Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Network mapping
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Enterprise network mapping == Many organizations create network maps of their network system. These maps can be made manually using simple tools such as [[Microsoft Visio]], or the mapping process can be simplified by using tools that [[Network documentation|integrate auto network discovery with Network mapping]], one such example being the Fabric platform. Many of the vendors from the [[Network mapping#Notable network mappers|Notable network mappers]] list enable you to customize the maps and include your own labels, add un-discoverable items and background images. Sophisticated mapping is used to help visualize the network and understand relationships between end devices and the transport layers that provide service. Mostly, network scanners detect the network with all its components and deliver a list which is used for creating charts and maps using network mapping software.<ref>{{Cite web|title=FREE network mapping software PRTG|url=https://www.paessler.com/network-mapping|access-date=2021-09-07|website=www.paessler.com|language=en}}</ref> Items such as bottlenecks and [[root cause analysis]] can be easier to spot using these tools. There are three main techniques used for network mapping: [[Simple Network Management Protocol|SNMP]] based approaches, [[active probing]] and [[route analytics]]. The SNMP based approach retrieves data from Router and Switch MIBs in order to build the network map. The active probing approach relies on a series of traceroute-like probe packets in order to build the network map. The route analytics approach relies on information from the [[routing protocol]]s to build the network map. Each of the three approaches have advantages and disadvantages in the methods that they use.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)