scholarly journals ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

Author(s):  
Aman Mahajan ◽  
Haresh Joshi ◽  
Sahil Khajuria ◽  
Anil k. Verma

The algorithm and realization technique of network topology discovery is a very important technical indicator for a network management system’s quality. Based on the knowledge of the network topology discovery theory, the research on ICMP and SNMP programming for Windows, this paper proposes a method of developing the common network topology discovery software which is a conglomerate of ICMP and SNMP protocols so as to monitor a given network and successfully manage it while taking into full advantage of above mentioned protocols.

2011 ◽  
Vol 267 ◽  
pp. 594-598
Author(s):  
Su Jing Xue

Since the network was born, the network management has been the material effect factor which the computer network develops. Taking the reasonable network topology technology has already become the entire network management foundation,and for the isomerism, diverse and changeable network, the importance of network topology survey discovery is also enhancing. studying the highly effective network topology discovery method has the quite vital significance and the value to guarantee the network effective and safe operation.


2013 ◽  
Vol 347-350 ◽  
pp. 2071-2076 ◽  
Author(s):  
Jian Xia Ge ◽  
Wen Ya Xiao

Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms of the network layer topology discovery based on the SNMP and ICMP protocol, based on this, this paper puts forward a improved algorithm of the comprehensive two algorithm, and makes the discovery process that has a simple, efficient, and has a strong generalization, and solved in the discovery process met the subnet judge, multiple access routers identification.


2013 ◽  
Vol 380-384 ◽  
pp. 1327-1332
Author(s):  
Jian Xia Ge ◽  
Wen Ya Xiao

Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms of the network layer topology discovery based on the SNMP and ICMP protocol, based on this, this paper puts forward a improved algorithm of the comprehensive two algorithm, and makes the discovery process that has a simple, efficient, and has a strong generalization, and solved in the discovery process met the subnet judge, multiple access routers identification.


2020 ◽  
Vol 245 ◽  
pp. 07055
Author(s):  
Jeremy Musser ◽  
Ezra Kissel ◽  
Martin Swany ◽  
Joe Breen ◽  
Jason Stidd ◽  
...  

The Network Management Abstraction Layer (NMAL) extends perfSONAR capabilities to include automated network topology discovery and tracking in the Unified Network Information Service (UNIS), and incorporate Software Defined Networking (SDN) into overall operations of the OSiRIS distributed Ceph infrastructure. We deploy perfSONAR components both within OSiRIS and at our “client” locations to allow monitoring and measuring the networks interconnecting science domain users and OSiRIS components. Topology discovery (using an SDN controller application) and Flange Network Orchestration (NOS) rules are used to dynamically manage network pathing in our testbed environments. NMAL components have been containerized to operate within the Services Layer at the Edge (SLATE) infrastructure, and we describe our experiences in packaging and deploying our services.


2015 ◽  
Vol 94 (3) ◽  
pp. 415-430 ◽  
Author(s):  
Amir Azodi ◽  
Feng Cheng ◽  
Christoph Meinel

2021 ◽  
Vol 3 ◽  
pp. 48-55
Author(s):  
O. Lytvynov ◽  
H. Spitsyna

Network management is a relatively new concept, which, nevertheless, has taken its place in the field of science and practice of crime counteraction management. In connection with recognition of the place and role of networks in implementing management activity, a number of theoretical questions on redefining the role of state, legitimacy of network structures, trust to new forms of interaction within the state, private sector, nonprofit organizations and associations of citizens arise. The issue of state sovereignty, legitimacy and trust in the context of management problems are studied not only by political scientists, but also by criminologists who conduct research on the problems of improving the policy of crime counteraction. The majority of autonomous, independent and not subordinate to each other entities are involved, each of whom solves his task in this common problem by his own means and methods in accordance with corresponding legislation. However, no matter how independent and autonomous the participants in crime counteraction are, their division is unacceptable since each of them is only one part of the common state and legal system aimed at ensuring resolution of a single task in crime counteraction. Each of them, no matter how it works, is not able to address the issue of crime idependently, only by his own means. They only complement each other, and therefore their activity, undoubtedly, require organization, management, coherence, interaction, coordination. And one of the ways to organize the system of accomplishment of set tasks is network management. The peculiarities of the latter are that a certain part of crime counteraction happens primarily on a procedural basis, and law enforcement agencies are procedurally independent and autonomous (this excludes any authroitative forms of management). Therefore, network management is implemented only on the basis of equality of all its elements, independence of each of them when performing tasks, responsibility for their realization and compliance with law.


Author(s):  
Anthony Steed ◽  
Emmanuel Frecon

In this chapter, we give an overview of some of the issues that face programmers and designers when building collaborative virtual environments (CVEs). We do this by highlighting three aspects of CVE system software: the environment model (data structures, behaviour description) that the system provides, the data-sharing mechanism (how the environment model is shared), and the implementation framework (the structure of a typical client or platform in terms of the services it provides to the user). When a CVE system is designed, choices have to be made for each of these aspects, and this then constrains how the designers and programmers go about constructing the CVE worlds themselves. We present the main body of the overview by using examples that highlight many of the important differences between CVE systems. We will also relate our discussion to the common topics of network topology and awareness management.


Sign in / Sign up

Export Citation Format

Share Document