Network Monitoring : What you Need to Know for IT Operations Management

ISBN
9781743042205
$39.95
Author Johnson, Michael
Format Paperback
Details
  • Active Record
  • Individual Title
  • Yes
The term network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator (via email, pager or other alarms) in case of outages. It is a subset of the functions involved in network management. This book is your ultimate resource for Network Monitoring. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Network Monitoring right away, covering: Network monitoring, Computer network, Network administrator, Network management, Intrusion detection system, Hypertext Transfer Protocol, Email, Simple Mail Transfer Protocol, Internet Message Access Protocol, Post Office Protocol, Response time (technology), Availability, Uptime, WAN optimization, Timeout (computing), SMS, System administrator, Telecommunications link, Network traffic measurement, Network tomography, Route analytics, Website monitoring, HTTP Secure, Simple Network Management Protocol, File Transfer Protocol, Domain Name System, Secure Shell, Telnet, Transport Layer Security, Transmission Control Protocol, Internet Control Message Protocol, Session Initiation Protocol, User Datagram Protocol, Comparison of network monitoring systems, Nines (engineering), Network Monitoring Interface Card, Network tap, Business service management, Accelops, Accounting management, ActionPacked Networks, Active monitor, Admon, AdRem Software, Agent Extensibility Protocol, AiCache, Alarm filtering, Assistant Secretary of Defense for Networks and Information Integration, Audit Record Generation and Utilization System, Automounter, Autonomic Networking, Avaya Enterprise Switch Manager, Avaya Proactive Voice Quality Management, Avaya Unified Communications Management, Baselining, BaseN, Bidirectional Forwarding Detection, Big Brother (software), Big Sister (software), Bisection bandwidth, CA Spectrum, Cacti (software), CaLStats, Terry Childs, Cisco Unified Provisioning Manager, Collisionless, Common management information protocol, Common management information service, Console server, CoopNet content distribution system, Cramer Systems, Dataprobe, Desktop and mobile Architecture for System Hardware, Desktop Management Interface, Dhyan Network management System, Digital footprint, Distributed Management Task Force, Element Management, Enterprise numbers, Enterprise project management, EtherApe, EventTracker PULSE, Extromatica Network Monitor, Fault management, FCAPS, FreeNATS, Fully Automatic Installation, Ganglia (software), Goverlan Remote Administration Suite, GridCC, Guidelines for the Definition of Managed Objects, HP Business Service Management, HP OpenView, HP Operations Manager, HP TeMIP Software, IBM Director, In-network management, Information Security Operations Center, Integrated business planning, Intellipool Network Monitor, InterMapper, Internet server monitoring, IP Flow Information Export, IP Virtual Server, Ipanema Technologies, IPHost Network Monitor, Ipswitch, Inc., Isyvmon, IT network assurance, Java Management Extensions, JBoss operations network, JConsole, Joint Inter-Domain Management, Jumpnode, Lan-Secure Switch Center, Lanhelper, Load balancing (computing), Log management and intelligence, Log management knowledge base, Loop Management System, Managed object, Management agent, Management information base, MIMIC Simulator, Monitoring and Measurement, Monolith Software, Multi Router Traffic Grapher, N2rrd, Nagios, Net-SNMP, Netcat, NETCONF, NetCrunch, Netdisco, NetLabs, Network element...and much more This book explains in-depth the real drivers and workings of Network Monitoring. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Network Monitoring with the objectivity of experienced IT professionals.