0% found this document useful (0 votes)
31 views

Administration Réseaux Chap2

The document discusses several tools for network monitoring including ping, traceroute, netstat, Wireshark, SolarWinds, PRTG, Nagios and Zabbix. It also covers network services like DHCP, DNS, HTTP and SMTP/POP and provides details on their functions and features.

Uploaded by

Adrianus Im
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Administration Réseaux Chap2

The document discusses several tools for network monitoring including ping, traceroute, netstat, Wireshark, SolarWinds, PRTG, Nagios and Zabbix. It also covers network services like DHCP, DNS, HTTP and SMTP/POP and provides details on their functions and features.

Uploaded by

Adrianus Im
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

NETWORK MANAGEMENT

22/04/2024

BOUCHKAREN SAID 1
Network Monitoring

➢ Network monitoring is a critical IT process where All networking


components like routers, switches, firewalls, servers, and VMs are
monitored.
➢ Fault and performance are evaluated continuously to maintain and
optimize their availability.
➢ Finding performance issues and bottlenecks proactively helps in
identifying issues at the initial stage.
➢ Efficient proactive monitoring can prevent network downtime and/or
failures.
2
Network Monitoring Tools

➢ ping:
❖ Is one of the most basic ICMP-based network management tools.
❖ It sends ICMP echo request packets to a target device and waits for an
ICMP echo reply.
❖ This helps to determine whether the target device is reachable and
measure the round-trip time for packets to reach the target and return.

3
Network Monitoring Tools

➢ Traceroute/tracert:
❖ Is tool that use ICMP to trace the route packets take from the source to the
destination.
❖ It sends out packets with increasing TTL (Time to Live) values, and when
a router decrements the TTL to zero, it sends back an ICMP Time
Exceeded message.
❖ By analyzing these messages, these tools can determine the path taken by
packets.

4
Network Monitoring Tools

➢ netstat:
❖ Is a command-line network utility available in most Unix-like operating
systems and Windows.
❖ It displays various network-related information such as active network
connections, routing tables, interface statistics, masquerade connections,
and multicast memberships.

5
Network Monitoring Tools

➢ Wireshark:
❖ is a popular open-source network protocol analyser.
❖ It's used for network troubleshooting, analysis, software and protocol
development.
❖ It allows users to capture and interactively browse the traffic running on a
computer network.

6
Network Monitoring Tools
Wireshark’s features and capabilities:
❖ Packet Capture: Captures network packets in real-time from various
interfaces.
❖ Protocol Support: Analyses a wide range of network protocols like TCP,
UDP, HTTP, DNS.
❖ Packet Analysis: Provides tools for detailed packet inspection, filtering,
and decoding.
❖ Statistics: Offers statistical analysis tools to understand network traffic
patterns and performance metrics.

7
Network Monitoring Tools
Wireshark’s features and capabilities (Conte’):
❖ Exporting Data: Allows saving captured packets in multiple file formats
for offline analysis.
❖ Customization: Highly customizable with support for custom dissectors
and plugins.
❖ Cross-Platform: Available for Windows, macOS, and Linux.
❖ Use Cases: Used for network troubleshooting, performance monitoring,
security analysis, and protocol development.

8
Network Monitoring Tools

➢ SolarWinds:
❖ SNMP monitoring
❖ Automatically discovers connected network devices
❖ Network packet analysis
❖ Intelligent network maps with NetPath
❖ Create Wifi heat maps
❖ Alerts system
❖ Reports system

9
Network Monitoring Tools

➢ Paessler Router Traffic Grapher-PRTG:


❖ SNMP monitoring
❖ Bandwidth monitoring
❖ Scan for network devices by IP segment
❖ Custom dashboards
❖ Threshold-based alerts system
❖ Reports system
❖ Customizable network maps

10
Network Monitoring Tools

➢ Nagios:
❖ Performance dashboard
❖ Alerts system
❖ Availability reports
❖ Capacity planning
❖ Community-created plugins
❖ APls

11
Network Monitoring Tools

➢ Zabbix:
❖ Auto-discovery feature
❖ SNMP and IPMP monitoring
❖ Application monitoring
❖ Server monitoring
❖ Network monitoring templates
❖ Automatic detection of configuration changes
❖ Alerts system

12
Network Monitoring Tools
Feature Nagios Zabbix SolarWinds PRTG
Open Source Yes Yes No No
Agentless No Yes Yes Yes
Auto-Discovery Yes Yes Yes Yes
Ease of Use Moderate Moderate Moderate Easy
Scalability High High High High
Community Support Strong Moderate Moderate Moderate
Alerting Yes Yes Yes Yes
Historical Data Yes Yes Yes Yes
Customization Extensive Extensive Extensive Extensive
Mobile App No Yes Yes Yes
Price Free Free Paid Paid
13
Network services
DHCP
➢ All devices connecting to a network need an IP address.

➢ The DHCP protocol ensures the automatic configuration of IP settings for a


network device.

14
Network services
DHCP

Network devices that are stationary Network devices that are


are assigned static IP addresses. added, moved, or modified
require new addresses. Manual
configuration is difficult to
manage 15
Network services
DHCP
➢ DHCP has three address allocation mechanisms:

❖ Manual allocation: The administrator assigns a preallocated IP address to the


client, and the DHCP protocol only communicates the IP address to the
device.
❖ Automatic allocation: DHCP automatically and permanently assigns a static
IP address to a device by selecting it from a pool of available addresses.
There is no lease, and the address is assigned permanently to the device.
❖ Dynamic allocation: DHCP automatically and dynamically assigns, or
leases, an IP address from a pool of addresses for a limited period defined by
the server or when the DHCP client indicates to the server that it no longer
needs the address. 16
Network services
DNS
➢ The DNS protocol is a service that supports name resolution for network
applications and services when it is required.
➢ A DNS server performs name resolution using the name daemon, often called
named (name daemon).
➢ The DNS server stores different types of resource records used to resolve names.
➢ These records contain the name, address, and record type.

17
Network services
DNS
➢ The DNS records types includes:
➢ A: Device's IP address.
➢ NS: Authorized name server.
➢ CNAME: Canonical name (or fully qualified domain name) of an alias; used
when multiple services have a single network address but each service has its
own entry in DNS.
➢ MX: Mail exchange record; associates a domain name with a list of mail
exchange servers for that domain.

18
Network services
HTTP
➢ When a web address (or URL) is typed into a web browser, it establishes a
connection to the web service running on the server using the HTTP protocol.

➢ For example, the URL http://www.uae.ma/index.html refers to a page named


index.html located on a server named www in the domain uae.ma.

19
Network services
HTTP
➢ The Hypertext Transfer Protocol (HTTP), one of the protocols in the TCP/IP
suite, was originally developed for publishing and retrieving HTML pages.
➢ HTTP is a request/response protocol.
➢ It defines the types of messages that the client uses to request the web page.
➢ The three common types of messages are GET, POST, and PUT.

20
Network services
HTTP
➢ GET is a client request to retrieve data.
➢ POST and PUT are used to upload data to the web server.
➢ PUT uploads resources or content to the web server.

21
Network services
SMTP/POP
➢ The POP (Post Office Protocol) and SMTP (Simple Mail Transfer Protocol)
protocols are two examples of application layer protocols for sending and
receiving emails.
➢ Like the HTTP protocol, these protocols define client/server processes.
➢ Sending an email involves using commands and message formats defined by the
SMTP protocol.

22
Network services
SMTP/POP
➢ Example of SMTP commands:
❖ HELO: Identifies the SMTP client process to the SMTP server process.
❖ EHLO: A newer version of the HELO command and includes service extensions.
❖ MAIL FROM: Identifies the sender.
❖ RCPT TO: Identifies the recipient.
❖ DATA: Identifies the body of the message.

23
Network services
SMTP/POP
➢ The mail server operates two distinct processes:

❖ Message Transfer Agent (MTA).


❖ Message Delivery Agent (MDA).

➢ To retrieve emails, a program called MUA (Mail User Agent) is used

24

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy