• No results found

Discovery Of Network Nodes And Discrepancies

N/A
N/A
Protected

Academic year: 2020

Share "Discovery Of Network Nodes And Discrepancies"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Discovery of Network Nodes and

Discrepancies

Narendra ShewaleP

1

P

,Hadke SharadP

2

P

,Mayur KharoteP

3

Department of Computer Engineering, University of Pune Imperial College Of Engineering and Research

Pune, India

Abstract - Designing of an efficient discovery module is a key challenge in a spread out network. It is necessary to keep records of each and every device in network for the company by which it can keep the details about the devices recorded in the network as per the status of presence or failure of that device. Discovery of Network Elements (NEs) in the network is achieved through two modes of discovery that are through IP Range Specification i.e. Range Based Discovery, Device Based Discovery and Individual Discovery. In Range Based Discovery we have to give the range of IP addresses which are already present in the database, this will discover existing network elements and maintained their information. In Device Based Discovery manufacturer of network element is specified and IP addresses are fetched from the master database depending on the manufacturer and a SNMP request is send to those network elements. In Individual Discovery a single IP address is specified and the discovery of that network element is carried out. Reconciliation module contains two types of discrepancies which are depending upon the types of Discovery carried out as Range Based and Device Based. Discrepancies are nothing but the differences found by comparing the master database and discovered database.

1. INTRODUCTION

A0T0Tnetwork or computer networkis a0T communication network 0Tthat allows0T0Tcomputers0T0Tto exchange data. In computer networks, networked computing devices pass data to each other along data connections. The connections between nodes are established using either0T0Tcable media0T0Tor0T0Twireless media. Network devices that originate, route and terminate the data are called0T0Tnetwork node.

Include0T0Thosts0T0Tsuch as0T0Tservers as well as0T0Tnetworking devices. two devices are said to be networked when a device is able to exchange information with another device.

With the development of networking, keeping record of devices becomes more and more important in network of any organization. Network consists of different devices like switches, hubs, routers etc. This is reason that to keep record of all these devices. Network is the arrangement of links and devices in a network and the interconnections among the devices. Network devices discovery can also be categorized the local area network (LAN) or an organizational-level network discovery or any network. An inexperienced network administrator joining an organization faces many difficulties due to the unavailability of a discovery tool, which otherwise would show the device classification and layout of the networks. Even for the experienced administrator, keeping track of devices and their connectivity details, without having a proper method of visually representing them becomes a difficult task. A network elementis usually defined as a manageable logical entity uniting one or more physical devices. This allows distributed devices to be managed in a unified way using one management system.

It is necessary to keep records of each and every device in network for the company by which it can keep the details about the devices recorded in the network as per the status of presence or failure of that device. It is important to keep track of all the devices in the network because functioning of every device & to check whether they are alive is very important purpose. In case of existing system it is possible to run discovery but

(2)

Reconciliation was not their & it was given to third party. When new device get added to network then they manual entry it into their database & then next time when discovery will run that device will be identified. Existing system does not allow end user to reconcile the discovered information.

2. Literature Survey:

To discover devices from network many applications are available. But they do not provide functionality of discovery of devices in particular part of network, administrator has to keep record of devices manually and also reconciliation is not there. Existing system does not allow end user to reconcile the discovered information.

PROPOSED SYSTEM

In this system we are providing Range based discovery, Individual discovery Device based discovery of network elements from which Device Based Discovery is absent in existing system. This will be advantageous if any new device has been added will get discovered at the time of Range Based Discovery and gets added in the main inventory. This will save lot of time will improve the efficiency of the system by reducing the efforts of manual entry. Our system also has options by which the user can perform the selection for updating the database either through automatic update functions or it can be done by user manually.

Our system also provides the Individual

Device Discovery by which the user can

search any one specific standalone device by

its IP address.

Advantages:

1. Complete Approach for Discovery

2. Reconciliation module

3. Automatic identification of NEs

1) Static Approach for Discovery:

Entries of the network elements are performed manually by the network administrator and the confirmation is given to the third person for the entries. New device get added to network then they manual entry it into their data & then next time when discovery will run that device will be identified. P

[1] [5]

2) Difficult to identify end of Discovery

No way to find out the end of discovery as the procedure getting perform is reverse i.e. the IP addresses gets fetched from the main database and afterwards the discovery is started so here there is no means to know if the discovery gets completed or not. P

[2]

3) Database handling performed by third party

All the operations of the databases are handling through thirdparty organization i.e. all the updations, deletions and insertion are performed through them when the network.

3. Comments:By looking at above survey we

can conclude that

1. Entries of the network elements are performed manually by the network administrator and the confirmation is given to the third person for the entries.

2. No way to find out the end of discovery as the procedure getting perform is reverse so there is no means to know if the discovery gets completed or not.

3. All the operations of the databases

are handling through third party.

Outlines of proposed work System

Architecture:-Propose system providing different types of discovery of network elements. This will be advantageous if any new device has been added will get discovered at the time of discovery and gets added in the main inventory. This will save lot of time & will improve the efficiency of the system by

(3)

reducing the efforts of manual entry. Our system also has options by which the user can perform the selection for updating the database either through automatic update functions or it can be done by user manually after the discovery of network elements.

Module 1: Discovery Module Proposed

system providing Range based discovery, Individual discovery & Device based discovery of network elements from which Device Based Discovery is absent in existing system. This will save lot of time & will improve the efficiency of the system by reducing the efforts of manual entry. Our system also has options by which the system also provides the Individual Device Discovery by which the user can search any one specific standalone device by its IP address.Discover through range of IPs or by using the device manufacturer, so here we come to know when the discovery is completed as the system which is proposed, informs the end of discovery.

A) Range based discovery:-

This will be advantageous if any new device has been added will get discovered at the time of Range Based Discovery and gets added in the main inventory. User can perform the selection for updating the database either through automatic update functions or it can be done by user manually after the discovery of network element

Fig. Range based Discovery

B) Individual discovery:-

Individual Device Discovery by which the user can search any one specific standalone device by its IP address.

Fig. IP based discovery

C) Device based discovery:-

In Device Based Discovery specific manufacturer of network element is specified and the IP addresses depending on the manufacturer are fetched from the master database and discovered.

IP Range/Type

SNMP

Network DISCOVERY

MODULE

RECONCILIATION DICREPANCIES

MASTER DATABASE

(4)

Module 2:- Reconciliation module Reconciliation module contents two types of discrepancies which are depending upon the types of Discovery carried out as Range Based and Device Based. Discrepancies are differences found out by comparing the master database and discovered database.

IX. SCREEN SHOT

Admin Login:

Unsussesful login

RESULT:

Discovery of Device

Discover Devoice

(5)

X. ACKNOWLEGEMENT

We would sincerely like to thank

Mrs.SonaliTikde, Prof.Nilesh Sable, for her guidelines and support.

XI. REFERENCES

[1] http://www.dpstele.com/layers/l2 snmp_tutorials.php

[2]32TU http://www.manageengine.com/network-monitoring/what-is-snmp.htmlU32T

[3]32TUhttp://publib.boulder.ibm.com/infocenter/tivihel p/v8r1/index.jsp?topic=/com.ibm.netcool_configur ationmgr.doc_U32T

6.3.0/ncm/wip/disco/concept/ncm_disco_discoveri ngncm.html

[4]32TUhttp://pic.dhe.ibm.com/infocenter/tivihelp/v45r1 /index.jsp?topic=%2Fcom.ibm.tivoli.tpm.scenario. doc%2FdiscoU32T

very%2Frdsc_advdisc2.html

[5]32TU http://computernetworkingnotes.com/comptia-n- plus-study-guide/network-devices-hub-switch-router.htmlU32T

[6]32TUhttp://apple.stackexchange.com/questions/19783

/how-do-i-know-the-ip-addresses-of-other-computers-in-my-U32T Network

[7]http://verticalhorizons.in/snmp-message-format-snmp-pdu-format/

Figure

Fig. Range based Discovery

References

Related documents

This composition information plus the API schemas are used to render a graph where paths represent API compositions and are used to easily identify how to compose the APIs..

ProCurve’s comprehensive security vision and strategy – ProCurve ProActive Defense – delivers a trusted network infrastructure that is immune to threats, controllable for

BEFORE SEEKING PRIOR AUTHORIZATION, PLEASE VERIFY MEMBER BENEFITS AS ELIGIBLE SERVICES MAY VARY WITHIN THE DIFFERENT PLANS TYPES.. TO CHECK MEMBER ELIGIBILITY PLEASE CALL OUR

Table 1: Dublin Core terms and their assigned Wikidata counterparts used in automatic import of Apparatus bibliographic resources into Wikidata: left column lists the Dublin

Sloan Foundation, the Internet Archive convened a two-day summit in San Francisco, June 2-3, 2011 to foster greater public access to metadata in the world’s libraries, archives,

For in- depth meaning the researcher used the descriptive research design in this study to accurately portray the experiences of professional nurses in caring for critically

The peak responses produced some of the highest nitrate concentrations detected in the hydrological year (13.5 and 11.6 mg N L −1 and 0.8 and 1 % exceedance, respectively) showing