Document Details

ImportantRooster

Uploaded by ImportantRooster

A-B Tech

Tags

resource monitoring system performance computer networks information technology

Full Transcript

Chapter 4 Resource Monitoring Resource Monitoring  Is a system application that used to view information about the use of hardware (CPU, memory, disk, and network) and software resource in real time  Before you can monitor resources, you first have to know what resources there are to m...

Chapter 4 Resource Monitoring Resource Monitoring  Is a system application that used to view information about the use of hardware (CPU, memory, disk, and network) and software resource in real time  Before you can monitor resources, you first have to know what resources there are to monitor.  All systems have the following resources available:  CPU power  Bandwidth  Memory  Storage Cont.. System Performance Monitoring  System performance monitoring is normally done in response to a performance problem  The system is running too slowly  programs (even the entire system) fail to run at all  Performance monitoring is normally done as the first and last steps of a three-step process:  To identify the nature and scope of the resource shortages that are causing the performance problems  The data produced from monitoring is analyzed and a course of action normally resolves the problem  Then ensure that the performance problem has been resolved What to Monitor?  CPU, Memory, Storage and Bandwidth What to Monitor?  As stated earlier, the resources present in every system are  CPU power,  bandwidth,  memory, and storage.  At first glance, it would seem that monitoring would only consist of examining these four different things.  For example, consider a disk drive. What things might you want to know about its performance?  Performance-related questions  How much free space is available?  How many I/O operations on average does it perform each second?  How long on average does it take each I/O operation to be completed?  How many of those I/O operations are reads? How many are writes?  What is the average amount of data read/written with each I/O? Cont.. Monitoring CPU  CPU: is a single microprocessor or a number of interconnected processing units that  interpret and implement software instructions,  perform calculations and comparisons,  make logical decisions  temporarily store information for use by another of the CPU’s processing units,  keep track of the current step in the execution of the program, and  allow the CPU to communicate with the rest of the computer.  If CPU utilization stays below 100%, no matter what the system is doing, there is additional processing power available for more work.  However, it is a rare system that does not reach 100% CPU utilization at least some of the time. At this time determine where the majority of your processing power is being consumed. Monitoring Bandwidth  Bandwidth describes the maximum data transfer rate of a network or Internet connection  measures how much data can be sent over a specific connection in a given amount of time  The greater the capacity, the more likely that better performance will result.  measured in bits per second  Bandwidth measures how fast bits of data move from one location to another(T/F).  Bandwidth is the primary measure of computer network speed.  Some of the more common bandwidth-related statistics are:  Bytes received/sent –Network Interface Statistics  Transfers per Second- for I/O devices such as tape drives, disks etc Monitoring Memory and Storage  Memory capacity is usually quantified in terms of kilobytes, megabytes, and gigabytes.  It is the area where a wealth of performance statistics can be found  the following statistics are useful for monitoring storage:  Free Space  File System-Related Statistics File Server  A file server is a computer responsible for the central storage and management of data files  allows users to share information (image, text, video etc) over a network without having to physically transfer by external storage device  Any computer can be configured to be a host and act as a file server.  In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers  File servers generally offer some form of system security to limit access to files to specific users or groups Mail Server  Email server is software or program that can send or receive email from or to other email servers. [email protected] Types of mail services  Outgoing mail server:  is used to send mails from the sender to the receiver.  SMTP (simple mail transfer protocol) – used for outgoing mail server.  Incoming mail server:  is used to receive mail messages from the sender.  POP3 (Post Office Protocol- used to store sent & received mails on local hard drives) and  IMAP (Internet Mail Access Protocol) are the mail type of email server that used to receive emails. Remote Administration Service  Remote administration is any method of controlling a computer from a remote location  Common tasks for which remote administration is used:  General: controlling one’s own computer from a remote location.  Shutdown: is the process for shutting or rebooting another computer over a network.  Accessing peripherals: it is possible to access network resources like printer remotely and retrieving data from the network.  Modifying: remote administrators can make editing another computer registry setting, modifying system services, installing software on another machine, modifying logical groups and resetting passwords.  Viewing: like remotely assisting others or supervising computers.  Example: GoToMypc, PcAnywhere and RemotelyAnywhere Network Printing  Network printing is the collection of software components in Windows Server 2008 that provide network printing services for client computers  Types of Printers  Local  Shared  Network Permissions  Permission is the type of access granted to a user, group, or computer to access resources Types of permission  Security level permission  Share level permissions Security level permission  Security or permission can set on drives, folders and files.  By default, security permissions will be inherited from its parent drive or folder.  Creators of files and folders are owners.  Security permissions include :  full control, read and execute, modify, write, read, and list folder contents Share level permission  Can be set on drives and shared folders but not files.  Shared folders can be accessed from networks.  Share permissions include, reader, owners and contributors. The end of the chapter

Use Quizgecko on...
Browser
Browser