Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Wireless links real-time monitoring.
  • Automatic network nodes discovery.
  • Incident Event formation.
Note
titleNOTE

The NEXT system is intended only for monitoring Infinet Wireless devices. Devices from other manufacturers are not supported.

...

...

While the polling subsystem is an active part in accessing network nodes, the SNMP Trap processing subsystem is a passive. It is always ready to receive Traps from network nodes. After receiving the notification, the subsystem proceeds to their unscheduled processing, it allows timely respond to changes, without waiting for the completion of the polling cycle.

...

Event subsystem 
Anchor
Подсистема формирования событий
Подсистема формирования событий

The subsystem task is to create an incident based event based on rules set by a NEXT administrator.

The incident subsystem event subsystem work starts after the information about changes in the network nodes parameters obtained through the polling subsystem or the "SNMP Trap" processing subsystem is placed in the storage subsystem. This subsystem verifies matching the conditions of the incident formation event formation rule to the relevant parameters. If the condition specified in any rule is met, an incident is event is generated, and can be viewed in the web interface of the monitoring system.

...

  • Detects a neighboring device of the added in the same MINT area with which connection is established, but has not yet been added to NEXT.
  • Generates a polling task for a neighboring network node using SNMP authentication data specified by the NEXT engineer for the added device.
  • The polling subsystem performs an unscheduled poll of a device neighboring to an already added. If the specified authentication data is suitable, then the neighboring device will be added automatically. If the data does not match, a new request will be generated to the polling subsystem with the authentication data that was specified for other devices previously added to NEXT. Requests will be repeated until any authentication data matches or runs out.
  • After adding the detected network node, a search for neighboring nodes will be also carried out. This process ends when the neighbors of all nodes previously added to the NEXT have been discovered and polled. The network nodes without authentication data matched will not be added, and attempts to add them will continue in the future.

...

The subsystem provides data storage and quick access to them by the web GUI to NEXT engineers.

Hide_comments