?
Solved

How can I identify my network topology?

Posted on 2007-12-05
3
Medium Priority
?
1,464 Views
Last Modified: 2008-07-23
Hi

I want to find out my network topology using any particular tool or software. Please advise
0
Comment
Question by:jurjess
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 12

Expert Comment

by:sarangk_14
ID: 20418139
Hi,

I don't mean to be rude, but since you haven't provided us any information about your network, whether this is an SME network, SOHO network, or a private small network, it's is very difficult to give you a fitting solution.
I would hence request that you search the Internet using Google. There are thousands if not more products that allow you to monitor and / or manage your networks. They all come in various price ranges; from free-ware to really expensive Enterprise management software.

Here are a couple of links that may be of help to you:
http://www.bitpipe.com/plist/term/Network-Monitoring-Software.html   (Products)
http://www.bitpipe.com/rlist/term/Network-Monitoring-Software.html    (Vendor Papers)

Hope this helps. Comments/ Suggestions/ Corrections are welcome.
0
 
LVL 1

Expert Comment

by:Rsys
ID: 20561040
Hi,
         I have not used this one but have a look. http://www.mikrotik.com/thedude.php
Good luck
0
 
LVL 1

Accepted Solution

by:
Rsys earned 375 total points
ID: 20665101
Hi,
   Take a look at this page:  http://www.scos.nl/pages/adventnet_oputils.htm

   
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Outsource Your Fax Infrastructure to the Cloud (And come out looking like an IT Hero!) Relative to the many demands on today’s IT teams, spending capital, time and resources to maintain physical fax servers and infrastructure is not a high priority.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question