On account of the expanding network size, increasingly complex network structure andvaried, complex status of the development of network equipment, current means of networkmonitoring cannot meet security management of network. To monitor network topology nodeby Real Time Kinematic can reflect the network changes timely and comprehensively. It hasimportant practical significance for network system to run safely and stably.In order for rational network supervision, this paper puts forward a distributed networkregulation model for large-scale complex network. The collection, fusion and store interactionof network topology data are analyzed thoroughly to put forward the data mode. On this basis,a distributed network topology node data monitoring system is projected as well asdevelopment and testing on its important links.Analysis of network monitoring and data management technology such as SNMP,network topology model, topology data fusion and data storage technology is the foundationfor studying. This paper focuses on the key technology of distributed network topology nodedata management base on the foundation. Considering current network characteristics andmanagement requirements, a distributed network topology monitoring model is designedbased on above technologies. Under this framework model, a network topology monitoringmulti-agent model and a monitoring network for distributed multistage, multi-domainnetwork is designed and researched. Network node information and TRAP alarm message bymultithreaded scanning. Topology monitoring from all levels complete topology datauniquely identified and integration of space and time algorithm. Propose improvements to thealgorithm less. Key work such as design of data encapsulation format based on XML,network topology data interaction and dynamic topology data refurbish have finished.Combining the objective requirements, deployment scheme of systems engineering isprovided finally.Based on the above research, a distributed network topology node data monitoringsystem is developed in this paper. In addition, the system has been deployed and test in actualnetwork environment with specific management tasks. Test results indicate that the functionand performance of this system meet the actual network security management on the whole. |