首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Web-based network element management provides an administrator with the ability to configure and monitor network devices over the Internet using a Web browser. The most direct way to accomplish this is to embed a Web server [Embedded Web Server (EWS)] into a network device, and use that server to provide a Web-based management user interface constructed with HTML, graphics, Java and other features common to Web browsers. In this paper we present EWS-based management application interface mechanisms for use between embedded management applications and embedded Web servers. We propose a guideline for choosing an efficient interface mechanism, which is based on the characteristics of management information and Web documents. A Web-based management user interface through embedded Web servers has many advantages such as ubiquity, platform independence and user-friendliness. In order to be truly useful, a Web-based management user interface must have a low development cost and a short development time. We provide effective integration mechanisms for each interface. We validate these mechanisms by implementing them in an Internet router.  相似文献   

2.
本文介绍了一个针对性能管理功能域开发的网络监测系统,该系统采用了直观、简单的Web方式,使网管员能更轻松,更直接的了解网络实时的运行情况。文章简要的介绍了系统开发的研究工具和Java Applet的实施结构,并用三个示例说明了系统的实现过程。  相似文献   

3.
QoS Path Monitoring for Multicast Networks   总被引:1,自引:0,他引:1  
New network monitoring tools are necessary for supporting the deployment and the operations of multicast services on the Internet. Because of the peculiar characteristics of multicast routing (e.g., multicast forwarding trees) and the potential of message implosion problems, traditional network management tools are not sufficient for monitoring the quality of multicast delivery such as packet loss, delay, and jitter. Current multicast monitoring tools are either not scalable, limited in their functionality, or difficult to deploy in enterprise networks.In this paper, we present a new monitoring framework (called SMRM, SNMP-based multicast reachability monitoring) for multicast reachability based on SNMP. The SMRM framework is used for actively monitoring the health and the quality of service of multicast networks. SMRM provides a scalable real-time feedback on the packet loss, delay, and jitter of any selected segments of multicast delivery trees. In addition, NOC (network operations center) personnel can easily understand, deploy, and extend the SMRM framework in order to detect and isolate reachability and performance problems in multicast sessions. SMRM combines both distributed monitoring and centralized control, which offers scalability and simplicity. The integration of SMRM into SNMP is motivated by the wide distribution of SNMP agents in networks today, which significantly facilitates the deployment of SMRM is existing networks.  相似文献   

4.
This paper takes a brief look at reasons for monitoring computer networks and some of the methods by which this may be performed. An argument is made against the overuse of intrusive methods of eavesdropping, and recommends that network monitoring tools should be designed in such a way that they provide answers to questions supplied by network operators without providing the facilities to record unnecessary information which may in many cases be confidential. Even when using a network monitoring system for policing use of a network, it is possible to design systems in such a way that they perform a traffic classification process without releasing details of the traffic being monitored.  相似文献   

5.
Public telecommunications networks have many supporting operations systems to provide network management functions and operational support. These systems must be coordinated to provide a highly reliable network service and to make best use of network resources. With increasing automation of network control, these systems must evolve to provide total network support. One organizing principle for this evolution is the definition of control layers at which individual control functions are exercised. We describe a proposal for layered control, with particular emphasis on the role of network traffic management. Layering will be a significant study item for the next extensions to CCITT's Telecommunications Management Network (TMN) recommendations.  相似文献   

6.
《Computer Networks》2002,38(1):25-41
Multimedia wireless networks are seen today as one of the key factors for the success of the global communication infrastructure in the near future. Such networks will have to handle a range of heterogeneous traffic classes with different QoS requirements. Their design, planning and control must be supported by suitable traffic models capable of dealing with a new set of constraints where QoS management and mobility play an important role.This paper proposes a traffic model for a cellular multimedia wireless network characterized by the integration of mobility and traffic management aspects. User mobility is modeled through a Markov renewal process, which allows for non-exponential cell residence times and may restrict the user mobility to existent paths in the system. A Markov-modulated fluid process is used to describe the changes in the bandwidth requirements of each mobile over the duration of its calls, including the periods where the mobile is inactive (without call).Based on the proposed model, the number of mobiles per class of traffic in a cell and the handoff processes are characterized. System performance results, such as new and handoff call blocking probabilities, for network planning are derived. Also, the distribution of the required capacity in a short time interval for network control is obtained. Simulations were carried out to validate the analytical results. The comparisons have shown that the integrated model may be regarded as a good basis to build useful teletraffic engineering tools for multimedia wireless networks.  相似文献   

7.
IEEE 802.11-based wireless mesh networks are being increasingly deployed in enterprize and municipal settings. A lot of work has been done on developing measurement-based schemes for resource provisioning and fault management in these networks. The above goals require an efficient monitoring infrastructure to be deployed, which can provide the maximum amount of information regarding the network status, while utilizing the least possible amount of network resources. However, network monitoring involves overheads, which can adversely impact performance from the perspective of the end user. The impact of monitoring overheads on data traffic has been overlooked in most of the previous works. It remains unclear as to how parameters such as number of monitoring agents, or frequency of reporting monitoring data, among others, impact the performance of a wireless network. In this work, we first evaluate the impact of monitoring overheads on data traffic, and show that even small amounts of overhead can cause a large degradation in the network performance. We then explore several different techniques for reducing monitoring overheads, while maintaining the objective (resource provisioning, fault management, and others) that needs to be achieved. Via extensive simulations and experiments, we validate the efficiency of our proposed approaches in reducing overheads, their impact on the quality of data collected from the network, and the impact they have on the performance of the applications using the collected data. Based on results, we conclude that it is feasible to make the current monitoring techniques more efficient by reducing the communication overheads involved while still achieving the desired application-layer objectives.  相似文献   

8.
Virtual private network (VPN) not only possesses the low cost, inexpensive fees, and excellent support advantages of the Internet, it also has the benefit of the security as the leased line. How to properly manage the VPN is an issue in which the enterprise IT engineers have to take seriously.

This research is based on the new network management technologies such as policy-based network management, mobile agent, etc., to design a VPN monitor and management system architecture that contains high level management with low network traffic load. This system architecture integrates both VPN devices and general network devices, such the feature can integrate the monitor and manage the VPN and Intranet at the same time.

The result of this research provides enterprises with a VPN architecture for monitoring and managing the enterprises, as well as to establish a prototype for the enterprise VPN monitor and management system. Such system architecture can effectively assist the semiconductor companies to monitor and manage their enterprise VPN in order to utilize the Internet resources, and to reduce the possible operation off time. The prototype system could proof the feasibility of the systematic architecture, it can automatically detect and activate the backup mechanism according to the preset management policy, and to achieve the effective and fast solution for the enterprise network problems.  相似文献   


9.
金融信息系统是邮政企业安全性、可靠性要求最高的网络系统,利用网络流量分析技术,按照不同协议、不同应用、不同节点等方式,对邮政金融信息系统网络流量进行研究,能够帮助网络管理人员掌握网络的运行状况。网络流量分析技术有助于提高金融信息网的运行质量、优化信息网络资源,为网络的正常、稳定、可靠运行提供保障。  相似文献   

10.
基于3G网络的交通气象信息自动监测系统   总被引:1,自引:0,他引:1  
针对交通气象信息监测系统中存在的问题,研究并设计实现了一种全自动交通气象信息监测系统。该系统由一组分布于公路沿线的交通气象监测站与交通管理中心服务器组成。站点与管理中心服务器之间通过3G网络实现数据通信。监测站点不仅可以自动监测和向管理中心服务器上传气象数据,而且具有对各种恶劣天气现象进行智能判决、即时上报的功能。交通管理中心接收所有监测站点的气象数据,进行分析判决、图形化显示,实现恶劣天气现象的报警,同时将数据存储于数据库中以备统计查询。监测站点采用低功耗微处理器,并以太阳能电池与蓄电池供电,从而站点的布设不受地理条件限制。实验表明:该系统能准确实时获取气象信息,达到设计要求。  相似文献   

11.
企业网络管理系统构建方法研究   总被引:3,自引:0,他引:3  
为了提高网络管理系统的创建速度,使复杂业务网络管理系统的构建过程更为清晰,提出了监控与业务分离的企业网络管理系统构建方法.分析了企业网络化的现状和特点,研究了基于FCAPS的网络管理模型和管理方法,给出了创建网络配置、故障、安全等功能的关键指标、处理方法,进而构造了企业网络管理系统的功能模型,有效地保证了数据的一致性.结合应用场景验证了系统的功能,并对系统的工作过程进行了分析.  相似文献   

12.
随着技术发展,电脑操作及管理日趋简化,电脑知识日趋普及,同时市场经济快速多变,竞争激烈,企业采用电脑管理进货、库存、销售等诸多环节也已成为趋势及必然。通过对系统需求的分析,提出进货、销售、存储进行统一管理,利用JavaScript技术和PHP等工具,实现了企业人员管理的设计。在设计中,系统使用了现在广泛流行的Web浏览方式将一个通用型的企业人力资源管理系统展现给用户,提供给用户很好的界面和操作平台。  相似文献   

13.
Deployment of quality-of-service (QoS) based value-added services in IP networks necessitates the use of traffic engineering. Traffic engineering allows service providers to use the network resources efficiently, according to the different quality levels associated with the range of services they offer. Traffic engineering relies typically on monitoring data for both offline proactive and dynamic reactive approaches. Monitoring data may be used for network provisioning, dynamic resource allocation, route management, and in-service performance verification for value-added IP services. A monitoring system should scale with the network size, the network speed, and the number of customers subscribed to use value-added IP services. This paper investigates the requirements of scalable monitoring system architectures, proposes principles for designing such systems and validates these principles through the design and implementation of a scalable monitoring system for traffic engineering and QoS delivery in IP Differentiated Services networks. Methods for assessing the relative merits of such monitoring systems are proposed. Experimental assessment results prove the scalability, accuracy, and also demonstrate the benefits of the proposed monitoring system.  相似文献   

14.
网管系统是集中管理多个厂家、多种网元设备和网管设备的平台.网管系统具有告警监控、主动监控、局数据管理、性能报表、资源管理、客服支撑、批量投诉综合告警、报表统计的功能.而网管系统存在各种安全问题,外省曾出现利用网管系统漏洞泄漏客户敏感信息的安全事件,给企业带来声誉和财产的损失.如何对网管系统进行安全管理和安全维护已经迫在...  相似文献   

15.
刘红  白栋  丁炜 《计算机工程》2002,28(7):20-22,91
SNMP是目前主流的嵌入式管理技术,广泛应用在交换机,路由器等产品中,同时基于Web的管理近年来发展很快,它已成为网络管理的趋势之一,因此只有嵌入式设备中同时集成SNMP和Web功能,才能适应市场的发展趋势,文章对Web与SNMP的集成进行了研究,给出了集成的嵌入式管理系统分 模型,并结合目前国际上流行的嵌入式系统开发工具,详细探讨了两种管理方式的综合设计。  相似文献   

16.
Scalable services via egress admission control   总被引:2,自引:0,他引:2  
Allocating resources for multimedia traffic flows with real-time performance requirements is an important challenge for future packet networks. However, in large-scale networks, individually managing each traffic flow on each of its traversed routers has fundamental scalability limitations, in both the control plane's requirements for signaling, state management, and admission control, and the data plane's requirements for per-flow scheduling mechanisms. In this paper, we develop a scalable architecture and algorithm for quality-of-service management termed egress admission control. In our approach, resource management and admission control are performed only at egress routers, without any coordination among backbone nodes or per-flow management. Our key technique is to develop a framework for admission control under a general “black box” model, which allows for cross traffic that cannot be directly measured, and scheduling policies that may be ill-described across many network nodes. By monitoring and controlling egress routers' class-based arrival and service envelopes, we show how network services can be provisioned via scalable control at the network edge. We illustrate the performance of our approach with a set of simulation experiments using highly bursty traffic flows and find that despite our use of distributed admission control, our approach is able to accurately control the system's admissible region under a wide range of conditions  相似文献   

17.
基于三层架构的网络拓扑结构发现   总被引:5,自引:0,他引:5  
介绍了网络管理的体系结构和管理协议,在分析基于Web的网络管理的两个推荐标准(WBEM和JMAPI)和一般模型的基础上,为了满足对基于Web的网络管理系统可伸缩性的要求,提出了三层架构的网络管理服务体系。最后,应用结构进行了网络拓扑发现的原型设计和初步实现。  相似文献   

18.
传统的基于SNMP协议流量监测工具有MRTG等,这些工具提供了网络流量的大小和变化的幅度;为了更好地了解互联网流量的本质,目前网络管理的研究集中在“网络流”压技术上。而Cisco的NetFlow服务提供了基于的“网络流”分析的方法。根据中国科技网在实际网络流量管理中的需求,本文介绍了“网络流”模型,分析了Cisco路由器NetFlow技术原理,根据NetFlow数据在流量和安全中的应用,引入了协议分析仪的技术,提出相关的设计和实现方案。  相似文献   

19.
Traffic monitoring and anomaly detection are essential activities for computer network management, since they provide relevant information about its current performance and contribute to network control. Although there are several studies in this area, diagnosis and resolution of anomalies are still challenging issues. From an expert system point of view, current solutions have not been sufficient to meet the requirements demanded for use in large-scale network environments, and thus a significant portion of budgets on the workforce are spent to network management. Based on this context, the focus of this paper consists of the development of a system able to proactively monitor the network and detect anomalous events, reducing manual intervention and the probability of errors in decision-making, regarding network management. The proposed approach characterizes the normal pattern of the network traffic and detects anomalous behavior, outage events and attacks by deviations from this pattern. For this purpose, an unsupervised learning methodology is used to extract features of traffic through IP flows attributes, collected from a network structure. Aiming to improve its efficiency, a modification of the Ant Colony Optimization metaheuristic is proposed, which through self-organized agents optimizes the analysis of multidimensional flows attributes and allows it to be completed in time to mitigate the impact on large-scale networks. In addition to notify the network manager about the anomalies, the system provides necessary information to identify and take action against them. The resulting detection system was tested with real and simulated data, achieving high detection rates while the false alarm rate remains low.  相似文献   

20.
The problem of choosing buffer allocation strategies occurs in the design of any store-and-forward computer network. A good buffer allocation strategy can reduce message blocking; and hence provide more efficient use of network storage resources. We first summarize five buffer allocation strategies and then provide algorithms for determining the minimum buffer sizes required by these strategies given that each outgoing channel must satisfy certain blocking requirements. After that, we compare them under different network conditions such as heavy or light input traffic rate, uniform or non-uniform server utilization and different blocking requirements. Guidelines on which strategy to use under different conditions are also given.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号