ch4 ppt (1).pdf
Document Details
Uploaded by ImportantRooster
A-B Tech
Tags
Full Transcript
Chapter 4 Resource Monitoring Resource Monitoring Is a system application that used to view information about the use of hardware (CPU, memory, disk, and network) and software resource in real time Before you can monitor resources, you first have to know what resources there are to m...
Chapter 4 Resource Monitoring Resource Monitoring Is a system application that used to view information about the use of hardware (CPU, memory, disk, and network) and software resource in real time Before you can monitor resources, you first have to know what resources there are to monitor. All systems have the following resources available: CPU power Bandwidth Memory Storage Cont.. System Performance Monitoring System performance monitoring is normally done in response to a performance problem The system is running too slowly programs (even the entire system) fail to run at all Performance monitoring is normally done as the first and last steps of a three-step process: To identify the nature and scope of the resource shortages that are causing the performance problems The data produced from monitoring is analyzed and a course of action normally resolves the problem Then ensure that the performance problem has been resolved What to Monitor? CPU, Memory, Storage and Bandwidth What to Monitor? As stated earlier, the resources present in every system are CPU power, bandwidth, memory, and storage. At first glance, it would seem that monitoring would only consist of examining these four different things. For example, consider a disk drive. What things might you want to know about its performance? Performance-related questions How much free space is available? How many I/O operations on average does it perform each second? How long on average does it take each I/O operation to be completed? How many of those I/O operations are reads? How many are writes? What is the average amount of data read/written with each I/O? Cont.. Monitoring CPU CPU: is a single microprocessor or a number of interconnected processing units that interpret and implement software instructions, perform calculations and comparisons, make logical decisions temporarily store information for use by another of the CPU’s processing units, keep track of the current step in the execution of the program, and allow the CPU to communicate with the rest of the computer. If CPU utilization stays below 100%, no matter what the system is doing, there is additional processing power available for more work. However, it is a rare system that does not reach 100% CPU utilization at least some of the time. At this time determine where the majority of your processing power is being consumed. Monitoring Bandwidth Bandwidth describes the maximum data transfer rate of a network or Internet connection measures how much data can be sent over a specific connection in a given amount of time The greater the capacity, the more likely that better performance will result. measured in bits per second Bandwidth measures how fast bits of data move from one location to another(T/F). Bandwidth is the primary measure of computer network speed. Some of the more common bandwidth-related statistics are: Bytes received/sent –Network Interface Statistics Transfers per Second- for I/O devices such as tape drives, disks etc Monitoring Memory and Storage Memory capacity is usually quantified in terms of kilobytes, megabytes, and gigabytes. It is the area where a wealth of performance statistics can be found the following statistics are useful for monitoring storage: Free Space File System-Related Statistics File Server A file server is a computer responsible for the central storage and management of data files allows users to share information (image, text, video etc) over a network without having to physically transfer by external storage device Any computer can be configured to be a host and act as a file server. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers File servers generally offer some form of system security to limit access to files to specific users or groups Mail Server Email server is software or program that can send or receive email from or to other email servers. user@gmail.com Types of mail services Outgoing mail server: is used to send mails from the sender to the receiver. SMTP (simple mail transfer protocol) – used for outgoing mail server. Incoming mail server: is used to receive mail messages from the sender. POP3 (Post Office Protocol- used to store sent & received mails on local hard drives) and IMAP (Internet Mail Access Protocol) are the mail type of email server that used to receive emails. Remote Administration Service Remote administration is any method of controlling a computer from a remote location Common tasks for which remote administration is used: General: controlling one’s own computer from a remote location. Shutdown: is the process for shutting or rebooting another computer over a network. Accessing peripherals: it is possible to access network resources like printer remotely and retrieving data from the network. Modifying: remote administrators can make editing another computer registry setting, modifying system services, installing software on another machine, modifying logical groups and resetting passwords. Viewing: like remotely assisting others or supervising computers. Example: GoToMypc, PcAnywhere and RemotelyAnywhere Network Printing Network printing is the collection of software components in Windows Server 2008 that provide network printing services for client computers Types of Printers Local Shared Network Permissions Permission is the type of access granted to a user, group, or computer to access resources Types of permission Security level permission Share level permissions Security level permission Security or permission can set on drives, folders and files. By default, security permissions will be inherited from its parent drive or folder. Creators of files and folders are owners. Security permissions include : full control, read and execute, modify, write, read, and list folder contents Share level permission Can be set on drives and shared folders but not files. Shared folders can be accessed from networks. Share permissions include, reader, owners and contributors. The end of the chapter