what are the tags available for Network related issues. so we can easily rectified the problems while monitoring.
How memory leakage and CPU Utilization increasing?
What is the Difference between Virtual Bytes and Private Bytes in Process?
Concerning network related issue, you could start off by creating PING tags to all the nodes to the PI Server and the interfaces/connectors to their data source (if possible).
You can also create TCP Response point to test the specific port. For example a TCP Response point for port 5457 pointed at the AF Server.
I would suggest taking a look at IT Asset Monitor Toolkit
Concerning Virtual Bytes vs Private Bytes
Private Bytes refer to the amount of memory that the process executable has asked for - not necessarily the amount it is actually using. They are "private" because they (usually) exclude memory-mapped files (i.e. shared DLLs). But - here's the catch - they don't necessarily exclude memory allocated by those files. There is no way to tell whether a change in private bytes was due to the executable itself, or due to a linked library. Private bytes are also not exclusively physical memory; they can be paged to disk or in the standby page list (i.e. no longer in use, but not paged yet either).
Virtual Bytes are the total virtual address space occupied by the entire process. This is like the working set, in the sense that it includes memory-mapped files (shared DLLs), but it also includes data in the standby list and data that has already been paged out and is sitting in a pagefile on disk somewhere. The total virtual bytes used by every process on a system under heavy load will add up to significantly more memory than the machine actually has.
Private Bytes are a reasonable approximation of the amount of memory your executable is using and can be used to help narrow down a list of potential candidates for a memory leak; if you see the number growing and growing constantly and endlessly, you would want to check that process for a leak. This cannot, however, prove that there is or is not a leak.
Retrieving data ...