Network topology construction method and device

A network topology and network technology, applied in the field of network security, can solve the problems of high consumption, inability to guarantee security, inability to obtain configuration information such as device interfaces and routes, and achieve the effect of shielding differences and low cost.

Active Publication Date: 2018-11-23
ZTE CORP
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Security issues. SNMP has no encryption protocol, and security cannot be guaranteed. ICMP requires network devices to enable corresponding ICMP services, which will introduce the risk of being attacked by DDOS (Distributed Denial of Service, Distributed Denial of Service);
[0006] 2. Consumption problem. SNMP uses polling to obtain statistical information, which consumes a lot, especially in a complex network environment;
[0007] 3. Compatibility issues. SNMP needs to be compatible with multi-vendor and multi-version MIB (Management Information Base, Management Information Base) library content, and when there is an unmanaged device, it cannot generate a complete topology map. In addition, ICMP cannot obtain the device interface , routing and other configuration information, it is impossible to build a complete network topology map for subsequent application development based on network topology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network topology construction method and device
  • Network topology construction method and device
  • Network topology construction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0109] According to different triggering methods, the collection of configuration information of specified devices in the network can be divided into active trigger configuration collection, scheduled task trigger configuration collection, and log server trigger network topology system configuration collection.

[0110] 1. By selecting an online connectable device, manually trigger online collection, click the configuration collection button to collect the latest information; or manually trigger offline collection, upload a configuration file to update the configuration information of an offline non-connectable device, and actively collect and update configuration information;

[0111] 2. Set the timing task configuration module in the system, such as Figure 8 As shown, the configuration information of the security device can be collected by configuring the timing task cycle to trigger the acquisition sub-module, for example, the configuration information can be collected duri...

Embodiment 2

[0114] In this embodiment, analyze the interface information of the device, filter invalid interface information, and determine which interfaces are activated and available, such as Figure 9 As shown, the specific steps are as follows:

[0115] Step 801, traversing the latest configuration of the external security device to collect normalized interface information;

[0116] Step 802, extracting the interface configuration and interface hardware status to obtain a list of all interface information, and judging which interfaces are not operating normally according to the link status of the interface hardware status;

[0117] Step 803, extracting routing information, traversing all routing information;

[0118] Step 804, according to the interface fields in the direct route and the destination route, judge whether the interface is used, if the interface is not used, then turn to step 805, when the interface is not in normal operation and there is an interface through which the ...

Embodiment 3

[0124] This embodiment describes that when the destination of a certain direct route is a public IP address (segment), it is determined that the network connected to the corresponding interface is an external network (Internet). For example: the firewall information of device 1620 has been configured, and the topology map is initialized, and the device node is generated:

[0125] ,

[0126] After collecting the configuration information, obtain the interface information (including the specific information of the interface eth0 / 1.0), routing information, and the direct connection routing information is as follows:

[0127] Type Network Address Path Length Path Cost Gateway Interface

[0128] Direct connection 158.123.18.56 0 0 158.123.18.1eth0 / 1.0

[0129] The network address of this directly connected route is a public IP address (segment), and in the embodiment of the present invention, the public IP address (segment) is regarded as an external network (Internet), which w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a network topology construction method comprising: collecting configuring information of a specified device in a network, and normalizing the configuring information, the configuring information at least including interface information and routing information; analyzing the interface information, and analyzing the routing information; and constructing a network topology map according to the interface information and the routing information. The present invention discloses a network topology construction device. The technical scheme can shield differences betweenmanufacturers' versions to reduce resource consumption.

Description

technical field [0001] The embodiments of the present invention relate to the field of network security, in particular to a method and device for constructing a network topology. Background technique [0002] To maintain a computer network, network administrators need to have updated information about the devices on the network and how the devices are interconnected. In addition, as the network grows, the network administrator may need to add new devices to the network or reconfigure devices in the network. Network administrators need to be clear about the connection network topology, that is, the relationship between network resources and physical / logical levels. Network topology can be displayed through diagrams from different perspectives and levels. [0003] Network topology maps can also be used as the basis for automated network management, such as diagnosing connectivity problems, designing network connectivity requests, implementing network connectivity requests, ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/02H04L41/12H04L63/18
Inventor 李鹏翔严为芮通
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products