Font Size: a A A

Data Collection Based On Telnet And Customization Of Processing Rules Based On Files

Posted on:2007-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:C FengFull Text:PDF
GTID:2178360182496243Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the revolutionary progress of the Internet, the Internet construction andapplication have a high speed, the users of Internet step up constantly. On one side, thedevelopment of the network promotes the convenience of communication and sharing.On the other, the telecom company has to pay a lot on the construction of networkmanagement. So network management needs revolutionary changing. At present, thenetwork management of communication domain in our country has started recently.Administrators of network , diversity of business, complexity of technology,heterogeneity of equipment and the development of administrator network managementare not catch the development of network. It has bring heavy burden to networkadministrators and developers that the construction of divided network by stages, addinghardware facilities, developing one period specially network for management. For thisreason, we developed the Telecommunication General Object Platform (TGOP), theproject of national technology. With the success of TGOP, in the network managementof communication domain ,will completely resolve the problems such as the objectshows in resource, breakdowns, the problem of corpus in function system.Faced to the network management of communication domain, TGOP use thetechnology of model-driven, developing software platform of network management. Thespecial characteristics of TGOP system are: reducing the cost of network andmanagement services, making use of network resource availably,upgrading services,developed by using advanced technology, using collecting technology of networkmanagement to collect, super expansibility. Breakdown management, configuremanagement, system management, function management are the basic function of TGOP.For these management functions, it is important for the collection works.In order to offer real-time and accurate bedding data supporting to TGOP, a systemis required to collect data form network and used to analyze and process the data.Therefore we devised Data Collection module as the bedding data collection module forTGOP. Due to the complexity of telecommunication network and diversity of networkframework, it needs a multiple of collecting data method to meet to the requirements ofobtaining all sort of information. The module has many kinds of ways of collecting data,for example SNMP, Telnet, COM. Owing to the supports for Telnet from differentmanufacturers of network facilities, the ways of data collection based on Telnet willmake up the defects of other collection ways and make the system getting more highcompatibility collecting or flexibility.The data collection module based on Telnet get the mission-dispense through therule definition from the upper layer, collecting data according to the concrete commands.The administrator of the network gets the collected data and deal with, storage,presenting it. The data collection module based on Telnet has two main parts: the moduleof realizing the Telnet protocol and collection data module based on Telnet. The moduleof realizing the Telnet protocol mainly accomplish some necessary business affairs ofthe bedding protocol alternating, as inverting procedures of criteria Telnet protocol, thealternant processes of the chars negotiations of telnet protocol, transmission of net IO,dealing errors during the net communication, and so on. Data collection module mainlyrealizes receiving collecting missions form the rule definition module, building up theconnection of Telnet, option negotiations through the realization layer of Telnet protocol,the data collection missions of different time delay, dealing with abnormal errors ofcollecting or canceling, connecting long-distance data collection based on Telnet, and soon. That rule definition and mission dispatch module, data analysis or data receivingmodule, long-distance module, net transmission passing module and leaving interfacesmodule are assist modules, offering the upper commands and outward interfaces. Themain process of realizing data collection based on Telnet is: asking connecting-loggingin-negotiating-building up Telnet connecting-transmitting collecting commands-receiving collected information. The collected information will be proceeded dataprocessing in the upper layer.According to different commands the data collection module based on Telnet cando all sorts of collecting. Obtaining configure information is one function of its. That isobtaining configure information of the long-distance computer and saving it to the nativecomputer for tracking and managing the effects of different version software andhardware to network administration. Every network-equipment has different version ofsoftware. Configure management system save the information in the database one byone. When problem occurs, we can index the information had saved, it will help toresolve problems. The module puts configure information collected to storage in onecatalogue of one file in the native computer. We can name the configure files with thedates when we obtain them in order to check them later.When collecting data, there is one problem. That is we should take differentmeasures according to the multiplicity equipment , each platform of equipment has greatdifferences. For different equipments, we should have collection proposals match them,e.g. inverting of login mode, changing of command prompt, we all need speciallyunderstanding. Therefore, we save the match steps of processed collection to theconfigure files, base on the allocate dispatch to adjust the collection fashions of differentequipments. Form here, design the collection match machining. Aim at the differentcollection fashions of different collection equipments, handling the match steps ofprocessed collection saving in one file. According to the different missions dispatch thecollection fashion of the different equipment. Here we adopt xml file to storage. Forsaving equipment information, it has unique label, when make a choice with equipment,the match collection fashion of the equipment will be drown. The interface design of thecollection adapter combined the logging from the long-distance computer withcollecting data, using for realizing the function of logging in the long-distance computerand can be selected collection fashion of different equipments. When realizing loggingin, using c customization commands. User need to input the IP address of the mainframe,user name, the passwords, the user who has the legal power can select inputting superkey of user from the interface. Selected the equipment of one company, can get thematch command information of the equipment (those information have saved in one xmlfile).If logging in the long-distance equipment successful, it will execute responsecommands and return homologize information.During the process of the data collection, all data (include the password of user andthe entire conversation process of Telnet)have no cryptogram, so can easy be cough bythe third using net search tools and be attacked. Telnet is not to check the completenessof conversational. Because the data are all clear statement transmission, it is easy to betampered with. When using Telnet in the network management, the threat of networksecurity may include: flow analysis, revealing, disguise, information modify, servicerejection. Aim at the network problem with security, how to improve it that usingDiffie-Hellman to process exchanging cryptogram, using signature with add-secret bypublic key and private key, and so on.After collecting data, the data are processed in the upper level through transmitting.Rule configuration is one of the transactions of data. Users establishing differentprocessing rule and data structure depend on specific types of original data. Ruleconfiguration includes processing rules, data structure configuration and missiondefinition. The system offers a friendly interface of user customization. Through thefunction of processing rules, user can define different processing rules and process thecollected data depend on concrete data structure of the network and the demand of theuser. This function mainly processed three kinds of files: drl files, result-piece files andoid files. For the files, there are four manipulations: query, deletion, addition andmodification. When processing the files, different ways is chose depend on differentcollecting fashions.
Keywords/Search Tags:Customization
PDF Full Text Request
Related items