OpenText Network Operations Management (NOM) — Network Discovery & Monitoring

Blog Series: OpenText NOM — Part 2

Part 1: SNMP Explained for Monitoring Engineers

After understanding SNMP fundamentals, the next step is to see how monitoring tools actually use it in real environments.

OpenText Network Operations Management (NOM) automatically discovers devices, builds topology and monitors network health continuously.

This article explains how discovery and monitoring work in real NOC environments.


📌 Role of NOM in Network Operations

Enterprise networks contain:

  • Routers

  • Switches

  • Firewalls

  • Load balancers

  • Servers

Manual monitoring is impossible.

OpenText NOM provides centralized visibility and automated monitoring across the network infrastructure


What is Network Discovery?

Network discovery automatically identifies devices connected to the network and gathers:

  • IP address

  • Vendor & model

  • Interfaces

  • Routing relationships

It continuously discovers nodes and keeps topology updated


🖼️ Discovery Overview


How NOM Discovers Devices

NOM primarily uses Simple Network Management Protocol and ICMP.

SNMP collects device status variables and configuration information from network equipment


Discovery Flow

  1. Admin defines IP range

  2. Tool sends ICMP ping

  3. SNMP query sent to device

  4. Device identified

  5. Topology mapped automatically


Discovery Types

Discovery TypePurpose
IP DiscoveryFind devices
SNMP DiscoveryCollect device information
Layer-2 DiscoverySwitch connectivity
Layer-3 DiscoveryRouting paths

🖼️ Discovery Workflow


Network Monitoring in NOM

After discovery, monitoring starts automatically.

The tool continuously checks device health and performance.


Metrics Monitored

CategoryExamples
AvailabilityUp / Down
PerformanceCPU / Memory
InterfacesBandwidth usage
ErrorsPacket drops
HardwareTemperature, power

🖼️ Monitoring Dashboard


Polling vs Traps

Polling

Monitoring server queries device periodically

SNMP Traps

Device sends alert instantly

Example:

Link Down: Gi0/1 Switch-Core

Immediate alert generated.


Event Correlation (Root Cause Analysis)

Instead of showing 100 alarms:

Switch Down → Server Down → Application Down

NOM correlates them into one root cause alarm

This reduces alert noise and speeds troubleshooting


🖼️ Event Correlation


Best Practices

✔ Use SNMPv3 credentials
✔ Discover during off-peak hours
✔ Tune polling interval
✔ Configure thresholds
✔ Enable traps for critical devices


Why This Matters

Without monitoring:

  • Late outage detection

  • Manual troubleshooting

  • Service downtime

With NOM:

  • Proactive detection

  • Faster resolution

  • Capacity planning


📚 Recommended Reading

Part 1 — SNMP Fundamentals

Also read:


🎯 Conclusion

SNMP provides the data.
NOM provides the visibility.

Discovery builds the network map.
Monitoring keeps the network healthy.

This is the foundation of modern Network Operations Centers.


💼 Professional Support Available

If you are facing issues in real projects related to enterprise backend development or workflow automation, I provide paid consulting, production debugging, project support, and focused trainings.

Technologies covered include Java, Spring Boot, PL/SQL, CMS, Azure, and workflow automation (jBPM, Camunda BPM, RHPAM).

📧 Contact: ishikhanirankari@gmail.com | info@realtechnologiesindia.com

🌐 WebsiteIT Trainings | Digital metal podium


Comments

Popular posts from this blog

OOPs Concepts in Java | English | Object Oriented Programming Explained

Scopes of Signal in jBPM

jBPM Installation Guide: Step by Step Setup