Network Layer Network Topology Discovery Algorithm Research

Article Preview

Abstract:

Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms of the network layer topology discovery based on the SNMP and ICMP protocol, based on this, this paper puts forward a improved algorithm of the comprehensive two algorithm, and makes the discovery process that has a simple, efficient, and has a strong generalization, and solved in the discovery process met the subnet judge, multiple access routers identification.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1327-1332

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jia Lli, Bingxin Shi. Topological network configuration found for research [J], Computer Engineering and Applications, 1998, 34 (12) : 23-24.

Google Scholar

[2] Hao Nie, Qin Xia. Network Layer Topology Discovery Algorithm [J], Heilongjiang Science and Technology Information . 2010, 22: 88.

Google Scholar

[3] Lijuan He, Donghong Wang. Based on SNMP protocol network layer topology discovery algorithm [J]. Journal of Shijiazhuang Vocational Technology Institute. 2009, 21 (6) : 58-60.

Google Scholar

[4] Jiahai Yang, Xiankun Ren, Peiyu Wang. Network management principles and implementation techniques [M]. 1st edition, Beijing: Tsinghua University Press, (2005).

Google Scholar

[5] Siamwalla R, Sharma R, Keshav S. Discovering Internet topol-ogy[C]. In: Proceedings of IEEE INFOCOM, (1999).

Google Scholar

[6] Ying Ma. Computer network automatic topology discovery research [D]. Chongqing University, (2007).

Google Scholar

[7] Weiming Zhang, Junyong Luo , etc. The routers in the network topology discovery research and implementation of alias recognition [J]. Computer Engineering and Applications, 2004, (13) : 143-146.

Google Scholar