Topology management system and method of network management client side
A topology management and client-side technology, applied in the field of network management, can solve the problems of lack and portability, and the topology management system cannot manage different types of devices, achieving high compatibility and saving development costs.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] This embodiment provides a network management client topology management system 1 applied to a network management system. The network management system is divided into a server side and a client side. Topology management is mainly presented through the client side. In the topology management, the server side is mainly used to start the discovery program. , The discovered data is written into the database, and the client is mainly used to read the discovered results from the server side, and display the read results with logical topology diagrams and physical panel diagrams. In the topology discovery stage, the present invention uses the commonalities between network devices to abstract the commonalities, and manages them according to the hierarchy of regions, subnets and devices, presenting the topology of the entire network, and searching layer by layer until the terminal device is found . In the network topology map, a relatively real device image is used to facilitate...
Embodiment 2
[0088] This embodiment provides a network management client topology management method, which is applied to a network management system composed of a server and a client. The network topology structure in the network management system is managed according to the hierarchy of regions, subnets, and devices, such as Figure 7 As shown, the network management client topology management method includes:
[0089] S1: Receive commands for adding area, adding subnet, adding master device commands, and sending master device identity authentication commands, and receiving commands from the server based on adding zone commands, adding subnet commands, adding master device commands, and sending master device identity authentication The regional identity authentication, subnet identity authentication, master device identity authentication, and all slave device identity authentication under the master device returned by the command, the regional identity authentication, subnet identity authentic...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com