StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network monitoring and analysis - Assignment Example

Cite this document
Summary
Denial of Services (DoS) is one similar threat posed to the networking infrastructure. It can virtually destroy in the entire network and halt the activities.
Denial of…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Network monitoring and analysis
Read Text Preview

Extract of sample "Network monitoring and analysis"

LAN and other remotely established networks are prone to different kinds of internal and external threats. Denial of Services (DoS) is one similar threat posed to the networking infrastructure. It can virtually destroy in the entire network and halt the activities.Denial of Service is a malicious online activity that may be performed in number of ways. One very commonly pattern is that of flooding the network. The flooding can come along in the form of targeting the I.P addresses from external sources.

Globally Denial of Service makes up for one of the most commonly used method of interpreting and disturbing the already established network transmission and communication (Das & Gulati, 2004¸p. 214).Indiscriminate requests for entry into the network at such a rate that the servers fail to respond in a timely manner leading to congestion formation is one of the characteristic features of Denial of Service action. Tear Dropping and peer to peer attacks are commonly known actions and activities that are entailed in the domain of DoS attacks on the networks.

Different actions may be undertaken as counter measures against DoS. The installation of an effective firewall is one possible solution against this menace. Firewall allows sequential entry of traffic and requests and subsequently prevents the system from overflow and flooding of requests.Other possible options of security include techniques such as Black holding, or simply use of switches as an alternate. The technique of Internet Based Prevention System is also an option against the DoS activity which allows running a smooth operational activity.

References:Das, G., & Gulati, V. (2004). ntelligent Information Technology: 7th International Conference on Information Technology, CIT. Hyderabad: Springer Science & Business Media

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network monitoring and analysis Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Network monitoring and analysis Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1653276-network-monitoring-and-analysis
(Network Monitoring and Analysis Assignment Example | Topics and Well Written Essays - 250 Words)
Network Monitoring and Analysis Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1653276-network-monitoring-and-analysis.
“Network Monitoring and Analysis Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1653276-network-monitoring-and-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network monitoring and analysis

Medium and Profession

hellip; This paper analyses three professions that I did not know about in the Internet medium: network architecture, information security analysis and telecommunications specialty.... It is a career that combines knowledge in both software and hardware to ensure that the modeling, analysis and planning of the Internet system runs as required.... Information Security Analyst The roles in this career include planning, developing, implementing, upgrading and monitoring of security measures so as to protect the Internet network systems from security risks (BLS 128)....
3 Pages (750 words) Research Paper

Networks Systems & Technologies

Firewall will be installed between internet and network as well as between the servers and end user desktops and laptops to protect the servers, applications and network from internal and external malicious attacks We will assume that the organisation is a medium sized… The factory at same site as head office and their business is expanding.... There are in all around The firm also has a traveling sales force which needs to connect to the office network to access the sales applications and other administrative applications....
12 Pages (3000 words) Essay

Five network management categories making up the FCAPS model

The statistical nature of the information facilitates fast and effective decision making and analysis.... Such progression demands effective monitoring and… Remote network monitoring has become one of the well-known forms of network management. Remote monitoring (RMON) is defined as the specification for exchanging network RMON and RMON Probes RMON and RMON Probes Introduction Organizations are usually faced with the challenge of meeting the increasing needs of their customers and business....
2 Pages (500 words) Essay

Monitoring Offshore Oil and Gas Processes Using Ad-Hoc Wireless Network

collection and analysis of data from various monitoring and control sensors.... This research explores the advantages and disadvantages of using an ad-hoc wireless system in the monitoring and control of an oil and gas industry.... Ad-hoc wireless network is specifically suited for industrial control and monitoring processes, which are characterized by a large scale deployment of a comparatively reduced data as such, its best suited for oil and gas industry for in the control and monitoring of the wide range of products and processes (Jensen et al....
4 Pages (1000 words) Research Paper

Assignment 1: Network Consultation for DesignIT

The size of the space undertaken by the DesignIT is 56' x 36', therefore, after analysis it is determined that a roll of cable would be enough for connecting the computers, printers, servers, routers and wireless access points to the Switch.... The document presents design and architecture of computer network to be deployed as per the requirements provided by the DesignIT.... … Moreover, the human resources required to deploy the network along with their costs and service cost....
5 Pages (1250 words) Coursework

SNMP for Diagnostics and Troubleshooting Network Problems

The research paper "SNMP for Diagnostics and Troubleshooting Network Problems" describes the SNMP analysis program.... nbsp; Additionally, it was observed that created MIB sets can be added to a data collection group as an alternative protocol of enhancing the performance of the network in terms of signal strength and quality.... However, while the transfer of information will depend on signal quality and network stability, five areas are of concern to ensure that communication is flawless....
18 Pages (4500 words) Research Paper

Local Area Network: Evaluation and Future Recommendations

Also, the LAN network traffic monitoring and generation equipment are low end devices that offer merely moderately precise information and can behave inconsistently beneath extensive network traffic loads.... … 1- Introduction This report presents the detailed analysis of the Local Area Network that I have selected for the discussion.... This 1- Introduction This report presents the detailed analysis of the Local Area Network that I have selected for the discussion....
11 Pages (2750 words) Essay

Firewall Tools: Activity Monitor

Conclusion The Activity Monitor is indeed an appropriate tool for monitoring the network.... The focus of this paper "Firewall Tools: Activity Monitor" is on a network tool that allows network administrators to oversee the performance of the nets.... nbsp;… The use of Activity Monitor does not affect the performance of other hosts in the network, and it provides a report of visited sites.... With that, it becomes easy to anticipate disasters such as network outages and therefore take appropriate action....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us