Networks are now a fact of life inside any company. If the network goes down for whatever reason your data won’t be transmitted and your company won’t be offering any service to its clients, your SLAs will suffer, your brand will be tarnished, and your customer complaints lines will be red hot with incoming grievances.

Thus, a monitoring system can make all the difference to your business.

Hence and because we want to talk about all network monitoring’s characteristics, first we are going to define what monitoring means and the differences between a monitor system and a network management system. Two main different aspects of network monitors.

Table of contents

Monitoring definition

In its wider definition, monitor something is to watch and check some parameters along a period of time in order to detect changes, modifications, anomalies, failures…

Talking about network monitoring, we measure parameters like net status, bandwidth, nodes, nodes’ status… Any measurable parameter that allows us to maintain networks health.

Therefore, to monitor a network is to monitor those parameters for us to solve any problem as soon as possible, by analyzing whole network status.

Network management definition

If monitoring is a passive visualization of its essential parameters, network management is to take action in order to solve or anticipate any possible error.

Network management example would be, as we said, to monitor bandwidth capacity, whilst a network management example would be, before a bandwidth fall occurs, bottleneck detection and performing necessary actions in order to solve them.

Another network management definition would be that it is an advanced monitoring, that uses basic monitoring in order to take action onto network devices and parameters.

Basic network monitoring characteristics

Network monitoring 101, where syslog messages and bandwidth control are fundamental.

1. Syslog messages

What are syslog messages? Syslog messages are information generated by communication hardware that is sent into a central server where they are saved.

Once on the server they can be easily monitored, analyses can be performed and alarms configured.

For example, a syslog server can collect all failed login attempts and launch an alarm when more than ten failed attempts have been made in one minute, warning you that that something is wrong and needs to be fixed.

2. Syslog servers

If syslog messages are essential information sent into a central node, syslog servers are those central nodes that stores all messages sent by any network device.

Syslog servers examples:

  • Windows Syslog. Used on Windows operating systems http://windowssyslog.codeplex.com/releases/view/617649
  • Tftpd32. For Windows systems. In addition to a syslog server it has DHCP, FTP, DNS and TFTP servers
  • Visual Syslog Server. For Windows systems.
  • Syslog Server. For Linux and Windows

3. Bandwidth

Bandwidth refers to the quantity of information that passes through a network link during a specific time period, regardless of whether the data is passing through a physical connection or via Wi-Fi. The information is measured in bits/second and being able to measure the flow of data correctly is what tells you how busy your network is.

When a network is at 90% of its bandwidth it will start to have a knock-on effect on systems that are on the network. Using monitoring software it is possible to get accurate feedback on the status of your bandwidth, and whether it is saturated and why.

4. Tools for bandwidth measuring

 network monitoring system

Advanced network monitoring

These two tools, correctly configured, give you the basics on your network’s health and allow you to configure and trigger alarms, as well as record and measure network activity, but do not let you manage the network.

For that you will need a platform you can configure to take action when specific parameters are met or thresholds passed. This is the next step for network management.

1. What to keep in mind when choosing network monitoring software

These are the characteristics that are going to be further explained:

  • Alert notifications.
  • External server integration.
  • Utility and proper representation of  data on your panels.
  • Flexibility to adapt to specific tools or software.
  • Access to API from external systems.
  • Automated device detection.
  • Database integration.
  • Multidevice.
  • Scalability.
  • Support for the greatest number of data acquisition protocols possible.
  • Security.
  • Virtual machine integration.
  • Hardware integration.
  • Remote control.
  • Hardware and Software inventory.
  • Geolocation.
  • Cloud monitoring.

1. Communicating alerts

When it comes to alerting users and administrators about network incidents it’s always best to have as many options at your disposal as possible. Just as important as the speed of delivery is the message’s format and compatibility. Firstly, messages have to be legible (HTML) and deliverable to smartphones, tablets, PCs, even wearables like your smartwatch or relics from the past like the dumbphone you use on Saturday night because you don’t want your iPhone to get trashed. They also need to be compatible with as many messaging formats as possible; WhatsApp, Telegram, email, SMS, push, etc

2. External systems integration

Apart from bandwidth and network link status, a monitoring system needs to be able to monitor different servers: email, web or CRM application servers, among many others, allowing you to get statistics on your datacenters vital signs.

If you want to go deeper into server monitoring you can take a look at the following workshop:

3. Visualizing data on the control panel

A picture tells a thousand words, they say and visual information is easier to understand than reams of paper covered in digits, which is why it is a no-brainer to present the information in as visual a way as possible. Your control panels should be configurable and customizable. They should allow the user to define roles, and access by role, because your CTO and your CFO need different information, even though it comes from the same source.

4. Flexibility to adapt to specific tools or software

It’s so important that your monitoring system can adapt to different environments and technologies that we wrote it in green. Not only must it adapt to the communication protocols already mentioned, but it must also be able to adapt to applications not found on every installation. If you think of something like a piece of business intelligence software created in-house, it is of maximum importance that your monitoring system is able to detect and monitor it.

5. Accessing APIs from external systems

Nowadays your applications are communicating among themselves. In order for an application to share its information with your monitoring system and with other applications its data and operations need to be accessible, via API. Bear in mind that the applications are usually located on different networks, so the API has to have broad compatibility (REST protocol, using libraries imported during software compiling, etc.).

6. Automated device detection

The monitoring tool you use should be able to automatically detect all the different elements and components that make up the network in order to save you time and give you information on how they are being used, their status, etc.

In Pandora FMS one of the main tools when it comes to facilitate the self-discovery of networks is Discovery. You can discover much more about this utility in the following video:

7. Database integration

In a previous article we saw how important databases are in the IT infrastructure so your monitoring solution needs to be able to integrate your database into the monitored park.

8. Multidevice

Devices are proliferating as more and more appliances become Internet-enabled, including tablets, TVs, smart watches and even fridges! So why not demand that the software that is going to monitor your network be accessible from any of them (except the fridge, for the time being)?

9. Scaling

The key to handling growth in your organization is to ensure your monitoring solution is designed to scale and handle larger and more complex machines and applications, etc. Take a look at the software that you are currently running and ask yourself how it will run if your system scales up and your datacenter expands.

10. Does it support the widest range of data acquisition protocols?

You want to collect as much data about your network as possible so your system needs to capture messages from network protocols such as Netflow, sFlow, jFlow, etc.

11. Security

Information is the currency of the digital age, and if you store sensitive information on your network you will be thinking about security. Monitoring tools need tight security regarding third party passwords, for example (most security breaches are due to human error, or negligence, rather than complicated hacks). Solutions should include encryption, double access protocols, etc.

12. Hardware integration

Networks are not only cables and nodes, but are fundamentally composed of machines and applications, so don’t underestimate your hardware. You don’t have to dig down to layer 1 nuts and bolts (but if you can, so much the better!), but monitoring temperature, disc space, or memory are all essential elements of good monitoring practice.

13. Remote control

A nice extra for any monitoring platform to include is the ability to remotely operate another PC, to intervene, troubleshoot, fix a problem, whatever.

With Pandora FMS you can use, for example, eHorus. Ehorus is a remote access system perfectly integrated with Pandora FMS. Discover it a little better in this video:

14. Hardware and software inventory

Related to point number six, network discovery, but this time referring specifically to hardware and software. No one wants to waste time manually checking for new devices; your monitoring tool should be able to run those checks by itself, discover new hardware and software and give feedback on the status and location of each new element, plus inventorize them.

The most important data to be inventorized are:

  • OS, IP, bios, memeory, CPU and drivers
  • Installed programs, patches and versions.

15. Geolocation

Networks occupy physical, as much as cyber, space and it is essential to locate components of your network in case you need to physically access them, if they fail, need replacing, if they are offsite or even mobile, keeping track of your IT assets is never not a good idea.

16. Cloud monitoring

Say it loud, I’m Cloud and I’m proud! No one is afraid of the Cloud anymore, and more servers and applications are migrating there, taking advantage of the services offered by Amazon, and other hosting companies, not only to store gargantuan, incomprehensible amounts of data, but also to run services and applications. Your monitoring tool should most definitely be able to monitor any applications you have running on the Cloud.

Summary and conclusions

After reading this post, you will know that network monitoring is far more than only a basic monitorization and the hardware itself. Every network monitor must fulfil all these characteristics in order to reduce maintenance time and cost.

We recommend you to know what Pandora FMS is, developed in order to completely fulfil those requirements, free in its Open Source version or in its Enterprise version.

Discover all the benefits Hughes gained by implementing Pandora FMS as a monitoring system

Success story Hughes

A network monitor tool is much more than a silent watchman, endlessly pinging devices and doing general plumbing and troubleshooting. In fact, they are an integral part of any business strategy, allowing you to use your resources – both human and technological – in a more effective way, reducing costs and times in many areas. Unsurprisingly, we recommend our own product, Pandora FMS, a monitoring tool designed for maximum flexibility and customizability that covers all the above requirements and many more, including UX, transaction monitoring and IOT monitoring.

Have we forgotten anything? Let us know if there is any item missing from our list, or if you have experience using Pandora FMS to monitor any of the above areas.

About Pandora FMS

Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.

Would you like to find out more about what Pandora FMS can offer you? Find out by going here .

If you have to monitor more than 100 devices you can also enjoy a FREE 30-day Pandora FMS Enterprise DEMO . Get it here .

Finally, remember that if you have a reduced number of devices to monitor, you can use Pandora FMS OpenSource version. Find more information here .

Do not hesitate to send us your questions. Pandora FMS team will be happy to help you!

Shares