Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1699392.1699399guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

IP network topology discovery using SNMP

Published: 21 January 2009 Publication History

Abstract

Network topology information helps one analyze faults in IP networks and their locations. Rectifying such faults is a key role of an enterprise IP network management system. Thus, the automatic discovery of enterprise network topology has been the subject of rigorous study for many years. This paper proposes a Simple Network Management Protocol (SNMP)-based solution that handles various types of network devices, including L2/L3/L4/L7 switches, routers, printers, and hosts; and discovers connectivity among these devices. Key contribution of this paper is a simple algorithm to discover end host connectivity with the switches and routers. We show the network topology in combination of graph and tree layouts.

References

[1]
R. Siamwalla, R. Sharma, and S. Keshav, "Discovering internet topology," Cornell Univ., Ithaca, NY, Techical Report, May 1999.
[2]
Y. Breitbart, M. Garofalakis, B. Jai, C. Martin, R. Rastogi, A. Silberschatz, "Topology Discovery in Heterogeneous IP Networks: The NetInventory System," IEEE/ACM Transactions on Networking, vol. 12, no. 3, June 2004, pp. 401-414.
[3]
B. Lowekamp, D. R. O'Hallaron, T. R. Gross, "Topology discovery for large Ethernet networks," ACM SIGCOMM, August 2001, San Diego, CA, USA, pp. 237-248.
[4]
F. Nazir, T.H. Tarar, F. Javed, H. Suguri, H.F. Ahmad, A. Ali, "Constella: A Complete IP Network Topology Discovery Solution," APNOMS 2007, October 2007, Sapporo, Japan, pp. 425-436.
[5]
Cisco, How to Get Dynamic CAM Entries (CAM Table) for Catalyst Switches Using SNMP, http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note 09186a0080094a9b.shtml.
[6]
Cisco, SNMP Community String Indexing, http://www.cisco.com/warp/public/477/SNMP/camsnmp40367.html.
[7]
CISCO-VTP-MIB, http://tools.cisco.com/Support/SNMP/do/BrowseMIB.do?local=en&mi bName=CISCO-VTP-MIB.
[8]
JGraphT Implementation and Source Code, http://jgrapht.sourceforge.net/.
[9]
Bierman, K. Jones, "Physical Topology MIB," RFC 2922, IETF, September 2000.
[10]
N. Dufield, F. L. Presti, V. Paxson, D. Towsley, "Network Loss Tomography Using Striped Unicast Probes," IEEE/ACM Transactions on Networking, August 2006, vol. 14, no. 4, 697-710.
[11]
AdventNet, AdventNet SNMP API, http://snmp.adventnet.com/.
[12]
K. McCloghrie, M. Rose, "Management Information Base for Network Management of TCP/IP-based Internets, MIB-II," RFC 1213, IETF, March 1991.
[13]
E. Decker, P. Langille, A. Rijsinghani, K. McCloghrie, "Bridge MIB," RFC 1493, July 1993.
[14]
E. Bell, A. Smith, P. Langille, A. Rijsinghani, K. McCloghrie, "Q-BRIDGE-MIB," RFC 2674, IETF, August 1999.
[15]
J. Case, M. Fedor, M. Schoffstall, J. Davin, "A Simple Network Management Protocol (SNMP)," RFC 1157, IETF, May 1990.
[16]
D. Passmore, J. Freeman, "The Virtual LAN Technology Report," http://www.3com.com/nsc/200374.html, March 1997.
[17]
IEEE: 802.1Q, IEEE Standard for Local and Metropolitan Area Networks: Virtual Bridge Local Area Networks 1998.
[18]
B. Donnet, T. Friedman, "Internet Topology Discovery: A Survey," IEEE Communications Surveys & Tutorials, Vol. 9, No.4, 4th Quarter 2007, 56-69.
[19]
Extreme Networks: BlackDiamond Core Switching Products, http://www.extremenetworks.com/products/switching-core-family.aspx

Cited By

View all
  • (2017)The Devil's in The DetailsProceedings of the 33rd Annual Computer Security Applications Conference10.1145/3134600.3134608(577-589)Online publication date: 4-Dec-2017
  1. IP network topology discovery using SNMP

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      ICOIN'09: Proceedings of the 23rd international conference on Information Networking
      January 2009
      588 pages
      ISBN:9781424445264

      Publisher

      IEEE Press

      Publication History

      Published: 21 January 2009

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2017)The Devil's in The DetailsProceedings of the 33rd Annual Computer Security Applications Conference10.1145/3134600.3134608(577-589)Online publication date: 4-Dec-2017

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media