Font Size: a A A

Environmental Monitoring System Of Intranet Based On Linux Design And Implementation

Posted on:2012-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:H Y DaiFull Text:PDF
GTID:2178330332989254Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of technology, the computer is widely applied in all walks of life. Many industries such as the finance, telecommunications, electricity, oil, etc., as the computer equipment necessary for production or research and development, and often need very large number of requirements. How to better monitor the management of these resources, and ensure the machine can run 7×24 hours, has become the first problem to be solved. Many companies have specialized equipment within the network administrator whom responsible for managing and monitoring. However, due to the number of devices increase, the increasing complexity and increasing operational complexity, relying solely on the management and control of manual had not fully meet the actual situation. In order to reduce the administrator's job stress, improve work efficiency, we must use the complete system monitoring software, allowing administrators to keep abreast of system health and resource use, and can be issued in time to accept the system alerts the various event.Data security system , that of data and communications systems, form Meridian subject designed by CAS, of the actual situation as background, the main parameters of the server performance and indicators, and are given for the demand for data security system architecture model. In the analysis of more than at home and abroad for server performance analysis, measurement and monitoring system based on the application. Combination of open source software, developed within a practical network performance monitoring system. And the performance of the system was tested, the initial realization of the network monitoring server performance, and the application of the audit log and alarm functions.Article is divided into the following sections, first, background and basic theoretical research, from monitoring and analyzing performance requirements, through the study of network protocols to establish the monitoring of various parameters; second, introduced within the network monitoring system requirements and detailed design of the details. The system realizes the memory utilization, I/O traffic, cpu load, application logs, user action, system data such as the implementation of the monitoring process, and can send alerts and timely information. Improve the network management process of "transparency" of administrators, reduced the amount of tedious manual operation.
Keywords/Search Tags:Intranet Monitoring, Process, Log Audit, Send Alarm
PDF Full Text Request
Related items