SlideShare a Scribd company logo
Analyzing
monitoring
reports.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Baselines.
– Reports.
PACE-IT.
Page 4
Analyzing monitoring reports.
Page 5
How do you know what
constitutes good network
performance and what
indicates an issue?
This is where baseline documentation comes into play. Baseline
documentation provides a snapshot of the network when it is
running efficiently. Baselines are usually kept as a log file,
although they may also be graphical in nature.
Baselines should be established on CPU utilization and network
utilization (and any other function you deem relevant). Periodic
tests should be conducted to determine if the baseline has
changed. You can use Windows Performance Monitor to help
establish the baseline.
Analyzing monitoring reports.
Page 6
– Items to consider for baselines.
» Network device CPU utilization.
• Can help to determine when a network device is going to fail.
• Can help to determine when more network devices should be
installed in a growing network.
» Network device memory utilization.
• Can help to determine when it is time to expand the memory
of network devices.
» Bandwidth utilization.
• Can help to determine the overall health of a network.
• Can help to determine when network segmentation should
occur.
• Can help to determine if a network device is failing (creating a
storm of data).
• Can help in identifying when a security breech has occurred.
Analyzing monitoring reports.
Page 7
– Items to consider for baselines continued.
» Storage device utilization.
• Can help to determine when storage utilization has become a
bottleneck on the network.
• Can help determine when to increase the storage capacity of
the network.
» Wireless channel utilization.
• Can help to determine how saturated the wireless channels
have become; once it is determined that they are saturated, a
new wireless access point (WAP) can be installed to alleviate
the pressure.
• Can help to determine if there is unauthorized wireless access
occurring (especially if there is utilization on a channel that is
supposed to have none).
Analyzing monitoring reports.
Page 8
Analyzing monitoring reports.
Page 9
– Log management.
» Log files can accumulate data quickly and some administrators
only review them after a major problem has occurred. In most
situations, this is a case of too much information.
• Good administrators will set proper reporting levels with their
logging software.
• Good administrators will review logs and compare them
against their baseline documentation to find issues while they
are still minor.
» Logs should be kept and archived in case there is a need for
historical data; follow the organization’s data storage policy.
» One consideration is to create a running graph of important
metrics that are captured by logs.
• Graphing the data gives a quick visual reference, making it
easier to spot issues.
• Many logging applications give the administrator the option of
creating graphs.
Analyzing monitoring reports.
Page 10
– Interface link status.
» When reviewing the output from an interface report, the first line
is usually a report on the status of the link.
• Fastethernet0/0 is up, line protocol is up (all is good).
• Fastethernet0/0 is up, line protocol is down (all is not good);
the interface is administratively up, but is not able to
communicate with the other end.
• Fastethernet0/0 is down, line protocol is up (all is not good);
there may be an issue with the cable or the physical port
itself.
• Fastethernet0/0 is down, line protocol is down (all is not
good, but all is not bad); the interface has been
administratively shut down.
– Problems on an interface.
» If the link status of the interface indicates that there are no
problems (the up and up state), but something is not operating
correctly, then it is time to dig a little deeper into the interface
monitoring reports.
Analyzing monitoring reports.
Page 11
– Interface monitoring reports.
» There are many things that can happen on a network device’s
interface to cause issues.
• In most cases, it will be required to log into the device and run
the device’s report to determine the cause of any problems.
» Speed and duplex settings (the most common problem):
• If there is a speed mismatch, the devices will not connect.
• A duplex mismatch will cause intermittent issues (e.g., errors
in output or input reports or dropped packets).
» Discards and packet drops:
• If the device is discarding incoming packets, then, more than
likely, the device’s CPU is being overutilized.
• If the device is dropping outgoing packets, then there is a
bandwidth congestion issue.
» Interface resets:
• If the interface keeps resetting, the most likely cause is a
communications issue between the two end points.
Analyzing monitoring reports.
Page 12
Analyzing monitoring reports.
Baselines are used to establish what network performance should be.
Periodic tests should be conducted against the baselines to determine if
they have changed. Functions that might benefit from having a baseline
include: network device CPU utilization, network device memory utilization,
bandwidth utilization, storage utilization, and wireless channel utilization.
Topic
Baselines.
Summary
Log files can accumulate data rather quickly. Administrators can help
manage the growth through setting the proper reporting levels. Log reports
do need to be reviewed and should be archived. Graphing log data can give
a visual reference that makes it easier to spot problems. Any interface link
status other than up and up indicates that there may be an issue. Problems
can still occur on a network interface, even when link status is up and up.
Issues that can occur include: speed and duplex mismatch, discarded and
dropped packets, and interface resets.
Reports.
Page 13
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT: Supporting Configuration Management (part 1)
PPTX
PACE-IT: Supporting Configuration Management (part 2)
PPTX
PACE-IT: Applying Patches and Upgrades
PPTX
PACE-IT: The Importance of Network Segmentation
PPTX
PACE-IT: Security Policies and Other Documents
PPTX
PACE-IT, Security+ 2.5: Incident Response Concepts
PPTX
PACE-IT: Rack and Power Management
PPTX
Pace IT - Control Panel (Part 3)
PACE-IT: Supporting Configuration Management (part 1)
PACE-IT: Supporting Configuration Management (part 2)
PACE-IT: Applying Patches and Upgrades
PACE-IT: The Importance of Network Segmentation
PACE-IT: Security Policies and Other Documents
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT: Rack and Power Management
Pace IT - Control Panel (Part 3)

What's hot (20)

PPTX
PACE-IT: Introduction to Safety Practices (part 2)
PPTX
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PDF
Data_Systems_Specialist_Role_Description[1]
PPTX
Infrastructure dependability
PPTX
Availability and reliability
PPTX
Dependability requirements for LSCITS
PPTX
Pace IT - Troubleshooting OS part 2
DOC
Wizard intro
PPTX
System dependability
PPTX
Critical systems intro
PPTX
3.10 Introducing large ict systems into organisations
PPT
Uncovering the Myths Behind Remote Power
PPT
comparision between IT and Information system
PPTX
System success and failure
PPTX
Introduction to Critical Systems Engineering (CS 5032 2012)
PPTX
Critical systems engineering
PPTX
Designing software for a million users
PPTX
Pace IT - Troubleshooting OS part 1
DOCX
IT-Audit C&A
PPTX
2.1 ict systems and components
PACE-IT: Introduction to Safety Practices (part 2)
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
Data_Systems_Specialist_Role_Description[1]
Infrastructure dependability
Availability and reliability
Dependability requirements for LSCITS
Pace IT - Troubleshooting OS part 2
Wizard intro
System dependability
Critical systems intro
3.10 Introducing large ict systems into organisations
Uncovering the Myths Behind Remote Power
comparision between IT and Information system
System success and failure
Introduction to Critical Systems Engineering (CS 5032 2012)
Critical systems engineering
Designing software for a million users
Pace IT - Troubleshooting OS part 1
IT-Audit C&A
2.1 ict systems and components
Ad

Viewers also liked (13)

PDF
Taming Drupal Blocks for Content Editors a.k.a. "Snippets"
PPTX
Trailer exhibition research
PPTX
Trailer title and credit conventions
PDF
Stanley-Sean_fullCV4
PPTX
Gestion de proyectos de tecnología educativa
PDF
대신리포트_모닝미팅_151002
PDF
Les plantes per India i David
PPTX
Solutionpath - HPE Discover 2015
PDF
cat 15 final outline final
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
DOC
Juliet_sampa_CV_ edited
PDF
Les plantes per Aitana i Happy
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
Taming Drupal Blocks for Content Editors a.k.a. "Snippets"
Trailer exhibition research
Trailer title and credit conventions
Stanley-Sean_fullCV4
Gestion de proyectos de tecnología educativa
대신리포트_모닝미팅_151002
Les plantes per India i David
Solutionpath - HPE Discover 2015
cat 15 final outline final
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
Juliet_sampa_CV_ edited
Les plantes per Aitana i Happy
PACE-IT, Security+3.4: Summary of Wireless Attacks
Ad

Similar to PACE-IT: Analyzing Monitoring Reports (20)

PPTX
PACE-IT: Troubleshooting Common Network Issues
PPTX
Pace it troubleshooting-common_network_issues_bf
PPTX
PACE-IT: Troubleshooting Connectivity With Utilities
PPTX
PACE-IT: Common WAN Components and Issues
PPTX
PACE-IT: Common Network Vulnerabilities
PPTX
PACE-IT: Network Monitoring (part 1) - N10 006
PPTX
PACE-IT: Network Monitoring (part 2) - N10 006
PPTX
Pace IT - Troubleshooting Wireless Networks
PPTX
Pace IT - Client Networking (Part 3)
PPTX
Pace IT - Troubleshooting Networks Wired
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PDF
Diagnosing Internet Outages
PPTX
PACE-IT: Configuring Switches (part 1)
PDF
Get Principles of Information Systems 13th Edition Stair Solutions Manual Fre...
PPTX
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PPTX
PACE-IT: Troubleshooting Wireless Networks (part 1)
PPTX
Pace IT - Network Devices (part 2)
PDF
Principles of Information Systems 13th Edition Stair Solutions Manual
PPTX
PACE-IT: Configuring Switches (part 2)
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT: Troubleshooting Common Network Issues
Pace it troubleshooting-common_network_issues_bf
PACE-IT: Troubleshooting Connectivity With Utilities
PACE-IT: Common WAN Components and Issues
PACE-IT: Common Network Vulnerabilities
PACE-IT: Network Monitoring (part 1) - N10 006
PACE-IT: Network Monitoring (part 2) - N10 006
Pace IT - Troubleshooting Wireless Networks
Pace IT - Client Networking (Part 3)
Pace IT - Troubleshooting Networks Wired
PACE-IT, Security+1.2: Secure Network Administration Concepts
Diagnosing Internet Outages
PACE-IT: Configuring Switches (part 1)
Get Principles of Information Systems 13th Edition Stair Solutions Manual Fre...
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Troubleshooting Wireless Networks (part 1)
Pace IT - Network Devices (part 2)
Principles of Information Systems 13th Edition Stair Solutions Manual
PACE-IT: Configuring Switches (part 2)
PACE-IT, Security+ 2.4: Basic Forensic Procedures

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Basic Mud Logging Guide for educational purpose
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Types and Its function , kingdom of life
Module 4: Burden of Disease Tutorial Slides S2 2025
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pharma ospi slides which help in ospi learning
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
STATICS OF THE RIGID BODIES Hibbelers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Supply Chain Operations Speaking Notes -ICLT Program
TR - Agricultural Crops Production NC III.pdf
GDM (1) (1).pptx small presentation for students
Microbial diseases, their pathogenesis and prophylaxis
Pharmacology of Heart Failure /Pharmacotherapy of CHF
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
RMMM.pdf make it easy to upload and study
Basic Mud Logging Guide for educational purpose
O5-L3 Freight Transport Ops (International) V1.pdf
Institutional Correction lecture only . . .
Abdominal Access Techniques with Prof. Dr. R K Mishra

PACE-IT: Analyzing Monitoring Reports

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Baselines. – Reports. PACE-IT.
  • 5. Page 5 How do you know what constitutes good network performance and what indicates an issue? This is where baseline documentation comes into play. Baseline documentation provides a snapshot of the network when it is running efficiently. Baselines are usually kept as a log file, although they may also be graphical in nature. Baselines should be established on CPU utilization and network utilization (and any other function you deem relevant). Periodic tests should be conducted to determine if the baseline has changed. You can use Windows Performance Monitor to help establish the baseline. Analyzing monitoring reports.
  • 6. Page 6 – Items to consider for baselines. » Network device CPU utilization. • Can help to determine when a network device is going to fail. • Can help to determine when more network devices should be installed in a growing network. » Network device memory utilization. • Can help to determine when it is time to expand the memory of network devices. » Bandwidth utilization. • Can help to determine the overall health of a network. • Can help to determine when network segmentation should occur. • Can help to determine if a network device is failing (creating a storm of data). • Can help in identifying when a security breech has occurred. Analyzing monitoring reports.
  • 7. Page 7 – Items to consider for baselines continued. » Storage device utilization. • Can help to determine when storage utilization has become a bottleneck on the network. • Can help determine when to increase the storage capacity of the network. » Wireless channel utilization. • Can help to determine how saturated the wireless channels have become; once it is determined that they are saturated, a new wireless access point (WAP) can be installed to alleviate the pressure. • Can help to determine if there is unauthorized wireless access occurring (especially if there is utilization on a channel that is supposed to have none). Analyzing monitoring reports.
  • 9. Page 9 – Log management. » Log files can accumulate data quickly and some administrators only review them after a major problem has occurred. In most situations, this is a case of too much information. • Good administrators will set proper reporting levels with their logging software. • Good administrators will review logs and compare them against their baseline documentation to find issues while they are still minor. » Logs should be kept and archived in case there is a need for historical data; follow the organization’s data storage policy. » One consideration is to create a running graph of important metrics that are captured by logs. • Graphing the data gives a quick visual reference, making it easier to spot issues. • Many logging applications give the administrator the option of creating graphs. Analyzing monitoring reports.
  • 10. Page 10 – Interface link status. » When reviewing the output from an interface report, the first line is usually a report on the status of the link. • Fastethernet0/0 is up, line protocol is up (all is good). • Fastethernet0/0 is up, line protocol is down (all is not good); the interface is administratively up, but is not able to communicate with the other end. • Fastethernet0/0 is down, line protocol is up (all is not good); there may be an issue with the cable or the physical port itself. • Fastethernet0/0 is down, line protocol is down (all is not good, but all is not bad); the interface has been administratively shut down. – Problems on an interface. » If the link status of the interface indicates that there are no problems (the up and up state), but something is not operating correctly, then it is time to dig a little deeper into the interface monitoring reports. Analyzing monitoring reports.
  • 11. Page 11 – Interface monitoring reports. » There are many things that can happen on a network device’s interface to cause issues. • In most cases, it will be required to log into the device and run the device’s report to determine the cause of any problems. » Speed and duplex settings (the most common problem): • If there is a speed mismatch, the devices will not connect. • A duplex mismatch will cause intermittent issues (e.g., errors in output or input reports or dropped packets). » Discards and packet drops: • If the device is discarding incoming packets, then, more than likely, the device’s CPU is being overutilized. • If the device is dropping outgoing packets, then there is a bandwidth congestion issue. » Interface resets: • If the interface keeps resetting, the most likely cause is a communications issue between the two end points. Analyzing monitoring reports.
  • 12. Page 12 Analyzing monitoring reports. Baselines are used to establish what network performance should be. Periodic tests should be conducted against the baselines to determine if they have changed. Functions that might benefit from having a baseline include: network device CPU utilization, network device memory utilization, bandwidth utilization, storage utilization, and wireless channel utilization. Topic Baselines. Summary Log files can accumulate data rather quickly. Administrators can help manage the growth through setting the proper reporting levels. Log reports do need to be reviewed and should be archived. Graphing log data can give a visual reference that makes it easier to spot problems. Any interface link status other than up and up indicates that there may be an issue. Problems can still occur on a network interface, even when link status is up and up. Issues that can occur include: speed and duplex mismatch, discarded and dropped packets, and interface resets. Reports.
  • 14. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.