Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

What is User Datagram Protocol (UDP)?

One of the easiest transport layer protocols available in the TCP/IP protocol suite is the User Datagram Protocol (UDP). The communication mechanism involved is minimal. With UDP, neither the receiver nor the sender receives any acknowledgements of packets received. This protocol's shortcoming makes it unreliable and easier to process than many other protocols. Although UDP is considered an unreliable transport protocol, it uses IP services to ensure the best attempts are made to deliver data.

IPv4 vs IPv6 - What are the Differences?

An IP (Internet Protocol) address is a numerical label which is used for addressing he location and identification of the network interface for the devices connected to the computer network. The most used and popular IP version is IPv4 which uses 32-bit for IP addresses. Since the IPv4 became popular and the IPv4 addresses are getting depleted, Ipv6 is now used which uses 128-bit for the IP addresses.

How to Scale with DX UIM's Monitoring Configuration Service, Part 1: Introduction

For today’s IT operations teams, the stakes keep getting higher and demands only intensify. The services these teams are responsible for managing play an increasingly critical role in the prospects of the business, which means optimizing service levels is an absolute imperative. Meanwhile, the environments in play only seem to keep getting larger, more complex, and more dynamic. Given these factors, monitoring is a task that keeps getting more vital and more difficult.

Agent vs Agentless Monitoring: Which is Best?

Agent-based and agentless monitoring are the two main approaches network monitoring tools use to capture and report data from network devices. As the names suggest, the difference between the two is pretty simple: someone has to install extra software(the agent) for agent-based monitoring to work. But, that doesn’t explain why an IT team or an MSP would choose agent-based or agentless monitoring.

Best Practice Series: Securing the Monitoring System

Network security makes the headlines at least once per day – and usually for the wrong reasons. In today's world, ensuring and maintaining a secure deployment is of utmost importance. Did you know that WhatsUp Gold provides several important security features that you can configure and manage to maintain a secure deployment? These features can help you to defend against unauthorized access to the WhatsUp Gold server as well as to devices monitored by WhatsUp Gold.