Maj , Ass2 ,IT363 Network Management

User Generated


Computer Science




Q1-List and discuss the difference between traffic monitoring tools and commands.

-Discuss, in detail, the difference between ping and bing commands.

Q2 -Explain the usage of EntryStatus in RMON.

-Discuss the different types of EntryStatus states.

Q3 Discuss the fault management steps of network components. 

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer



Network Management Discussion Questions

Author name
Institutional affiliation
Course number and name
Instructor name
Assignment due date

Network Management Discussion Questions
Q1: Traffic Monitoring Tools vs. Commands
Real-time traffic monitoring coupled with commands and commands in network
management exist for different functions. Traffic Monitoring tools are software applications
created to monitor and provide reporting on the flow of traffic, usage, and performance of the
network. They are also always equipped with interfaces for visualizing data on graphs and
advanced features that enable real-time monitoring, analysing historical data, and sending out
alerts. (Koumaras et al., 2021). An illustration is that which contains, among others but is not
limited to, Wireshark, SolarWinds, Nagios, and PRTG Network Monitor.
Conversely, commands are text-based instructions used in a command-line interface
(CLI) to implement particular tasks. Some commands are capable of traffic monitoring; however,
they are normally used for very limited purposes and are way behind actual monitoring tools
(Koumaras et al., 2021). The 'netstat' command under Unix-like systems and the 'show'
commands in Cisco IOS can take care of statistics and connections on the network.
Ping vs. Bing Commands
"Ping" and "Bing" are very similar troubleshooting commands in their operation,
although they are used to resolve different issues. Ping is a widely used application that enables a
user to check whether a host is available on the IP network and the time lag (RTO) for a packet
to travel from the source to the destination and back. It sends ICMP echo request packets to the
target device and listens for the corresponding ICMP echo reply packets to get acknowledgment
of ICMP Echo requests. It is a...

Really helpful material, saved me a great deal of time.


Related Tags