The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A network topology algorithm based on SNMP was put forward and implemented. This algorithm could confirm the connection between ports and improve the efficiency of discovery through combining the topology discovery of the network layer and the link layer. It could solve the problem of subnet information redundancy and incomplete information of address forwarding table during the discovery. The experimental...
The advantages of avionics switched network in network scale and flexibility greatly improve the communication performance of avionics network, promote the development of IMA/DIMA technology and also increase network scale and complexity. Meanwhile, requirements for the management of the avionics system are also on the rise. In this paper, the characteristics of SNMP protocol and airborne switched...
Installed sound applications typically involve a large number of audio processors, amplifiers and speaker systems spread across the venue. They could be spatially distributed at the venue across different rack rooms and floors. These systems are commissioned and configured by sound engineers using software application(s). This is essentially a one-time activity, following which, the audio systems...
The Hard Real-Time Ethernet Switch (HaRTES) allows using the same network to handle multiple traffic flows, without compromising the performance of real-time applications. Furthermore, it also provides flexible and on-line scheduling techniques with admission control capabilities, thus real-time communications flows can be added, removed and updated online with strict temporal isolation. However,...
Manual reboot is required in case of switch halt, and in-band management which through Simple Network Management Protocol is disabled. In case of switch failure, the system initiates a self-debugging procedure out-of-band via the console. When the breakdown is beyond the capacity of the self-debugging procedure, the system informs the network center via GPRS. This system has undergone testing in the...
ARP spoofing is a deception within the LAN caused by ARP protocol flaws, which could cause the whole network paralyzed and even worse users' important information stolen through spoofing. The features of ARP is introduced in detail, the update mechanism of ARP mapping table is summarized by ARP spoofing simulation experiment, and the process of ARP spoofing is analyzed. An effective solution which...
Video surveillance systems are important part of today's organizations. When there is no live observation of the cameras image, it is important to have some alarm mechanisms for detection of physical impact against the cameras. Most simple video systems can detect motion and/or loss of video signal, but are vulnerable to covering or spraying the camera's lenses. Present study proposes a method for...
Network monitoring is an essential task of network management. Information obtained by monitoring devices gives a real picture of the network in production including transmitted data volumes, top hosts, a list of frequently used applications etc. Deep analysis of data collected by monitoring can reveal network attacks or detect misuse of network services. In addition, Data Retention Act requires each...
By using SNMP to collect network layer and data link layer information, network topologic can be discovered. This article presents how to get topologic from network step by step. An algorithm is also given for removing duplicate connections on map if VLAN exists.
The physical topology discovery is one of the difficulties in network measurements. This paper proposes a novel algorithm for discovering the physical topology of networks based on Spanning Tree Protocol (STP). Our algorithm improves and elevates the accuracy of connection judgments and the effectiveness and efficiency of discoveries greatly; it can also do well in finding backup links, hubs and other...
More and more network applications have appeared in recent years. Government, university, industry and individual Internet users and network services need more bandwidth and various network applications. Many new network protocols are proposed so that it is now becoming harder to manage the network. In the conditional network, every network protocol uses the fixed port, the so-called well-known port...
Based on the previous work carried out on experimental validation of theory on fundamental bounds in communication network by J Y Le Boudec and Patrick Thiran in the context of networked control systems, steps are taken to define an algorithm enabling to automatically associate a time constraint requirement with a priority level and a weighted value. More advanced optimization algorithms are also...
Automatic network topology discovery is important for network management and network analysis in ITSM system. Issues like network environment configuration, performance testing and fault detecting all require accurate information of the network topology. According to the requirement of the ITSM system, in this paper we propose an efficient algorithm that is based on SNMP for discovering Layer 3 and...
According to the characteristics, attack mechanisms and the fault phenomenon of ARP deception, this paper makes an in-depth analysis on it from the viewpoint of the set, the automatic prevention and control algorithms and model of ARP deception are given. The implementation according to the model is carried out on Linux operating system, the actual operating results show that the model can effectively...
In coming ubiquitous network society, a user who has no knowledge about network technology might have to manage his/her network including information appliances and sensor networks. Current network is, however, too difficult to manage because protocols to access ubiquitous network devices are not same and it is not easy to identify the cause of problems if a network failure occurs. Toward uniting...
In the network center, there are various devices and servers to form a part of infrastructure for education. Itpsilas a challenge for network operator center. This platform provides a integrated management and monitor approach for network devices and circumjacent services. It uses the Browser/Server model, we can use any browser to manage and montior the network devices, such as router, switch, and...
The significance of network topology discovery cannot be denied, especially for tasks like network management, network analysis or network visualization. In this paper we describe a novel topology discovery algorithm which is intelligent, efficient and self-learning. Sending ICMP requests to inactive hosts can waste considerable amount of time in the discovery process. We propose an algorithm that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.