By Topic

Event-driven network topology monitoring function

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $33
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
W. Chao ; Hewlett-Pachrd Corporation, Video Communications Division, P.O. Box 700713, San Jose, California 951 70-0713, USA ; W. Tsun

This paper discusses the design of a topology management application. The application monitors the topology of point-to-point networks in which each network node is required to contain only local trunk information. To build and continuously update the topology map, information must be collected from network nodes. The challenge is to do this in real time without adversely consuming network bandwidth. By defining a clear set of conditions to determine whether polling or event monitoring should be used, this design makes it possible to realize the advantage of monitoring network topology by processing events. With the use of event monitoring, first, consumption of network bandwidth by network management traffic can be significantly reduced compared to a pure polling approach, and second, the topology map represents a continuous topology history.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Systems Journal  (Volume:35 ,  Issue: 1 )