Font Size: a A A

The Security Domain Verification System Based On Intelligent Data Acquisition

Posted on:2015-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2298330434954404Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Abstract:In the modern society, management of network has been developed to intelligent and visualization, and various applications of network management have put forward higher requirements. Network topology auto-discovery is important reference for network management to achieve fast fault detection and accurate location. Due to network topology is becoming more complex, and artificial job become much harder, so it is intense requirement to discover network topology. How intelligently, quickly and completely acquire equipment’s data of network is the foundation of topology auto-discovery. The thesis have studied and analyzed the intelligent method how to acquire network equipment’s data in the complex product environment, and researched and analyzed the network topology discovery method.This topic comes from enterprise project, which is running in a domestic telecom operator. Firstly, this paper introduces the research background and data acquisition method of network topology discovery at home and abroad research status. It analyzes the intelligent method access to equipment’s data, and introduces the network topology discovery principle used in this system. Finally it summarizes the special problems and solutions in the production environment.The thesis presents the security verification system overall design, and the system is divided into six modules:initialization module, data acquisition module, topology discovery engine module, security object verification module, the topology display module, the result display module of verification tasks. The paper detailedly introduces the realization of the data acquisition module and the topology discovery engine module.Finally, the test result of the security domain verification system in the local area network is turned out. The result show that this system can quickly and completely verify the test network, construct network topology, and the server resources consumption is meet cost requirements. Thus it achieves the early user requirements and design effect of the project.
Keywords/Search Tags:Intelligent acquisition, SNMP, Topology discovery, Security domain, verification
PDF Full Text Request
Related items