Font Size: a A A

Research And Practice On The Technology Of Building The Network Topology Dynamic

Posted on:2003-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:F D HuangFull Text:PDF
GTID:2168360092466345Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
Computer network is the very thing that grows rapidly in the twentieth century. New applications and new network technologies make the network more complex, so the importance of network management becomes greater and greater day by day. People want to manage network in a simple, convenience, rapid way, to gain the state of network in time, to configure the network devices remotely, safely, effectively, to have the network in a normal state, Therefore, the project of remote configuration management is brought forward.The first goal of remote configuration management is to configure the devices remotely, the second is to give a friend interface to user for easy operation, the third is to gain the network state in time, and the last is to look after the security of the configuration.Aimed at the first goal of remote configuration management - to configure the devices remotely, the paper analyses the network management protocols and related technologies, discusses the feasibility of using SNMP (SIMPLE NETWORK MANAGEMENT PROTOCOL) agent to implement the remote configuration, at the same time, analyses the shortage of using SNMP agent only, imports the concept of outside agent, on the basis of this, puts forward a mixed agent-based structure (MABS). The paper also compares another two methods of remote configuration, and gives the reason of no adopting them. The paper still discusses the work course of the SNMP agent and outside agent, the strategy of implementing them in detail.For reaching the goal of gaining the state of network, the paper studies the technology of building the network topology dynamic, compares several algorithms, and discusses the strategy based on SNMP emphatically.Another important problem of configuration management is the security of configuration course, the paper gives a series of security strategies, such as user authentication, password management an so on, to guarantee the security of configuration really.
Keywords/Search Tags:Remote Configuration, Management, SNMP Agent, Outside Agent, Topology Build, Security
PDF Full Text Request
Related items