Browse Prior Art Database

Method and System for Incremental, Scopeless, Network Subnet Discovery

IP.com Disclosure Number: IPCOM000202184D
Publication Date: 2010-Dec-07
Document File: 2 page(s) / 20K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a method and system for incremental, scopeless network subnet discovery. All devices in each subnet of a network are discovered, wherein subnets are selected based on a rule.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 54% of the total text.

Page 01 of 2

Method and System for Incremental , Scopeless, Network Subnet Discovery

Disclosed is a method and system for incremental, scopeless network subnet discovery. All devices in each subnet of a network are discovered, wherein subnets are selected based on a rule.

Generally, network subnet discovery is performed by sweeping the addresses of the network to create a list of hosts. Subsequently, snmp queries are sent to each host in the list of hosts. Thereafter, a list of devices is created which have responded to the snmp queries. Accordingly, detailed queries are sent to the list of devices. However, in this method of discovering, there is a possibility of going over the networks that a user does not own particularly when the network is not documented well. Therefore, a method and system is disclosed herein for incremental scopeless network subnet discovery without going over the edge of the network that the user owns.

To begin with, the system is seeded with a router IP address. Thereafter, the system queries the router, to obtain IGP learned routes, directly connected routes, static routers, and IGP & BGP peering information.

In accordance with the method and system, a user is allowed to classify length of a prefix as legitimate. The user is prompted to select the prefix length for WAN subnets and for LAN subnets. If the user doesn't select the prefix length, a default length is set on the WAN subnets as /30 and on the LAN subnets as /22. In such cases, the user is...