StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

RMON Probes Are Important Aspects of Computer Sciences - Essay Example

Cite this document
Summary
The paper "RMON Probes Are Important Aspects of Computer Sciences" states that it is worth noting that the RMON has a fundamental demerit in that it has a limit on link-level traffic. As such, it is necessary for users to address all the dynamics of the RMON before implementation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
RMON Probes Are Important Aspects of Computer Sciences
Read Text Preview

Extract of sample "RMON Probes Are Important Aspects of Computer Sciences"

RMON and RMON Probes RMON and RMON Probes RMON and RMON probes are important aspects in Computer sciences and Information technology. RMON and RMON probes play a significant role in network management systems especially in companies with visuals. This paper explores and defines RMON and RMON probes. It also defines how RMON and RMON probes apply in network management systems especially in companies with visuals. Ideally, Simple Network Management Protocol (SNMP) plays an important role in IT where they collect network traffic at an interface (Docstore, 2014). However, it is worth noting that SNMP is not an effective mechanism of collecting network traffic in specific cases. For instance, SNPP is neither convenient nor efficient while collecting network traffic over an overused, low-bandwidth WAN link (Docstore, 2014). This means that SNMP does not guarantee the effectiveness of collected data since the data collected under SNMP is usually not ready for use. This call for a better approach in the collection, processing, reduction, and retrieval of data in a selective manner and hence the concept of a remote monitoring (RMON). The remote monitoring (RMON) should act as an extension to SNMP. Indeed, RMON and SNMP organize and retrieve data in a similar manner (Docstore, 2014). Generally, RMON refers to mechanism that collects and processes data at the collection point (Docstore, 2014). Ideally, we can refer to RMON as a standard mechanism that defines a set of statistics and functions that can shift between RMON-compliant console systems and network probes (Cisco, 2014). Just like in a SNMP, users can implement the RMON as a standard Management Information Base (MIB) on RMON-enabled devices. As a result, RMON offers a better platform to network-fault diagnosis, plan, and fine-tune the collected data (Cisco, 2014). RMON can collect data through a continuous process and offline mechanisms (Docstore, 2014). More so, we can implement the RMON in software of an existing device, hardware, or separate device. The implementation of the RMON helps in achieving remote packet capture (Docstore, 2014). Notably, the hardware implementations of the RMON or Remote network monitoring devices define Remote Monitoring probe (RMON probe) or monitors (Docstore, 2014). Indeed, the RMON-enabled devices include the RMON probes and existing network devices like routers that have an RMON probe embedded into their circuitry (LUTEUS SARL, 2004). In this context, an RMON MIB describes data organization, OIDs identifies the data, while SNMP commands retrieves the data (Docstore, 2014). Indeed, RMON seem like an expanded or super MIB. RMON probes play the role of managing and monitoring a network by devoting fundamental internal resources purposely for managing a network. Indeed, RMON allows numerous network agents and console systems to exchange network monitoring data. In motoring network traffic in switches that connect to LAN segments, users can use both the RMON and SNMP mechanisms (Cisco, 2014). The RMON probe plays the noble role of analyzing RMON information and monitoring network traffic and setting alarms when dangers occur (PCMag Digital Group, 2014). Users can install RMON probes on a network in temporary or permanent basis. RMON probes reside permanently in networks where they can also assume the role of auditing traffic and gathering statistics (PCMag Digital Group, 2014). Indeed, the RMON probes send the collected data to the management console. Notably, any Windows PC in the remote network can install the RMON probe. RMON probes and software running in the background of the PC can support RMON. Initially, users organized RMON data in nine groups (RFCs 1271 and 1757) which later introduced a tenth group (RFC 1513) for token rings (Docstore, 2014). The groups include the statistics group, history group, alarm group, event group, host group, top n hosts group, packet capture group, traffic matrix group, filter group, and token-ring group (Docstore, 2014). There is no configuration of alarms or events. As such, users can disable the RMON by default. A command-line interface or an SNMP-compatible network management station can help in configuring a switch for RMON (Cisco, 2014). This emanates from the fact that iSNMP recognizes iSNMP RMON probes just as SNMP manageable devices. The iSNMP RMON probe monitors the RMON network where it collects bandwidth utilization, collision, network error, and other network issues. It is quite evident that the RMON cannot work without the support of RMON probes, which makes the RMON probe a dedicated device in a standard operating system. The RMON and the RMON probe communicate across the network courtesy of the SNMP (LUTEUS SARL, 2004). However, the user must connect the RMON probe to the TAP for traffic analysis and to the network with another interface for communicating in SNMP with the SNMP Manager. Ideally, the RMON probes that exist in an Ethernet provide partial or complete support for RMON groups. However, the main significance of switch-management utility in RMON probes is configuring the selection of ports (LUTEUS SARL, 2004). Although the RMON has the benefit of lessening network traffic, it can also be CPU intensive. As such it is quiet important to ensure that there is no overloading in the system while collecting RMON information. On the other hand, users can maximize the RMON probe by considering the use of a commercial tool that is applicable in a specific case. Ideally, an RMON probe entails an SNMP agent that collects data and communicates it to RMON MIBs and an SNMP management application. For an SNMP-manageable device to offer a RMON functionality and derive an RMON probe, users must install and additional software. However, hosted probes that act as add-on hardware modules do not require additional software. The RMON is significant in network management systems since it offers standard data that network users can use in monitoring, analyzing, and troubleshooting a group of distributed LANs and interconnecting T-1/E-1 and T-2/E-3 lines from a central site (TechTarget, 2014). Specifically, the RMON describes the data that any network monitoring system can provide. On the other hand, RMON probes helps in capturing or monitoring data packets from the network in network management systems. Notably, users have introduced probe capabilities objects in the RMON MIB modules with the hope of enabling applications to establish the potential of distinct RMON probes in the network (Waldbusser et al., 2003). Indeed, applications can determine the most effective RMON functions in a simple and accurate manner by relying on the values of probe capabilities objects. This saves time and bandwidth in a network since it avoids the trial-and-error process (Waldbusser et al., 2003). Moreover, the probe capabilities objects offer relevant information that facilitates the sharing of existing control entries instead of creating new ones. Through the introduction of probe capabilities objects, the owners of control entries identify one another and establish a collaborative working relationship where needs arises (Waldbusser et al., 2003). Software also gains the capacity to establish all control entries that it owns for purposes of reusing them or discarding them. Indeed, the introduction of probe capabilities objects in the RMON MIB modules helps administrators to make informed decisions aimed at improving the network management systems (Waldbusser et al., 2003). This application is fundamental in companies with visuals since the administrators can establish the magnitude of network traffic that specific users are imposing on the network and what Web sites the users are accessing (TechTarget, 2014). Moreover, administrators in such companies can set alarms to notify the users on eminent problems in the network. Through the RMON, the administrators can collect a wide rand of data that includes packets sent, bytes sent, packets dropped, statistics by host, by conversations between two sets of addresses, and certain kinds of events that have occurred (TechTarget, 2014). However, it is worth noting that the RMON has a fundamental demerit in that it has a limit of link-level traffic (Docstore, 2014). As such, it is necessary for users to address all the dynamics of the RMON before implementation. References Cisco. (2014). Configuring RMON. Retrieved from: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2940/software/release/12-1_19_ea1/configuration/guide/2940scg_1/swrmon.html Docstore. (2014). RMON. Retrieved from: http://docstore.mik.ua/orelly/networking_2ndEd/tshoot/ch08_05.htm LUTEUS SARL. (2004). RMON Probes. Retrieved from: http://www.loriotpro.com/Products/RMON_GUI/225-RMON_Probes_EN.htm PCMag Digital Group. (2014). RMON Probe. Retrieved from: http://www.pcmag.com/encyclopedia/term/50574/rmon-probe TechTarget. (2014). RMON (Remote Network Monitoring). Retrieved from: http://searchmobilecomputing.techtarget.com/definition/RMON Waldbusser, S. et al. (2003). Introduction to the Remote Monitoring (RMON) Family of MIB Modules. Retrieved from: https://tools.ietf.org/html/rfc3577 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“RMON and RMON Probes Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
RMON and RMON Probes Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1660236-rmon-and-rmon-probes
(RMON and RMON Probes Essay Example | Topics and Well Written Essays - 1250 Words)
RMON and RMON Probes Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1660236-rmon-and-rmon-probes.
“RMON and RMON Probes Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1660236-rmon-and-rmon-probes.
  • Cited: 0 times

CHECK THESE SAMPLES OF RMON Probes Are Important Aspects of Computer Sciences

Computer Sciences and Information Technology

A paper "computer sciences and Information Technology" claims that both computer science and information technology augment each other's purpose.... The research centers on the essence of computer science.... The main goal of computer science is to determine the best data processing systems computers can be efficiently and effectively automated and set into motion.... Clark French emphasized computer science is not the mirror image of information technology....
5 Pages (1250 words) Research Paper

Responding to a Government Solicitation

The paper "Responding to a Government Solicitation" states that there are individuals in the firm with academic backgrounds and professional experience in chemical engineering, analytical chemistry, environmental science, and principles of experimental design.... .... ... ... Our main business is conducting research on behalf of organizations, departments, or agencies to generate appropriate reports that can be used to improve the operations at the organizations or solve some emerging issues in the organization....
5 Pages (1250 words) Research Paper

Information Security in Wireless Local Area Networks

Information Security in Wireless Local Area Networks Faculty Name Your Name Subject Name/ Code Date Abstract Rapid growth of wireless communication has become a common in the enterprises.... Now wireless local area networks (WLANs) applications are installed easier than earlier applications.... ... ...
5 Pages (1250 words) Essay

Network and computer intrusion threats

This paper 'Network and computer intrusion threats' was developed to assist the researcher and his dissertation committee grasps the understanding and scope for the proposed study, which allowed the core functionality of the direction of the research.... This research proposal is pertaining to collaborative assessment of network and computer intrusion threats by carrying out intrusion profiling....
39 Pages (9750 words) Essay

The concept of Strategic Planing

Before moving into the meaning of qualitative research, it is important to cite the available methods.... Compare and contrast the different qualitative methodologies for collecting data (e.... .... structured interviewing, group interviews, unstructured, etc.... , as well as the various methods....
17 Pages (4250 words) Essay

Summary/Strong Response

line cites the arguments of those who oppose animal research: researchers “inflict torture on animals for the sole purpose of career advancement” (Kline, 2); animal experiments have no relevance to medicine; animal research can be easily replaced by computer simulation.... Animal-rights activists claim that computer models can simulate animal experiments.... Kline discounts these claims, saying that computer models cannot simulate complex biological systems....
2 Pages (500 words) Essay

Global Information System

GIS is accessible only through password or computer IP recognition.... "Global Information System" paper considers the two major Global Information Systems i.... .... WWW and GSM.... The revolution of Information Systems aroused after the advent of the World Wide Web.... This helped in the rapid distribution and storage of data and the availability of data in the whole world....
6 Pages (1500 words) Coursework

Studying the Success of the Films The Revenge of the Nerds

In the movie, Nerds Lewis Skolnick who in this case is Carradine and Gilbert Lowe who is Edwards joins Adams College to pursue computer science.... The most important issue that the actors in the film cover are violence.... This paper "Studying the Success of the Films – The Revenge of the Nerds" focuses on the fact that one of the key areas of studies that have become common in most of the institutions of higher learning in film studies....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us