0% found this document useful (0 votes)
21 views2 pages

Network Monitoring

Network monitoring is the ongoing process of observing a computer network for irregularities, security breaches, and performance issues using specialized tools. Network sniffers capture and analyze network traffic, while port scans identify open ports on devices, both serving different purposes in network management. The advantages of network monitoring include proactive issue detection, enhanced security, optimized performance, compliance with regulations, and improved decision-making.

Uploaded by

oldmorant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views2 pages

Network Monitoring

Network monitoring is the ongoing process of observing a computer network for irregularities, security breaches, and performance issues using specialized tools. Network sniffers capture and analyze network traffic, while port scans identify open ports on devices, both serving different purposes in network management. The advantages of network monitoring include proactive issue detection, enhanced security, optimized performance, compliance with regulations, and improved decision-making.

Uploaded by

oldmorant
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Network Monitoring

This is the continuous process of monitoring a computer network for any irregularities, security
breaches, or performance issues. It involves using specialized software tools to collect and analyze data
about the network's performance, traffic, and health.

Network Sniffer
A network sniffer, also known as a packet sniffer or network analyzer, is a software tool or hardware
device used to capture and analyze network traffic. It intercepts data packets as they pass through a
network interface, allowing users to inspect the contents of these packets. Network sniffers are
commonly used for troubleshooting network issues, monitoring network activity, and analyzing network
protocols.

Port Scan
A port scan is a technique used to identify open ports on a computer or network device. Ports are
communication endpoints used by software applications to exchange data. A port scan involves sending
packets to a range of port numbers on a target system and analyzing the responses to determine which
ports are open and potentially vulnerable to exploitation. Port scanning can be used for both legitimate
purposes, such as network security assessments, and malicious purposes, such as identifying targets for
cyberattacks.

Sniffer vs Port Scan


Sniffer: A sniffer captures and analyzes network traffic to inspect its contents, such as packets, protocols,
and data payloads. It's a passive monitoring tool used to observe network activity.

Port Scan: A port scan actively probes a target system to identify open ports and services. It involves
sending specific packets to the target's ports and analyzing the responses to determine their state (open,
closed, filtered).

Function of Network Monitoring

Detecting and diagnosing network issues and outages.


Monitoring network performance metrics, such as bandwidth usage, latency, and packet loss.

Identifying security threats, including malicious activity, intrusion attempts, and unauthorized access.

Analyzing network traffic patterns and trends to optimize network infrastructure and resource allocation.

Ensuring compliance with regulatory requirements and security policies.


Advantages of Network Monitoring
Proactive issue detection and resolution, reducing network downtime and improving reliability.

Enhanced network security by identifying and mitigating potential threats and vulnerabilities.

Optimization of network performance and resource utilization, leading to improved efficiency and cost
savings.

Compliance with industry standards and regulatory requirements through continuous monitoring and
reporting.

Better decision-making through real-time insights into network health, usage patterns, and trends.

You might also like