Font Size: a A A

Research On The System Of Network Topology And Terminal Access Status

Posted on:2012-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:Z J HongFull Text:PDF
GTID:2218330335493095Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the needs of network application growing in the information society, how to run network securely, efficiently and stably is the major issue faced by network management. It has the important practical significance that monitoring the real-time status of network which is the prerequisite of network management.Based on the thorough analysis of network basic monitoring technology, this paper digs deeply into the main problems of network monitoring technology at current, proposes solutions, and thus achieves a Network Topology and Terminal Access Status Monitoring System.This paper emphasizes on the network behavioral characteristics technology with an analysis of the relevant content of SNMP and ICMP. Based on these technologies, the architecture of a network monitoring system is designed. In this system architecture, this paper designs and implements an efficient network scanning algorithm, generates accurate network topology with the network status information collected by SNMP, and improves its presentation. Because of the special significance of network boundary, the network boundary will be located by identifying the type of network machine with SNMP and network behavioral characteristics technology, and then monitor the security situation in the border. When the boundary access violation occurs, the system has the ability to detect and accurate locate where it happened while providing to monitor terminal access status control based on static rules.Based on the above, this paper implements the Network Topology and Terminal Access Status Monitoring System, summarizes the research work combined with relevant test results and performance evaluation. The whole system is based on. Net platform, and is designed modularly and layered with good portability and scalability.
Keywords/Search Tags:network management, network border security, SNMP, TCP/IP fingerprint, network scanning algorithm
PDF Full Text Request
Related items