DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha L.Temgire 3, Prof.Radha Shirbhate 4 Computer Department JSPM s BSIOTR, Pune, Maharashtra, India 4321hema@gmail.com 1, divyanivade12@gmail.com 2, Meghatemgire1@gmail.com 3, radha.shirbhate@gmail.com 4 Abstract: Designing of a proficient discovery module is a key challenge in a spread out network. It is necessary to keep records of every device in network for the company by which it can keep the details about the devices recorded in the network as per the condition of presence or failure of that device. Discovery of Network Elements (NEs) in the network is achieved through two modes of detection that are through IP range specification i.e. range based discovery, device based discovery and individual discovery. In range based discovery they have to give the range of IP addresses which are already present in the database, this will find out existing network elements and maintained their information. Network consists of dissimilar devices like switches, hubs, routers etc. This is reason that to keep record of all these devices. Network is the collection of links and devices in a network and the interconnections among the devices. Network devices finding can also be portioned the local area network (LAN) or an organizational-level network discovery or any network. A new network administrator joining an organization faces many difficulties due to the unavailability of a discovery tool, which otherwise would show the device categorization and layout of the networks. Even for the experienced administrator, keeping trail of devices and their connectivity details, without having a proper method of visually representing them becomes a difficult task. A network element is usually defined as a manageable logical entity combining one or more physical devices. Keywords: SNMP, NMS, Network Elements, Node Discovery, Reconciliation. I. INTRODUCTION Discovery of Network Elements (NEs) in the network is attained through two modes of discovery that are through IP Range Requirement i.e. Range Based Discovery. In Range Based Discovery we have to give the range of IP addresses which are already present in the database, this will determine existing network elements and maintained their information. If we identify whole IP range of company network then it will examination all the devices present in the network as well as subnets in the networks. Discovery of NEs & Reconciliation using SNMP is used to scan the devices connected in the network. To keep track of all the devices in the network because working of every device & to check whether they are alive is very essential purpose. In case of existing system it is possible to run discovery but Reconciliation was not their & it was given to third person. This software gives facility to discover the nodes [2] as well as after completing detection we can reconcile it. This will become very helpful for company & easier because no need of third party. Official person can perform the Discovery &Reconciliation very easily. The Simple Network Management Protocol was developed to assist in network resource management. Technology continually allows consumers and businesses to build bigger and better networks at more reasonable prices. With the increase in the size and number of computer networks, the need for efficient organization of resources has emerged as a pressing issue for network administrators. Administrators are continuously keeping their networks in order to maximize efficiency. The Simple Network Management Protocol was developed to assist in network resource management. 1.1 RELATED CONCEPTS: Simple Network Management Protocol (SNMP) - is an Internet-standard protocol for managing devices on IP networks. Devices that usually provision SNMP include routers, switches, servers, workstations, printers, modem racks, and more. It is used mostly in network controlling systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP is a part of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF). It consists of a set of principles for network management, including an application layer protocol, a database schema, and a set of data objects. SNMP discoveries management data in the form of variables on the managed systems, which describe the system configuration. International Journal of Engineering Science and Computing, April 2016 3722 http://ijesc.org/
V. FUNCTIONALITY The SNMP has three basic components the Structure of Management Information (SMI), the Management Information. Base (MIB), and the SNMP agents, 1) The Structure of Management Information (SMI): The SMI defines the data types that are allowed in the MIB. It sets aside an exclusive naming structure for each managed object. 2) Management Information Base (MIB): The MIB is a collection of network information. This fact is stored in a database of managed objects that can be accessed using network handling protocols such as SNMP. 3) SNMP Agents: All network devices that are to be SNMP managed need to be fitted with an agent that performs all the MIB objects that are relevant. The agent provides the information contained in the MIB to management applications when asked. Fig 1.1 SNMP Architecture II. EXISTING SYSTEM In case of existing system the organization is using a tool called IBM Tivoli Net cool Configuration Manager which is used in the combination with the Bulk Loader utility which discovers the network elements in bulky manner and the results create are not that efficient as per the organization standards. When new device get added to network then they manual record it into their data & then next time when discovery will run that device will be identified. Existing system does not allow end user to reconcile the learned information. III. PROBLEM STATEMENT Discovery of NEs using SNMP & Reconciliation is based on concept of discovering nodes in network which can include switches, routers, hubs etc. Aim to acquire information about all those devices in network & keep records of each & every element. This is useful for company to identify if any fault occurs in the process afterwards. IV. PROPOSED SYSTEM In this system we are provided that Range based discovery, Individual discovery & Device based discovery of network elements from which Device Based Discovery is inattentive in existing system. This will be advantageous if any new device has been added will get exposed at the time of Range Based Discovery and gets added in the main inventory. This will save lot of time & will progress the efficiency of the system by reducing the efforts of manual entry. Our system also has choices by which the user can perform the selection for updating the database either through automatic update purposes or it can be done by user manually after the discovery of network elements. Our system also provides the Individual Device Discovery by which the user can examine any one particular standalone device by its IP address. VI. SYSYEM REQUIREMENT A) Hardware Interfaces: For successful working of the discovery module the following elements are the important requirements: i. Routers ii. Firewall iii. Hubs iv. Switches v. Unstructured Network B) Software Interfaces: Operating System :Windows, UNIX Environment Language : JDK 6 Data Bases : MySQL Front End : JSP, CSS, HTML Browser : Internet Explorer 5 & above Java (JDK 6): Java is a general resolution programming language with a number of features that make the language well suited for use on the World Wide Web. Minor Java applications are called Java applets and can be downloaded from a Web server and track on your computer by a Java-compatible Web browser, such as Netscape Navigator or Microsoft Internet Explorer. JSP : Java Server Pages (JSP) technology allows Web developers and designers to rapidly develop and easily maintain,information-rich, dynamic Web pages that influence existing business systems. As part of the Java technology family, JSP technology enables prompt development of Web-based applications that are platform independent. JSP technology separates the user interface from content generation, enabling designers to variation the overall page layout without altering the underlying dynamic content. MySql Server 5.1 : MySQL is a popular choice of database for use in web applications. Many programming languages with language particular APIs include libraries for accessing MySQL databases. MySQL is primarily an RDBMS and ships with no International Journal of Engineering Science and Computing, April 2016 3723 http://ijesc.org/
GUI tools to administer MySQL databases or achieve data contained within the databases. Users may use the included command line tools,[citation needed] or download MySQL front-ends from various parties that have developed desktop software and web applications to manage MySQL databases, construct database structures, and work with data records. C) Communication Interface : i. Keyboard ii. Mouse iii. Monitor iv. NIC those network elements. In Individual Discovery a single IP address is specified by the user and the discovery of that network component is carried out for further processing. Reconciliation module contents two types of discrepancies which are depending upon the categories of Discovery carried out as Range Based and Device Based. Discrepancies are nothing but the differences establish by comparing the master database and discovered database. VII. SYSTEM ARCHITECTURE It consist of two modules first is Discovery, it includes sub-modules as (Range Based Discovery, Device Based Discovery and Individual Discovery) and second one is Reconciliation. Fig:7.3. Workflow Diagram Fig:7.1. System Architecture In Range Based Discovery we identify the range of IP addresses and the IP addresses included in the range are scanned and SNMP request is send on which the network elements are present and the response is collected in discovered database which is used to discover further discrepancies. Fig:7.2. System Process In Device Based Discovery we specify the manufacturer of network element and the IP addresses are got from the master database depending on the manufacturer and a SNMP request is send to I) Discovery : Discovery contains basic three types as Range Based, Device Based and Individual Device Discovery. searchnode(ip): It is used to search information of given IP Address. getdeviceinfo(ip,oid): It sends and receives SNMP request and response of given IPAddress for provided OID. a) Range Based Discovery: In Range Based Discovery we identify the range of IP addresses and the IP addresses included in the range are scanned and SNMP request is send on which the network elements are present and the reply is collected in discovered database which is used to find further discrepancies. createnodelist(startip,endip): It accepts IP Range from startip to endip and retrieves information for the same. b) Device Based Discovery: In Device Based Discovery we specify the manufacturer of network element and the IP addresses are made from the master database depending on the manufacturer and a SNMP request is send to those network elements. getips(devicename): It collects the set of IP Address for given device name from master details. createnodelist(setofipaddress): It provides set of IP Address of particular device and retrieves information for the same. c) Individual Device Discovery: In Individual Discovery a single IP address is specified by the user and the finding of that network element is carried out for further processing. International Journal of Engineering Science and Computing, April 2016 3724 http://ijesc.org/
searchnode(singleip): It provides single IP Address and retrieves information for that IP Address. VIII. ALGORITHM 1)Discovery: Step 1: Specify IP Address, a) In case of Range Based Discovery give range of IP Addresses. b) In case of Device Based Discovery give name of Device. c) In case of Individual Device Discovery accept single IP Address. Step 2: Check whether device is present at that IP Address. Step 3: If present send SNMP request process next IP Address. Step 4: Collect responses and check device information. Step 5: If information present store it in Discovery Result discard Step 6: Stop. 2)Reconciliation: Reconciliation module contents two types of discrepancies which are depending upon the types of Discovery carried out as Range Based and Device Based. Discrepancies are nothing but the differences found out by comparing the master database and discovered database. These discrepancies are confirmed by admin and then updated into master table. Algorithm : Step 1: a) Store discovery result into list1. b) Store master details into list2. Step 2:if list1.ipaddress = list2.ipaddress if list1=list2 record already exists list3 = list1 and list3.status = Updated if list1.ipaddress < list2.ipaddress list3 = list1 and list3.status = Added list3 = list2 and list3.status = Deleted Step 3: Display discrepancies (list3). Step 4: Select records to reconcile. Step 5: Reconcile selective records. Step 6: Stop. 8.1RESULT AND ANALYSIS : 1.Discovery Algorithm: INPUT : IP Address of the node to be searched. OUTPUT : Discovered devices in network. 2. Reconciliation Module: INPUT: Discovered database generated by discovery module. OUTPUT: Successful updating to main inventory. 3. Auto Update Module: INPUT :IP Address. OUTPUT : Device information return by SNMP get added to main inventory. Fig 8.1 Result Analysis Our discovery system to college network. We found in College network a total of 30 devices, including 4 switches, 2 routers,24 hosts. We noticed that the numbers of switches, routers, discovered in multiple tests were the same, but that the number of discovered end hosts varied. In the case of a connectivity discovery among the devices, there are many switches that do not support SNMP. For such devices, we could not discover the Connectivity information accurately and we will do this as a future work. IX. ADVANTAGES A. Complete Approach for Discovery : In our system we discover through range of IPs or by using the device manufacturer, so here we come to know when the discovery is finished as the system which is proposed, informs the end of discovery. B. Reconciliation Module : Reconciliation module helps the user to perform all the database operations, as the control of the database is with the network administrator. And not the third party as in existing system. C. Automatic Identification of Network Elements : In earlier system there were no control system for automatic identification of the network elements, but in the proposed system we have got the facility to perform that when we run the discovery module. X. APPLICATION 1)Organization. 2)Educational Sector. 3)Research Center. XI. CONCLUSION The proposed system overcomes the drawback of existing system. It will improve the performance of system and keeping data of all the devices which is present in network as well as performs fault detection and management. By using this system time of network administrator saved because authorized person can perform the Discovery & Reconciliation very easily. Avoid duplication of data by using reconciliation module & achieve central point recovery by using this system. REFERENCES [1] Network Management Principles and Practices by Mani Subramanian. International Journal of Engineering Science and Computing, April 2016 3725 http://ijesc.org/
[2] Kishori M. Konwara, Dariusz Kowalski, Alexander A. Shvartsman, Node discovery in networks, 2008. [3]Y. Bejerano, Y. Breitbart, M. Garofalakis, and R. Rastogi, Physical topology discovery for large multi- subnet networks, in Proc. IEEE INFOCOM, 2003, pp. 342 352. [4] M. Shoaib Yousaf,Ahmed Mattin,Ahsan Raza Sattar, Real Time Network Monitoring System in LAN Environment, IJRIME Volume1Issue5 ISSN 2249 1619,2011. [5]Suman Pandey, Mi-Jung Choi, Sung-Joo Lee, James W. Hong IP Network Topology Discovery Using SNMP. [6] C. Perkins and E. Royer, Ad-Hoc On-Demand Distance VectorRouting, Proc. IEEE Second Workshop Mobile Systems and Applications,1999. [7] S. Podlipnig and L. Boszormenyi, A Survey of Web CacheReplacement Strategies, ACM Computing Surveys, vol. 35, pp. 374-398, 2003. International Journal of Engineering Science and Computing, April 2016 3726 http://ijesc.org/