StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Performance Baseline Development for Severs and Networks - Coursework Example

Cite this document
Summary
The main aim of the following writing "Performance Baseline Development for Severs and Networks" is to briefly describe the concept of network performance baseline. Moreover, the paper discusses the protocols used in baseline development and reviews the work principles…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Performance Baseline Development for Severs and Networks
Read Text Preview

Extract of sample "Performance Baseline Development for Severs and Networks"

 Performance Baseline Development for severs and Networks Network performance baseline is made up of data and network metrics. The data and network metrics are used to define the normal working condition of a network infrastructure. There is no single standard approach for creating a performance baseline. All vendors have varied lists of monitors that a given device supports. Administrators should focus on the narrow subset of monitors that are available.

Inventory of the network device to monitor are taken next. Physical and virtual devices should be considered in this step. After inventory taking, the next phase is analyzing the traffic flow across the network. The analysis indicates the health status of the network. Data capture or sniffing tools can be used to monitor the stream of network data. Also, other protocols such as sFlow or NetFlow can be alternatively be used to capture the data stream. The two are less storage intensive compared to sniffing tools.

The administrators can see trends in application usage by performing packet analysis. The trends will help in assigning the percentage of utilization for each application in reference to total network usage. Finally, the monitors are left to run and gather points of data. The most preferred time to be allocated is about seven days. The seven days will allow effective and accurate monitoring of window and thus the determination of performance trends. A baseline for each data metrics is then set.

The ranges that were obtained will determine the network performance baseline. (Tomsho, G. 2009, pg. 143) Some windows programs and tools can be used to gather the information that can be used to create the baseline. These include the Windows Forensics Toolkit (WFT) and the KDiff. WTF is an analysis tool developed by McDougal. It can be used to collect data. It is done by using the command “wft-fetchtools”. The KDiff is a comparative analysis tool. KDifff accepts both a baseline file and an updated file; it evaluates and determine the differences between the two versions of files.

ReferenceTomsho, G. (2009). MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory (Exam #70-640). New York, NY: Cengage Learning.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Performance Baseline Development for Severs and Networks Coursework”, n.d.)
Performance Baseline Development for Severs and Networks Coursework. Retrieved from https://studentshare.org/information-technology/1674744-u5-case-study
(Performance Baseline Development for Severs and Networks Coursework)
Performance Baseline Development for Severs and Networks Coursework. https://studentshare.org/information-technology/1674744-u5-case-study.
“Performance Baseline Development for Severs and Networks Coursework”, n.d. https://studentshare.org/information-technology/1674744-u5-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Performance Baseline Development for Severs and Networks

Project Implementation, Control, and Termination

Michigan Historical Society will work with our development and construction team for the handling of this project.... This project is in its operational stage and this report is aimed at providing the main working steps, resources planning, and project management working areas.... In this report, I… This report will analyze and adjust the previously established operational steps, resource planning and project phases' management plans. This project management and planning report This will involve the planning and discussion about the project major steps and operations....
11 Pages (2750 words) Essay

The Social Network Impact on Online Travel Service Provider

Social networks can be used to boost business especially when the marketing campaigns are designed to match the business objectives.... In essence, the social networks have helped businesses to make a major milestone in promoting their products (Turban et al.... These are sites whereby information that is unique to companies is posted with the aim of making it available to many people for purposes of marketing and awareness creation....
5 Pages (1250 words) Essay

Development on a LAN/WAN Solution for Enhancing Data Connectivity within an Organization

This project is focused on development on a LAN/WAN solution that will enhance data connectivity within an organization.... The presentations are based on the earlier calculations and are a representation of the project's technical performance i.... This chart illustrates the schedule performance aspect of EVM.... Although the project is behind schedule, its performance is still relatively good (93....
6 Pages (1500 words) Term Paper

Threats And Vulnerabilities Analysis

The essay "Threats And Vulnerabilities Analysis" analyzes threats and vulnerabilities that the organization is likely to face.... The top management is responsible for documenting and overseeing implementation of an Information Security plan.... This would help in securing the system.... hellip; The following section lists a number of policy statements that give the narration of the information security controls that could be used by the institution to implement recommendations for protection....
6 Pages (1500 words) Coursework

The ISMS for Mr. Manos Llewellyn

Manos Llewellyn is not dispersed on a large scale, however, the company wishes to provide web development and web services, enable and configure Secure Socket Layer, Domain hosting, Web Applications, develop E-Shops, develop Web Designs, incorporation of a software house, graphic designing, and digital viral marketing strategy....
10 Pages (2500 words) Case Study

Global Finance Inc Security Policy

Wi-Fi networks willing permit this flexibility but security over the networks is a source of concern.... successful IT program is founded on three fundamental aspects: an IT policy that reflects on the needs of the campus, awareness and communication with all users of their IT responsibilities and roles and finally development of controls for monitoring and evaluation of the effectiveness of the program.... The first step in the development of an awareness and training program is training....
10 Pages (2500 words) Case Study

Trouble-Shooting and Maintenance Plan of XYZ Company

nbsp;… The main aim of developing a database maintenance plan is to assist in the prevention of query performance drops, corrupt databases and the risk of servers running out of disk space.... This assignment "Trouble-Shooting and Maintenance Plan of XYZ Company" focuses on controlling changes to the system that is very crucial and can only be achieved by classifying the required authorization necessary and controlling changes made to the network system on a strict basis....
6 Pages (1500 words) Assignment

Computer Network Server Configuration

… Building a Server HUThe computer network server is configurable efficient and reliable per the needs of a given business.... The business having a critical nature inclusive of consulates, banks, corporate companies or the police department, the Building a Server HUThe computer network server is configurable efficient and reliable per the needs of a given business....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us