Ping (ICMP)
Ping (ICMP) Ping is request message for protocol ICMP.

Ping is request message for ICMP (stands for Internet Control Message Protocol). This protocol is used by different network devices to check if a service or a device is available. Usually it is used for network diagnostics.

Ping monitoring allows you to keep an eye on your network infrastructure. Ping failure means broken connection to a network entity. It is handy to use Ping together with HTTP monitoring. In this case, you get additional information - for example, you know if the error is site-related, or the whole server has gone down. However, sometimes ICMP could be blocked for incoming requests, in order to prevent ddos attacks.

  • CM.Glossary.WebsiteMonitoring
  • CM.Glossary.Downtime
  • CM.Glossary.DistributedMonitoring
  • CM.Glossary.HTTP
more glossary
"Thank you so much for your service. We were suspecting problems with our hosting company but they denied any problems saying the issues must be at our end. We know we do have issues at our end but still suspected that wasn't the entire story. Your service was able to prove that they are indeed going down regularly - on average twice a week during the trial period. Thanks again for providing the information we needed to make a proper decision on this issue."
- B.
Uptime and website monitoring

Website monitoring is a process of supervision over the performance of the site. HostTracker is a powerful tool which serves that purpose.

Website monitoring is a process of supervision over the performance of the site. Usually it is used to keep an eye on commercial sites or other pages for which high availability is very important.

Companies, which provide website monitoring services, let their clients to check a website, a server, port or other available from the Internet entity. The responses are collected and analyzed. Usually, the monitoring is performed from different locations, distributed over the whole world or the specific continent or country. Such monitoring is called distributed monitoringand helps to detect network-related issues as well as site or server-related. Also, distributed monitoring often makes possible to analyze the site performance from the places which are close to the real customers, instead of some distant locations which could have high latencies. The collected information could be found in a different form: email reports, graphs and different smart dependencies, to help the client to get a comprehensive view of the site's performance. Parameters like load time, speed and others can help to optimize the site performance. In case of critical error, monitoring services use variety of notification methods to deliver the alert to the client: SMS, voice call, instant messengers, email and others. This, together with immediate diagnostics, helps responsible persons like server administrators or developers to fix the site as soon as possible and minimize the duration of the failure.

Why is this important? For commercial sites, working time is proportional to their income. Roughly speaking, 2 hours of failure per day means that 1/12 part of the potential clients are lost. Even more - loyal customers also can find a more reliable competitor in case they can not receive their services/goods when they want. For other types of sites, like government, educational, NGO this is very important too. If people can't find the information fast, they'll find another source. Some parameters like site speed are important for search engines, others - database connectivity, for example - can greatly affect the convenience of usage of the site. Monitoring of some internal values like CPU load, memory consumption and disk space are important for administrators in order to prevent performance degradation. Another important purpose is verification of SLA (service-level agreement) of hosting provider. For technical issues, no site can be available 100% of time during long enough period. Sometimes servers are rebooted, updated or upgraded. So each hosting provider guarantee some specific value, which is called uptime, that shows how long can a site be down for technical reasons. Uptime is usually measured in percent. In this table it is shown for how long a site could be down for each uptime value:

  • 90%          876 hours
  • 95%          438 hours
  • 99%          87,5 hours
  • 99.9%       8 hours 45 minutes
  • 99.99%     52,5 minutes
  • 99.999%   5 minutes 15 seconds

If the real site performance does not correspond to SLA, it could be a reason for claim and refund request. Also, it can help the customers to select the best hosting for their needs.

Monitoring companies often provide some additional services, like vulnerability check, virus scanning, domain and certificate expiration check and many others, in order to make a useful product for their customers.

Different ways to monitor

The monitoring, based on the purpose, can be performed in several ways. Internal monitoring tools require some software to be installed into the monitored system, for example, corporate network. It helps to detect network issues, system performance and exclude or catch hardware and performance issues. External monitoring is performed from outside. It's purpose is check the availability and performance of the system by the third-party's eyes. Real user monitoring is external monitoring which simulates the real visitor of a site. Depending on complexity, such monitoring can analyze the page loading, content, sometimes - even design problems. Most advanced monitoring can offer its client to create a scenario for a visitor. This is called transaction monitoring and can perform some steps one-by-one: like load the page, navigate through menu, make a purchase. Passive monitoring is performed by a code which is integrated into the website code and sends specific information to the collector server each time the page is loaded. It helps to analyze customers actions on the site and analyze the traffic.

Monitoring services usually support different check protocols, and can monitor not only the websites, but also other entities like a file servers, mail servers, specific ports etc. Depending on task, monitoring interval can vary from several seconds to once per day.

more blog
 
Privacy policy
Sign In
Sign Up
Prices & packages
Our monitoring network
Home > Privacy policy

What information do we collect?

  • We collect information from you when you register on our site or place an order.
  • When ordering or registering on our site, as appropriate, you may be asked to enter your: name, e-mail address, mailing address, phone number or credit card information. You may, however, visit our site anonymously.

What do we use your information for?

  • Any of the information we collect from you may be used in one of the following ways:
  • To personalize your experience (your information helps us to better respond to your individual needs.
  • To improve our website (we continually strive to improve our website offerings based on the information and feedback we receive from you).
  • To improve customer service (your information helps us to more effectively respond to your customer service requests and support needs).
  • To process transactions. Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.
  • To send periodic emails. The email address you provide for order processing, may be used to send you information and updates pertaining to your order, in addition to receiving occasional company news, updates, related product or service information, etc.

How do we protect your information?

  • We implement a variety of security measures to maintain the safety of your personal information when you place an order.
  • We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our Database to be only accessed by those authorized with special access rights to our systems, and are required to keep the information confidential.

Do we use cookies?

  • Yes (Cookies are small files that a site or its service provider transfers to your computers hard drive through your Web browser (if you allow) that enables the sites or service providers systems to recognize your browser and capture and remember certain information.
  • We use cookies to understand and save your preferences for future visits.

Do we disclose any information to outside parties?

  • We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential.
  • We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.

California Online Privacy Protection Act Compliance

  • Because we value your privacy we have taken the necessary precautions to be in compliance with the California Online Privacy Protection Act. We therefore will not distribute your personal information to outside parties without your consent.
  • As part of the California Online Privacy Protection Act, all users of our site may make any changes to their information at anytime by logging into their account and going to the 'Profile' page.

Host-Tracker Microsoft Bot Framework

  • Our Host-Tracker bot is enabled by Microsoft Bot Framework. The Microsoft Bot Framework is a set of web-services that enable intelligent services and connections using conversation channels you authorize. As a service provider, Microsoft will transmit content you provide to our bot/service in order to enable the service.
  • For more information about Microsoft privacy policies please see their privacy statement here: http://go.microsoft.com/fwlink/?LinkId=521839.
  • In addition, your interactions with this bot/service are also subject to the conversational channel's applicable terms of use, privacy and data collection policies.
  • To report abuse when using a bot that uses the Microsoft Bot Framework to Microsoft, please visit the Microsoft Bot Framework website at https://www.botframework.com and use the “Report Abuse” link in the menu to contact Microsoft.

Your Consent

  • By using our site, you consent to our web site privacy policy.

Changes to our Privacy Policy

  • If we decide to change our privacy policy, we will post those changes on this page, and/or update the Privacy Policy modification date below.
  • This policy was last modified on 11.11.2016

Contacting Us

Share:
Send to Twitter Send to Facebook Send to LinkedIn Share on Google+
Blogs:
HostTracker blog HostTracker page on Facebook