0% found this document useful (0 votes)
131 views47 pages

June-July 2019 QP With Solutions

The document discusses network management. It describes the challenges of managing networks and why network management systems are useful. It lists key features of NMS like saving money and time, and increasing productivity. It also defines network management and discusses its functional groupings through a diagram. Another diagram shows the network management dumbbell architecture. Finally, it lists and explains different network management models like the OSI model and organization models with two-tier, three-tier, and MoM architectures.

Uploaded by

Akhila R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views47 pages

June-July 2019 QP With Solutions

The document discusses network management. It describes the challenges of managing networks and why network management systems are useful. It lists key features of NMS like saving money and time, and increasing productivity. It also defines network management and discusses its functional groupings through a diagram. Another diagram shows the network management dumbbell architecture. Finally, it lists and explains different network management models like the OSI model and organization models with two-tier, three-tier, and MoM architectures.

Uploaded by

Akhila R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

June/July 2019 QP

Network Management ( 15CS833 )


with Solutions

Module - 1
1 a. What are the challenges of Managing Network? Explain the use of NMS and why?
[05 Marks]

Challenges of Managing Network are


• Analyzing problems, which requires intuition & skill
• Anticipating customers' demands
• Acquiring resources
• Managing the client/server environment
• Networking with emerging technology as part of continuing education
• Collaborative research between academic institutions & industry
• Maintaining reliability
• Diagnosing problems or outrages in a non-disruptive manner
• Estimating value of a technology transition
• Maintaining a secure firewall between the internal network & the Internet
• Sustainable network that is scalable & maintainable
• Staying abreast of the rapid advance of technology
• Determining responsibility for outages to the WAN

A network management system is useful in:

• Network device discovery


• Network device monitoring
• Network performance analysis
• Network device management
• Intelligent notifications, or customizable alerts

Quality network management systems include the following features:

• Saves money: Only one system admin is required at a single location to monitor and
manage the entire network, which cuts hiring expenditures.

• Saves time: Each IT provider gets direct access to any data when required. All team
members can simply enter or retrieve data using their own workstations. At the same
time, their access may be controlled by the network manager.

Department of Computer Science & Engineering Page 1


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

• Increases productivity: Helps manage every aspect of the office network, which
includes software, hardware and other peripherals. The NMS identifies an issue as soon
as it occurs it to ensure that there is no productivity slowdown or data loss.

Department of Computer Science & Engineering Page 2


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. What is Network Management? With the neat diagram, explain network


management functional groupings. [06 Marks]

The Network Management is to ensure that the users of a network receives the information
technology services with the quality of service that they expect.

Network Management Functions

Network Provisioning
• The engineering group keep track of new technologies & introduces them as needed.
• Determination of what is needed & when is made through analysis of the traffic and
performance data provided by the network operations.
• Network management tools are helpful to the engineering group in gathering statistics
and studying the trends of traffic patterns for planning purposes.

Network Operations & the NOC


• They are concerned with daily operations of the network & providing network services.

Fault Management/Service Restoration

Department of Computer Science & Engineering Page 3


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Trouble Ticket Administration


• This is the administrative part of fault management & is used to track problems in the
network. All problems, including non problems, are to be tracked until resolved.

Configuration Management
There are 3 configurations of the network:
1) One is the static configuration & is the permanent configuration of the network. The
static configuration is on that would come up if the network is started from idle status.
2) The second configuration of a network is the current running configuration.
3) The third configuration is the planned configuration of the future when the configuration
data will change as the network is changed. This information is useful for planning &
inventory management.
Security management
Performance Management
Accounting Management
• The NOC administers costs & allocates the use of the network.
• Metrics are established to measure the usage of resources & services.
• There are 3 classes of reports: systems, management & user.

Network Installation & Maintenance


• The network I&M group takes care of all installation & maintenance of equipment &
cables.
• This group is the service arm of the engineering group for installation & fixing troubles
for network operations.

Department of Computer Science & Engineering Page 4


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

c. Explain Network Management Dumbbell Architecture, with neat diagram.


[05 Marks]

Network Management Dumbbell Architecture


• In fig, the messages consist of management information data & management controls.
• Application services are the management-related applications such as fault &
configuration management.
• The management protocols are CMIP for the OSI model & SNMP for the Internet model.
• Transport protocols are first 4 layers of OSI model & TCP/IP over any of first 2 layers of the 7-layer
OSI model.

Department of Computer Science & Engineering Page 5


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

2 a. List and briefly explain the salient features of different Network Management
models. [08 Marks]

Network Management Model


OSI network management architecture model comprises of 4 models:
1) Organization Model
2) Information Model
3) Communication Model &
4) Functional Model
• The functional model deals with the user-oriented requirements of network management.
• The information model deals with the structure & organization of management information.
• The communication model has 3 components: management application processes that function
in the application layer, layer management between layers and layer operation within the layers.
• The organization model describes the components of a network management system, their
functions and their infrastructure.

ORGANIZATION MODEL
The organization model describes the components of network management & their relationships.

Two Tier Network Management Organization Model

• In two tier model, network objects consists of network elements such as hosts, hubs, bridges,
routers etc.
• They can be classified into managed & unmanaged objects or elements.
• The managed elements have a management process running in them called an agent.
• The manager manages the managed element.

Department of Computer Science & Engineering Page 6


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

• There is a database in the manager but not in the agent.


• The manager queries the agent & receives management data, processes it & stores it in its
database.

Three Tier Network Management Organization Model

• In 3 tier model, the intermediate layer acts as both agent & manager.
• As manager, it collects data from the network elements, processes it & stores the results in its
database.
• As agent, it transmits information to the top-level manager.

Network Management Model with MoM

• Network domains can be managed locally and a global view of the networks can be monitored
by a MoM (Manager of managers).

Department of Computer Science & Engineering Page 7


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

• This configuration uses an enterprise network management system & is applicable to


organizations with sites distributed across cities

INFORMATION MODEL
• An information model is concerned with the structure & the storage of information.
• Information on network components is passed between the agent & management processes.
• The information model specifies the information base to describe managed objects & their
relationships.
• The SMI defines the syntax & semantics of management information stored in the MIB.
• The MIB is used by both agent & management processes to store & exchange management
information.
• A manager MIB consists of information on all the network components that it manages
whereas an agent MIB needs to know only its local information, its MIB view.
• The MDB is a real database & contains the measured or administratively configured value of
the elements of the network. On the other hand, the MIB is a virtual database & contains the
information necessary for processes to exchange information.

Department of Computer Science & Engineering Page 8


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

COMMUNICATION MODEL

Management data is communicated between agent & manager processes, as well as between
manager processes.
• Three aspects need to be addressed in the communication of information between 2 entities:
transport medium of message exchange, message format of communication and the actual
message.
Management Communication Model

• In the communication model, the applications in the manager module initiate requests to the
agent in the Internet model.
• The agent executes the request on the network elements and returns responses to the manager.
• The notifications/traps are the unsolicited messages such as alarms, generated by the agent.

Management Communication Transfer Protocols

• The communication protocol used to transfer information between managed object &
managing processes, as well as between management processes.
• The OSI model uses CMIP along with CMIS. Internet uses SNMP for communication.
• OSI uses both connection oriented and connectionless protocols for transportation. Internet uses
connectionless UDP/IP protocol to transport messages.
• CMIP & SNMP specifies the management communication protocols for OSI & Internet
management respectively.

Department of Computer Science & Engineering Page 9


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

FUNCTIONAL MODEL

• The functional model component addresses the user-oriented applications, which are formally
specified in the OSI model.
• The functional model consists of 5 sub models: configuration management, fault management,
performance management, security management and accounting management.

Department of Computer Science & Engineering Page 10


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. With block diagram, explain ASN.1 datatype structure and tags. Give example.
[05 Marks]

ASN.1 DATA TYPE


Simple Type
• A simple type one for which the values are specified directly. For example, we can define a
page of a book as PageNumber of simple type.
i.e. PageNumber ::= INTEGER
ChapterNumber ::= INTEGER

Structured Type
• A data type is a structured type when it contains other type.
• Types that are within a structured type are called component types. For example ,we can define
all the pages of the book as a collection of individual pages.
i.e. BookPages::=SEQUENCE OF
{
SEQUENCE {ChapterNumber , Separator ,PageNumber}
}
• SET is distinguished from SEQUENCE in 2 respects:
1) The data types should all be distinct and
2) The order of values in SET is of no consequence whereas it is critical in the
SEQUENCE construct.

Tagged Type
• Tagged type is a type derived from another type that is given a new tag id.
• A tagged type is defined to distinguish types within an application.

Other Type
• Other type is a data type that is not predefined.
• This is chosen from CHOICE and ANY types, which are contained in other types.
• Type CHOICE defines the selection of one value from a specified list of distinct types.

Department of Computer Science & Engineering Page 11


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Department of Computer Science & Engineering Page 12


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

c. Explain TLV encoding structure with values of class bits. [03 Marks]

Encoding Structure
• The ASN.1 syntax that contains the management information is encoded using the BER defined
for the transfer syntax.
• The ASCII text data is converted to bit-oriented data.
• Example of encoding structure is TLV which denotes type, length & value components of
structure (Fig: 3.18).

• The type has 3 subcomponents: class, P/C & tag number (Table: 3.6).

• P/C specifies whether the structure is a primitive, or simple, type or a construct.


• This is encoded as a one byte (an octet) field.
• The value of P/C is 0 for primitive & 1 for construct.

Department of Computer Science & Engineering Page 13


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Module - 2
3 a. What is Management Information base? Explain MIB Module structure.
[05 Marks]

Management Information base is a virtual information base. Managed objects are accessed via
this virtual information base.
• Objects in the MIB are defined using ASN.1. The objects defined in MIB-2 have the OBJECT
IDENTIFIER
prefix: mib-2 OBJECT IDENTIFIER ::= {mgmt 1}

MIB Structure
For simplicity and extensibility, SMI avoids complex data types. Each type of objects in a MIB
has a name, syntax, and an encoding scheme. An object is uniquely identified by an OBJECT
IDENTIFIER. The identifier is also used to identify the structure of object types. The term
OBJECT DESCRIPTOR may also be used to refer to the object type. The syntax of an object
type is defined using Abstract Syntax Notation One (ASN.1). Basic encoding rules (BER) have
been adopted as the encoding scheme for data type transfer between network entities.

The set of defined objects has a tree structure. Beginning with the root of the object identifier
tree, each object identifier component value identifies an arc in the tree. The root has three
nodes: itu (0), iso (1), and joint-iso-itu (2). Some of the nodes in the SMI object tree, starting
from the root. The identifier is constructed by the set of numbers, separated by a dot that de_nes
the path to the object from the root. Thus, the internet node, for example, has its OBJECT
IDENTIFIER value of 1.3.6.1. It can also be defined as follows:

internet OBJECT IDENTIFIER :: = { f iso (1) org (3) dod (6) 1 g}

Department of Computer Science & Engineering Page 14


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. Explain in brief with neat diagram, two tier, three tier and proxy server SNMP
organization model. [06 Marks]

SNMP ORGANIZATION MODEL


Two-Tier Model
• This consists of an agent process, which resides in the managed object, and a manager process,
which resides in the NMS and manages the managed object.
• Both the manager and the agent are software modules.
• The agent responds to any NMS that communicates with it using SNMP. Thus, multiple
managers can interact with one agent.
• In the 2-tier models, the network manager receives raw data from agents & processes them.
Sometimes, it is beneficial for the network manager to obtain preprocessed data. Instead of the
network manager continuously monitoring the events and calculating the information, an
intermediate agent called RMON is inserted between the managed object and the network
manager.

Three-Tier Model
• In 3-tier organization model, the network manager receives data from the managed objects as
well as data from the RMON agent about the managed objects.
• The RMON function has greatly increased the centralized management of networks.

Department of Computer Science & Engineering Page 15


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Three-Tier Model with Proxy Server


• Normally, the pure SNMP management system consists of SNMP agents and SNMP managers.
However, an SNMP manager can manage a network element that does not have an SNMP agent.
This is shown in fig.
• This model is applicable in many situations, such as legacy systems management,
telecommunications network management, wireless networks management and so on.
• A proxy server converts the data into a set that is compatible with SNMP and communicates
with the SNMP manager.

Department of Computer Science & Engineering Page 16


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

c. Explain SNMP Network Management Architecture, with neat diagram.


[05 Marks]

SNMP NETWORK MANAGEMENT ARCHITECTURE


This portrays the data path between the manager application process and the agent application
process via the 4 transport protocols: UDP, IP, DLC & PHY. The 3 application layers above the
transport layer are integrated in the SNMP process.

• The communication of management information among management entities is realized


through exchange of following 5 protocol messages:
1) The get-request message is generated by the management process requesting the value of an
object.
2) The get-next-request is similar to get-request. In many situations, an object may have multiple
values because of multiple instances of the object.

Department of Computer Science & Engineering Page 17


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

3) The set-request is generated by the management process to initialize or reset the value of an
object variable.
4) The get-response message is generated by an agent process. It is generated only on receipt of a
getrequest, get-next-request or set-request message from a management process.
5) A trap is an unsolicited message generated by an agent process without a message or event
arriving from the manager process.

• The SNMP manager has a database that polls the managed objects for management data. It
contains 2 sets of data: one on the information about the objects, MIB and a second on the values
of the objects, MDB
1) A MIB is a virtual database and is static. In fact, a MIB needs to be there when an
NMS discovers a new object in the network. It is compiled in the manager during the
implementation.
2) A MDB is dynamic and contains the measured values associated with the object. This
is a true database.
It is implemented using any database architecture chosen by the implementers.

Department of Computer Science & Engineering Page 18


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

4 a. What is SNMP Community? Explain SNMP community profile and Access


policy. [06 Marks]

The application entity that reside in the management station is called SNMP manager, and the
application entity that reside in the network element is called SNMP agent.. The pairing of these
two entities is called an SNMP Community.

• In (fig:5.1),while an SNMP manager is monitoring traffic on an element, another manager can


be configuring some administrative information on it. A third manager can be monitoring it to
perform some statistical study.
• In (fig:5.1),the authentication scheme is filter module in the manager and in the agent. The
simplest form of authentication is the common community name between the two application
entities.
• A network element comprises many managed objects, both standard & private. However, a
management agent may be permitted to view only a subset of the network element's managed
objects. This is called the community MIB view (fig:5.2).
• In addition to the MIB view, each community name is also assigned an SNMP access mode
either READ-ONLY or READ-WRITE.
• The pairing of the SNMP MIB view with the SNMP access mode is called the community
profile.
• A community profile in combination with the access mode of a managed object determines the
operation that can be performed on the object by an agent.

Department of Computer Science & Engineering Page 19


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

SNMP ACCESS POLICY


• A pairing of an SNMP community with an SNMP community profile is defined as SNMP
access policy. This defines the administrative model of SNMP management.
• In fig:5.3, agent 1 and 2 belong to Community 1. However, they have different community
profiles, community profiles 1 and 2.
• Manager 1, which is part of Community 1, can communicate with both Agents 1 and 2.
However, it cannot communicate with Agents 3 and 4, which belong to Community 2. Manager
2 has access to them because it also belongs to Community 2.
• The SNMP access policy can be extended to managing a non-SNMP community that uses the
SNMP proxy access policy (fig:5.4).
• The SNMP agent associated with the proxy policy is called a proxy agent or commercially a
proxy server.
• The proxy agent monitors a non-SNMP community with non-SNMP agent and then converts
the objects and data to SNMP-compatible objects and data to feed to an SNMP manager.

Department of Computer Science & Engineering Page 20


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Department of Computer Science & Engineering Page 21


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. What is Interface group? Explain with example. [05 Marks]

INTERFACES GROUP
• The Interface group contains managed objects associated with the interfaces of a system.
• If there is more than one interface in the system, the group describes the parameters associated
with each interface.
• This specifies the number of interfaces in a network component and the managed objects
associated with each interface.
• Implementation of the Interfaces group is mandatory for all system.

Department of Computer Science & Engineering Page 22


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

c. Explain ICMP group, with neat diagram. [05 Marks]

ICMP is a precursor of SNMP and A a part of the TCP/lP suite. It is included In MIB- I and
MIB-II and implementation is mandatory. The ICMP group contains statistics on ICMP control
messages of ICMP and is presented in Figure4.36 and Table 4. 12. The syntax of all entities is
read-only counter. For example, statistics on the number of ping requests (icmp echo request)
sent might be obtained from to counter reading of icmpOutEchoes.

Figure 4.36. ICMP Group

Department of Computer Science & Engineering Page 23


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Module - 3
5 a. What is Remote Monitoring? With a figure, explain use of RMON probe.
[06 Marks]

The monitored information gathered & analyzed locally, can be transmitted to a remote network
management station. In such a case, remotely monitoring the network with a probe is referred to
as RMON (Remote Network Monitoring)
• Two remote LANs, one a token ring LAN and another, an FDDI LAN ,are connected to the
backbone network.
The NMS is on the local Ethernet LAN.
• An Ethernet probe is on the Ethernet LAN monitoring the local LAN The FDDI backbone is
monitored by an FDDI probe via the bridge and Ethernet LAN A token ring probe monitors the
token ring LAN. It communicates with the NMS via the routers ,the WAN & the backbone
network The remote FDDI is monitored by the built-in probe on the router. The FDDI probe
communicates with NMS.
• All 4 probes that monitor the 4 LANs and communicate with the NMS are RMON devices.
Advantages:
1) Each RMON device monitors the local network segment and does the necessary analyses.
This relays information in both solicited & unsolicited fashion to the NMS.
For example, RMON could be locally polling the network elements in a segment. If it
detects an abnormal condition such as heavy packet loss or excessive collisions, it sends
an alarm. Because the polling in local, the information is fairly reliable. The local
monitoring and reporting to a remote NMS significantly reduces SNMP traffic in the
network.
2) RMON reduces the need for agents in the network to be visible at all times to the NMS.
3) Monitoring packets such as ICMP pings, may get lost in long-distance communication,
especially under heavy traffic conditions. Such losses may wrongly be interpreted by the NMS
that the managed object is down. RMON pings locally and hence has less chance of losing
packets, thus increasing monitoring reliability.
4) The individual segments can be monitored almost continuously. This capability provides
better statistics and control. Thus a fault can be diagnosed more quickly by the RMON and
reported to the NMS.

Department of Computer Science & Engineering Page 24


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

5) RMON provides higher network availability for users and greater productivity for
administrators.

Department of Computer Science & Engineering Page 25


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. Explain RMON1 groups and its function in detail. [05 Marks]

RMON1 GROUPS & FUNCTIONS


• The data gathering modules, which are LAN probes, gather data from the remotely monitored
network. comprising Ethernet & token ring LANs. The data can serve as inputs to 4 sets of
functions, 3 of which monitor traffic statistics.
• The functions performed by various groups is as follows:
1) Statistics: provides link level statistics.
2) History: collects periodic statistical data & stores them for later retrieval.
3) Alarm: generates events when the data sample gathered crosses pre-established
threshold.
4) Host: gathers statistical data on hosts.
5) Host Top N: computes the top N hosts on the respective categories of statistics
gathered.
6) Matrix: gathers statistics on traffic between pairs of hosts.
7) Filter: performs filter function that enables capture of desired parameters.
8) Packet capture: provides packet capture capability for gathering packets after they flow
through a channel.
9) Event: controls the generation of events & notifications.

• The outputs of the various modules are analyzed & presented in tabular and graphical forms to
the user by the network manager in the NMS.
• The filter group is a cascade of 2 filters. The packet filter filters incoming packets by
performing a Boolean and/or XOR with a mask specified. The filtered packet stream is
considered a channel, and we can make further selections based on the channel mask.
• The filtered outputs may generate either alarms or events, which are reported to the network
manager. The output of the filter group can be stored in the packet capture module for further
analysis by the network manager.

Department of Computer Science & Engineering Page 26


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Department of Computer Science & Engineering Page 27


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

c. Explain four broad band access technology with example. [05 Marks]

Broadband access technology is still ao emerging field. There are four modes of access using
four different technologies. They are Cable, DSL, wireless, and PON.

• Cable Access Network technology uses television transmission facilities and CMs and is
the most widely deployed access network in North America. Cable access network could
be implemented as either on &-way with telephony return or two-way. In the one-way
telephony-return configuration, the downstream signal to the customer traverses the cable
medium. The return upstream signal from the customer premises is carried over the
telephone facilities using a regular modem. Typically, data from a residential customer
arc significantly less than that to the customer and hence this approach of two- or one-
way communication is acceptable.

• The DSL has three different implementations and is generally referred to as xDSL, where
x stands for asymmetric (A), high--speed (H), or very high data rate (V). All are based on
using existing local loop telephone facilities.

• Wireless access technology uses wireless transmission for the downstream link to the
customer site and either wireless or telephony-return for the upstream link from the
customer site. Wireless access network can be implemented either as fixed wireless or
mobile wireless.

Department of Computer Science & Engineering Page 28


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

• PON technology is technically ready for commercial deployment, but has been delayed
due to business consideration of cost and lack of need for large bandwidth to residential
customers.

Department of Computer Science & Engineering Page 29


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

6. a. Explain SNMP operation with details. [06 Marks]

Basic operations of the protocol entity involve the following steps as a guide to implementation:
1) The protocol entity that generates the message constructs the appropriate data PDU as an
ASN.1 object.
2) It then passes the ASN.1 object, along with a community name and the transport addresses of
itself and the destination to the authentication scheme.
3) The authentication scheme returns another ASN.1 object.
4) The protocol entity now constructs the message to be transmitted with the version number,
community name and the new ASN.1 object, then serializes it using the BER, and transmits it.
5) The reverse process goes on at the receiver.
6) The message is discarded if error is encountered in any of the steps.
7) A trap may be generated in case of authentication failure.
8) On successful receipt of the message, a return message is generated, if the original message is
a get or set message.

Department of Computer Science & Engineering Page 30


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. Explain RMON2 management information base with details. [05 Marks]

The Rmon Management Information Base


• The RMON2 MIB is arranged in 10 groups:
1) The protocol directory group identifies the protocols that the probe can monitor.
2) The protocol distribution group provides information on the relative traffic of different
protocols either in octet or packets. It collects basic statistics that help a NMS manage
bandwidth allocation utilized by different protocols.
3) The address map group binds the MAC address to network address on each interface.
4) The network layer host group measures the traffic sent from and to each network
address representing each host discovered by the probe.
5) The network layer matrix group provides information on the conversation between
pairs of hosts in both directions.
6) Both application layer host and application layer matrix groups calculate traffic by
protocol units and use their respective control tables in the network layer host group and
the network layer matrix group.
7) Alarm and history information are combined into the user history collection group.
This function, normally done by NMS, can be off-loaded to RMON.
8) The probe configuration group provides the facility for configuring the probe.The data
can be accessed via a modem connection.

RMON Token Ring Mib Groups & Tables

Department of Computer Science & Engineering Page 31


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

c. Explain Data over cable system reference Architecture. [05 Marks]

Data over cable system reference Architecture


The top half of Figure 13.9 shows the system reference architecture of HFC data-over-cable
services and interfaces. It is a subset of the BFC network shown in Figure 13.3 portraying a link
from the subscriber work station to the WAN connectlon.lt is made up of head end, HFC link,
CM, and subscriber PC. The bead end is connected to WAN. Multiple bead ends could be
connected via the WAN to a regional center head end. In such a case, the local head end may be
referred to as ·the distribution hub. The HFC link consists of fiber links and a coaxial cable,
connecting the head end to the CM at the subscriber location.

Department of Computer Science & Engineering Page 32


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Module-4
7 a. Briefly explain HFC Technology, with neat block diagram. [06 Marks]

Department of Computer Science & Engineering Page 33


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Department of Computer Science & Engineering Page 34


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. What is CMTS? Briefly explain with example. [05 Marks]

All CMs terminate on a server, called the CMTS at the head end. The hybrid optical fiber and
coaxial cable link(HFC) connect the CMs to the CMTS at the head end. The CMTS provides a
number of services to the access network. It is the gateway to the external network from the
access network. It multiplexes and demultiplexes the signals from the CMs 10 interface to the
external network.

As we would expect with tlu~ topology of a broadband LAN, the upstream and downstream
propagation frequencies are different. CMTS performs the frequency conversion.
For example, when a CM wants to communicate with another CM in the same access network,
the signal goes upstream to the CMTS at the head end.
It converted to the downstream carrier frequency by the CMTS and propagated downstream as a
broadcast message. The receiving CM picks up the message by reading the destination address in
the message.

From the above two functions, we notice that CMTS does the function of either routing (to the
external network) or bridging (intra-access network). The CM system developed by some
vendors builds these functions within CMTS. The routing function could also be accomplished
by an external router.

CMTS interfaces with operations support systems that serve the function of managing the access
network. It also supports security and the access controller system to handle the integrity and
security of the access network.

Department of Computer Science & Engineering Page 35


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

c. Explain 5 layers Architecture of Network management, with neat diagram.


[05 Marks]

Department of Computer Science & Engineering Page 36


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

8 a. What is ADSL Technology? Briefly explain simplified ADSL access network


with example. [06 Marks]

Asymmetric Digital Subscriber Line

Among all the xDSLs, the asymmetric digital subscriber line (ADSL) is the technology that is
being deployed now in most oft-he world. A simplified access network using ADSL is shown in
Figure and consists of an ADSL transmission unit (ATU) and splitter at each end of the ADSL
line. The ATU acronym bas also been expanded in print as the ADSL transceiver unit as well as
the ADSL 1em1inating unit, although ADSL TR-001 defines it as the ADSL transmission unit.
The ATU the central office is ATU-C and the one at the customer residence is ATU-R.

The ATU is also called the ADSL modem. The data and video signal .from the broadband
network is convened to an analog signal by the ATU-C and multiplexed and demultiplexed. The
splitter at the central office combines the plain old telephone service (POTS) voice signal and the
broadband signal. The reverse process occurs at the splitter and ATU-R at the customer premises
( residence). There are modems available that embed the splitter and thus eliminate a separate
splitter at the customer site. This configuration is referred to as ADSL-Lite, also known as GLite.

Department of Computer Science & Engineering Page 37


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. Briefly explain the role of ADSL access Network in an overall Network with

details. [06 Marks]

ADSL Access Network in Overall Network


Broadband Forum's view [TR-01] of how ADSL access network fits into the overall network for
broadband services is presented in .Figure 13 .18. It shows the components of the overall
network comprising private, public and premises network and the role that ADSL access network
plays in it. TI1e networking side of the service providers consists of service systems, different
types of networks that are behind the access node, the operation systems (OS) that perform the
operations, administration, and maintenance (OAM) of the networks and access nodes, and the
ATU-Cs. The customer premises network comprises ATU-R, premises distribution network
(PDN0,various service modules (SM), and terminal equipment (TB). On the bottom of Figure
13.18 are shown five transport modes that depict an evollf1ionary process from a primitive
synchronous transfer mode (STM) to 110 all ATM mode.

Department of Computer Science & Engineering Page 38


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

c. What is SNMPV3 security? Explain conceptualized representation of SNMP


secure communication. [04 Marks]

One oft be main objectives, if not the main objective, in developing SNMPv3 is the addition of
security features to SNMP management. Authentication and privacy of information, as well as
authorization and access controls, have been addressed in SNMPv3 specifications.

SNMPv3 architecture permits flexibility to use any protocol for authentication and privacy of
information. However, the IETF SNMPv3 working group has specified a USM for its security
subsystem. The working group has specified HMAC-MDS-96 and HMAC-SHA-96 as the
authentication protocols. Cipher Block Chaining mode of Data Encryption Standard (CBCDES)
has been adopted for privacy protocol.

Department of Computer Science & Engineering Page 39


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Module-5
9 a. Briefly explain ADSL Fault Management with example. [08 Marks]

ADSL Fault Management


Faull management parameters are shown in Table and should be displayed by the NMS. After
the automatic Indication of faults, ATU-C and ATU-R self-rests as specified in Tl.413 could be
used to assist in the diagnostics.

The ADSL line status shows the current state oft be line as to whether it Is operational, or there is
a loss of any of the parameters on frame, signal. power. or link. It also indicates initialization
errors, Alarms are generated when the preset counter reading exceeds 15 minutes on loss of
signal frame, power, link, and error seconds.

Department of Computer Science & Engineering Page 40


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. What is Event Correlation? Explain case based reasoning in details with


necessary diagram. [08 Marks]

Department of Computer Science & Engineering Page 41


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Department of Computer Science & Engineering Page 42


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

10 a. Write a note on different Authentication system in client server environment.

[08 Marks]

Department of Computer Science & Engineering Page 43


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Department of Computer Science & Engineering Page 44


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Department of Computer Science & Engineering Page 45


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

b. What is Privacy Enhanced Mail (PEM)? Briefly PEM Process, with neat
diagram. [08 Marks]

Privacy-Enhanced Mail (PEM). Privacy-enhanced mail (PEM) was developed by IETF, and
specifications are documented in RFC 1421-RFC 1424. H is intended to provide PEM using cod-
to-end cryptography between originator and recipient processes [R.FC 1421]. The PEM provides
privacy enhancement services (what else), which are defined as (1) confidentiality, (2)
authentication, (3) message integrity assurance, and ( 4) non repudiation of origin. The
cryptographic key, called the data encryption key (DEK), could be either a secret key or a public
key based on the specific implementation and is thus flexible. however, the originating and
terminating ends must have common agreement (obviously!).

Department of Computer Science & Engineering Page 46


June/July 2019 QP
Network Management ( 15CS833 )
with Solutions

Figure shows three PEM processes defined by IETF: MIC-CLEAR, MIC-ONLY, and
ENCRYPTED based on message integrity and encryption scheme. Only the originating end is
shown. In all three procedures, reverse procedures are used to extract the message and validate
the originator 10 and message integrity. The differences between the three procedures are
dependent on the extent of cryptography used and message encoding.

Department of Computer Science & Engineering Page 47

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy