely monitoring some probes. You started your Remote monitoring project by setting a number of objectives:
1. The current utilization percentage of the bandwidth and its trend.
2. Create history reports
3. Know which conversations (communicating hosts) are generating most traffic.
4. Define the settings to capture a specific type of frames.
5. Set a number of alarms raised by some critical states.
6. Monitor the traffic for some upper layer’s traffic.
Task 2.a:
For each objective described in this task, you are required to find the RMON group and tables that will be pulled to get or set from it some parameters as well as all objects that will be used. For some objectives, you need to set first the control table associated.
Example: To determine the traffic statistics with one host, we need to access the tables: “hostControlTable” and “hostTable” in the Host group.
The objects that can be invocated: In “hostControlTable”: hostControlTableSize and hostControlLastDeletedTime, hostControlStatus,hostControlIndex. In “hostTable” : hostAddress, hostCreationOrder and hostIndex.
Task 2.b: you need to give an example for the selected objects with a clear explanation.
Example: In “hostControlTable”: hostControlTableSize=10: The number of hostEntries in the hostTable is 10. It is calculated by
counting distinct MAC addresses in the frames read.
hostControlLastDeletedTime=0;is the value of sysUpTime in the System group of mib-2 at which a row in the hostTable was deleted. If no deletion was done than this number is set to 0.
For all other objects described in task a), you need to provide an example and its explanation.
***how many groups in the Object
***if one, write about it and write about the tables in it?
***if more than one group, write about them and write about the tables included in each group
Task 2.c:
You are required to conduct a comparison research about 5 Open source tools for Network monitoring and write a report based on it. The report must include the features and limitations of each tool.
*** Citation and Referencing Using CU Harvard Style is Required.
*** Support your answers with diagrams or graphs.
*** Word Count: Min 3000 words

Explanation & Answer

Kindly go through the attached files and let me know if you've got any queries
Running head: NETWORK MONITORING TOOLS
Network Monitoring Tools
Student’s Name:
Institution:
1
NETWORK MONITORING TOOLS
2
Task 1:
Network Monitoring Tools
Arguably, networks are critical components in the success of any enterprise regardless of
the fact whether or not the business is big. It is rational to contend that whenever a network fails
or malfunctions, both the staff and the clients are directly affected as they can neither communicate
nor access crucial business information either in print or via emails (Zoho, 2010). Thus, a network
failure reduces the productivity of the enterprise as well as revenue generated. It is for this reason
that network monitoring software tools prove essential in all scales of an enterprise as they not
only minimize network outages but also guarantees that the organization runs fluently at reduced
costs hence prevents loss of revenue. If the organization is not big enough to consider network
monitoring tools in its financial budget, it is advisable that the business starts either an open source
or freeware network monitoring tools in quest of lowering time and expenses incurred in network
management and administration (Zoho, 2010). This piece of work seeks compare five open sources
software tools in form and in limitations as used in network monitoring.
There are different open source software tools for both small and big business. It is worth
to note that open source software tools are not only used in network monitoring but also in
monitoring bandwidths and discovering networks. Unlike large-scale business, small businesses
have few network management needs and prospects since their staff and technological expertise
are limited. The different open source network monitoring software tools include Nagios, Ngrep,
Nmap, NetStumbler and Kismet.
Nagios is an open source network monitoring tool designed for small-scale businesses.
Essentially, Nagios is a both a host and service monitor expressly designed to alert the network
manager of network problems prior to the client and end-users do (Zoho, 2010). The software tool
NETWORK MONITORING TOOLS
3
is designed to function under Linux operating system though it runs without problems in NX
variants. The monitoring daemon conducts alternating checks on host and services that are
specified by the manager via the external ‘plugins’ which gives the feedback to the software. In
case the daemon encounters any complications, it sends notifications to administrators through
instant messages or emails (Zoho, 2010). In addition to this, history logs, reports and current status
may be accessed via the browser. The main disadvantage of the software is that its output is
complex and read in form of XML. Ngrep is a free network monitoring tool that provides GNU
greps pattern that match features and apply them to the traffic. In essence Ngrep recognize IPv4,
IPv6, FDDI, Token Ring and so forth. Even though when this tool is creatively used can detect all
forms of problems in the network including viruses and spam emails, it is difficult to constrain the
filter language to match specific protocols and ports. Nmap is a diagnostic software tool that show
the state and the available ports on a network interface. It scans network hosts either in TCP or the
IP network in ports that are open enabling network managers develop a ‘map’ of network services.
It is disadvantaged in that it might be incompatible with some wireless cards.
Another open source network monitoring tool is the NetStumbler. The software tool
enables the network manager scan wireless networks to attest apt coverage, determine antenna
direction, interference and in detection of unlicensed nodes. This task is completed through active
scanning; sending enquiries concurrently and reporting the response obtained (Keshav,2015). The
tool is limited in that it cannot operates in old Windows OS imp...
