Solved

network load analysis

Posted on 2010-08-23
4
465 Views
Last Modified: 2012-05-10
is there a GUI software that gives a network load analysis. I thought a while ago I saw something that had a GUI that showed connections on a network, and graphically showed which connections where using the most bandwidth.
0
Comment
Question by:JeffBeall
  • 2
  • 2
4 Comments
 
LVL 24

Expert Comment

by:rfc1180
Comment Utility
Something quick and dirty:

http://www.paessler.com/prtg/

Might need to use wireshark in conjunction with PRTG.

If you need a long term solution, you can use cact and ntop:

http://www.cacti.net/
http://www.ntop.org/overview.html

Billy
0
 
LVL 1

Author Comment

by:JeffBeall
Comment Utility
would ntop or cacti analyze the whole network? or just from the network port on the pc it's installed on?
0
 
LVL 24

Accepted Solution

by:
rfc1180 earned 500 total points
Comment Utility
Well, you have to configure it on how you want to analyze the network, it ultimately can analyze anything you want it to analyze (Almost anything); the protocol they use for gather data to analyze is SNMP. Cacti would poll your devices, and ntop would be used with a switch that had the capability capturing data on a SPAN (Mirror port).

Cact is a Graphing Tool that can monitor servers, nodes, hosts, network devices, etc (Memory, CPU, Bandwidth, Sessions, Load, etc)
Ntop can be used to analyze data packets for top users using certain protocols, bandwidth usage base on protocol, etc.

Billy
0
 
LVL 1

Author Closing Comment

by:JeffBeall
Comment Utility
thank you.
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

What’s a web proxy server? A proxy server is a server that goes between clients and web servers, used in corporate to enforce corporate browsing policy and ensure security. Proxy servers are commonly used in three modes. A)    Forward proxy …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now