{"id":486,"date":"2021-12-27T15:43:42","date_gmt":"2021-12-27T15:43:42","guid":{"rendered":"https:\/\/login-safe.com\/?p=486"},"modified":"2021-12-27T15:43:42","modified_gmt":"2021-12-27T15:43:42","slug":"logical-network-inventory","status":"publish","type":"post","link":"https:\/\/login-safe.com\/en\/logical-network-inventory\/","title":{"rendered":"Logical network inventory"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_57_1 counter-hierarchy ez-toc-counter ez-toc-white ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\" role=\"button\"><label for=\"item-69e8a2da9a801\" ><span class=\"\"><span style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input aria-label=\"Toggle\" type=\"checkbox\"  id=\"item-69e8a2da9a801\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/login-safe.com\/en\/logical-network-inventory\/#What_will_logical_network_inventory_surprise_you\" title=\"What will logical network inventory surprise you?\">What will logical network inventory surprise you?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/login-safe.com\/en\/logical-network-inventory\/#Why_logical_network_inventory\" title=\"Why logical network inventory?\">Why logical network inventory?<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_will_logical_network_inventory_surprise_you\"><\/span>What will logical network inventory surprise you?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-487 alignleft\" src=\"https:\/\/login-safe.com\/wp-content\/uploads\/2021\/12\/net1-300x169.jpg\" alt=\"Logical network inventory\" width=\"300\" height=\"169\" \/>SunVizion Logical Network Inventory<\/strong> allows you to manage information about connections and relations between different types of connections.<\/p>\n<p><strong>Logical network inventory<\/strong> records resource functionality, bandwidth, and relationships with other physical and logical resources.<\/p>\n<p>The solution also enables documenting bandwidth allocation in the telecommunications network and tracking the relationship between logical and physical elements.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_logical_network_inventory\"><\/span>Why logical network inventory?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-489 alignleft\" src=\"https:\/\/login-safe.com\/wp-content\/uploads\/2021\/12\/net3-300x200.jpg\" alt=\"Logical network inventory\" width=\"300\" height=\"200\" \/>This <a href=\"https:\/\/www.sunvizion.com\/products\/network-inventory\/222-network-inventory-logical-inventory\">logical network inventory<\/a> is possible through a cross-sectional approach due to integration with NMS systems, access to network topology information, network utilization data, and network connection search and reservation functions.<\/p>\n<p>In a word, one system &#8211; different technologies. All network technologies support: D WDM, SDH \/ PDH, Ethernet, IP \/ MPLS backbone, ATM.<\/p>\n<p>The SDH scheme allows you to load selected parts of any topology (ring, mash), track the route in individual spans, view throughput, locate the occupied VC-12\/3\/4 containers in selected SDH connections as well as the container number and path name inside each container.<\/p>\n<p>We believe that the key to success is not the software itself, but the employees who create it, the customers who use it, and the telecommunications stakeholders who use it. Amazing designs are delivered by amazing teams.<\/p>\n<p>Our team consists of talented individuals and qualified team members ready to combine their skills to deliver best-in-class solutions. In this way, the most important people for us &#8211; our customers &#8211; benefit.<\/p>","protected":false},"excerpt":{"rendered":"<p>What will logical network inventory surprise you? SunVizion Logical Network Inventory allows you to manage information about connections and relations between different types of connections. Logical network inventory records resource&hellip; <\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[174],"ppma_author":[342],"class_list":["post-486","post","type-post","status-publish","format-standard","hentry","category-technology","tag-logical-network-inventory"],"aioseo_notices":[],"authors":[{"term_id":342,"user_id":1,"is_guest":0,"slug":"admin","display_name":"admin","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/4fbf54a33d3434ab401433233683639ffd615eae3e68dcd428d2c2d9e220fa24?s=96&d=mm&r=g","user_url":"https:\/\/login-safe.com","last_name":"","first_name":"","description":""}],"_links":{"self":[{"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/posts\/486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/comments?post=486"}],"version-history":[{"count":1,"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/posts\/486\/revisions"}],"predecessor-version":[{"id":490,"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/posts\/486\/revisions\/490"}],"wp:attachment":[{"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/media?parent=486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/categories?post=486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/tags?post=486"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/login-safe.com\/en\/wp-json\/wp\/v2\/ppma_author?post=486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}