June-July 2019 QP With Solutions
June-July 2019 QP With Solutions
Module - 1
1 a. What are the challenges of Managing Network? Explain the use of NMS and why?
[05 Marks]
• Saves money: Only one system admin is required at a single location to monitor and
manage the entire network, which cuts hiring expenditures.
• Saves time: Each IT provider gets direct access to any data when required. All team
members can simply enter or retrieve data using their own workstations. At the same
time, their access may be controlled by the network manager.
• Increases productivity: Helps manage every aspect of the office network, which
includes software, hardware and other peripherals. The NMS identifies an issue as soon
as it occurs it to ensure that there is no productivity slowdown or data loss.
The Network Management is to ensure that the users of a network receives the information
technology services with the quality of service that they expect.
Network Provisioning
• The engineering group keep track of new technologies & introduces them as needed.
• Determination of what is needed & when is made through analysis of the traffic and
performance data provided by the network operations.
• Network management tools are helpful to the engineering group in gathering statistics
and studying the trends of traffic patterns for planning purposes.
Configuration Management
There are 3 configurations of the network:
1) One is the static configuration & is the permanent configuration of the network. The
static configuration is on that would come up if the network is started from idle status.
2) The second configuration of a network is the current running configuration.
3) The third configuration is the planned configuration of the future when the configuration
data will change as the network is changed. This information is useful for planning &
inventory management.
Security management
Performance Management
Accounting Management
• The NOC administers costs & allocates the use of the network.
• Metrics are established to measure the usage of resources & services.
• There are 3 classes of reports: systems, management & user.
2 a. List and briefly explain the salient features of different Network Management
models. [08 Marks]
ORGANIZATION MODEL
The organization model describes the components of network management & their relationships.
• In two tier model, network objects consists of network elements such as hosts, hubs, bridges,
routers etc.
• They can be classified into managed & unmanaged objects or elements.
• The managed elements have a management process running in them called an agent.
• The manager manages the managed element.
• In 3 tier model, the intermediate layer acts as both agent & manager.
• As manager, it collects data from the network elements, processes it & stores the results in its
database.
• As agent, it transmits information to the top-level manager.
• Network domains can be managed locally and a global view of the networks can be monitored
by a MoM (Manager of managers).
INFORMATION MODEL
• An information model is concerned with the structure & the storage of information.
• Information on network components is passed between the agent & management processes.
• The information model specifies the information base to describe managed objects & their
relationships.
• The SMI defines the syntax & semantics of management information stored in the MIB.
• The MIB is used by both agent & management processes to store & exchange management
information.
• A manager MIB consists of information on all the network components that it manages
whereas an agent MIB needs to know only its local information, its MIB view.
• The MDB is a real database & contains the measured or administratively configured value of
the elements of the network. On the other hand, the MIB is a virtual database & contains the
information necessary for processes to exchange information.
COMMUNICATION MODEL
Management data is communicated between agent & manager processes, as well as between
manager processes.
• Three aspects need to be addressed in the communication of information between 2 entities:
transport medium of message exchange, message format of communication and the actual
message.
Management Communication Model
• In the communication model, the applications in the manager module initiate requests to the
agent in the Internet model.
• The agent executes the request on the network elements and returns responses to the manager.
• The notifications/traps are the unsolicited messages such as alarms, generated by the agent.
• The communication protocol used to transfer information between managed object &
managing processes, as well as between management processes.
• The OSI model uses CMIP along with CMIS. Internet uses SNMP for communication.
• OSI uses both connection oriented and connectionless protocols for transportation. Internet uses
connectionless UDP/IP protocol to transport messages.
• CMIP & SNMP specifies the management communication protocols for OSI & Internet
management respectively.
FUNCTIONAL MODEL
• The functional model component addresses the user-oriented applications, which are formally
specified in the OSI model.
• The functional model consists of 5 sub models: configuration management, fault management,
performance management, security management and accounting management.
b. With block diagram, explain ASN.1 datatype structure and tags. Give example.
[05 Marks]
Structured Type
• A data type is a structured type when it contains other type.
• Types that are within a structured type are called component types. For example ,we can define
all the pages of the book as a collection of individual pages.
i.e. BookPages::=SEQUENCE OF
{
SEQUENCE {ChapterNumber , Separator ,PageNumber}
}
• SET is distinguished from SEQUENCE in 2 respects:
1) The data types should all be distinct and
2) The order of values in SET is of no consequence whereas it is critical in the
SEQUENCE construct.
Tagged Type
• Tagged type is a type derived from another type that is given a new tag id.
• A tagged type is defined to distinguish types within an application.
Other Type
• Other type is a data type that is not predefined.
• This is chosen from CHOICE and ANY types, which are contained in other types.
• Type CHOICE defines the selection of one value from a specified list of distinct types.
c. Explain TLV encoding structure with values of class bits. [03 Marks]
Encoding Structure
• The ASN.1 syntax that contains the management information is encoded using the BER defined
for the transfer syntax.
• The ASCII text data is converted to bit-oriented data.
• Example of encoding structure is TLV which denotes type, length & value components of
structure (Fig: 3.18).
• The type has 3 subcomponents: class, P/C & tag number (Table: 3.6).
Module - 2
3 a. What is Management Information base? Explain MIB Module structure.
[05 Marks]
Management Information base is a virtual information base. Managed objects are accessed via
this virtual information base.
• Objects in the MIB are defined using ASN.1. The objects defined in MIB-2 have the OBJECT
IDENTIFIER
prefix: mib-2 OBJECT IDENTIFIER ::= {mgmt 1}
MIB Structure
For simplicity and extensibility, SMI avoids complex data types. Each type of objects in a MIB
has a name, syntax, and an encoding scheme. An object is uniquely identified by an OBJECT
IDENTIFIER. The identifier is also used to identify the structure of object types. The term
OBJECT DESCRIPTOR may also be used to refer to the object type. The syntax of an object
type is defined using Abstract Syntax Notation One (ASN.1). Basic encoding rules (BER) have
been adopted as the encoding scheme for data type transfer between network entities.
The set of defined objects has a tree structure. Beginning with the root of the object identifier
tree, each object identifier component value identifies an arc in the tree. The root has three
nodes: itu (0), iso (1), and joint-iso-itu (2). Some of the nodes in the SMI object tree, starting
from the root. The identifier is constructed by the set of numbers, separated by a dot that de_nes
the path to the object from the root. Thus, the internet node, for example, has its OBJECT
IDENTIFIER value of 1.3.6.1. It can also be defined as follows:
b. Explain in brief with neat diagram, two tier, three tier and proxy server SNMP
organization model. [06 Marks]
Three-Tier Model
• In 3-tier organization model, the network manager receives data from the managed objects as
well as data from the RMON agent about the managed objects.
• The RMON function has greatly increased the centralized management of networks.
3) The set-request is generated by the management process to initialize or reset the value of an
object variable.
4) The get-response message is generated by an agent process. It is generated only on receipt of a
getrequest, get-next-request or set-request message from a management process.
5) A trap is an unsolicited message generated by an agent process without a message or event
arriving from the manager process.
• The SNMP manager has a database that polls the managed objects for management data. It
contains 2 sets of data: one on the information about the objects, MIB and a second on the values
of the objects, MDB
1) A MIB is a virtual database and is static. In fact, a MIB needs to be there when an
NMS discovers a new object in the network. It is compiled in the manager during the
implementation.
2) A MDB is dynamic and contains the measured values associated with the object. This
is a true database.
It is implemented using any database architecture chosen by the implementers.
The application entity that reside in the management station is called SNMP manager, and the
application entity that reside in the network element is called SNMP agent.. The pairing of these
two entities is called an SNMP Community.
INTERFACES GROUP
• The Interface group contains managed objects associated with the interfaces of a system.
• If there is more than one interface in the system, the group describes the parameters associated
with each interface.
• This specifies the number of interfaces in a network component and the managed objects
associated with each interface.
• Implementation of the Interfaces group is mandatory for all system.
ICMP is a precursor of SNMP and A a part of the TCP/lP suite. It is included In MIB- I and
MIB-II and implementation is mandatory. The ICMP group contains statistics on ICMP control
messages of ICMP and is presented in Figure4.36 and Table 4. 12. The syntax of all entities is
read-only counter. For example, statistics on the number of ping requests (icmp echo request)
sent might be obtained from to counter reading of icmpOutEchoes.
Module - 3
5 a. What is Remote Monitoring? With a figure, explain use of RMON probe.
[06 Marks]
The monitored information gathered & analyzed locally, can be transmitted to a remote network
management station. In such a case, remotely monitoring the network with a probe is referred to
as RMON (Remote Network Monitoring)
• Two remote LANs, one a token ring LAN and another, an FDDI LAN ,are connected to the
backbone network.
The NMS is on the local Ethernet LAN.
• An Ethernet probe is on the Ethernet LAN monitoring the local LAN The FDDI backbone is
monitored by an FDDI probe via the bridge and Ethernet LAN A token ring probe monitors the
token ring LAN. It communicates with the NMS via the routers ,the WAN & the backbone
network The remote FDDI is monitored by the built-in probe on the router. The FDDI probe
communicates with NMS.
• All 4 probes that monitor the 4 LANs and communicate with the NMS are RMON devices.
Advantages:
1) Each RMON device monitors the local network segment and does the necessary analyses.
This relays information in both solicited & unsolicited fashion to the NMS.
For example, RMON could be locally polling the network elements in a segment. If it
detects an abnormal condition such as heavy packet loss or excessive collisions, it sends
an alarm. Because the polling in local, the information is fairly reliable. The local
monitoring and reporting to a remote NMS significantly reduces SNMP traffic in the
network.
2) RMON reduces the need for agents in the network to be visible at all times to the NMS.
3) Monitoring packets such as ICMP pings, may get lost in long-distance communication,
especially under heavy traffic conditions. Such losses may wrongly be interpreted by the NMS
that the managed object is down. RMON pings locally and hence has less chance of losing
packets, thus increasing monitoring reliability.
4) The individual segments can be monitored almost continuously. This capability provides
better statistics and control. Thus a fault can be diagnosed more quickly by the RMON and
reported to the NMS.
5) RMON provides higher network availability for users and greater productivity for
administrators.
• The outputs of the various modules are analyzed & presented in tabular and graphical forms to
the user by the network manager in the NMS.
• The filter group is a cascade of 2 filters. The packet filter filters incoming packets by
performing a Boolean and/or XOR with a mask specified. The filtered packet stream is
considered a channel, and we can make further selections based on the channel mask.
• The filtered outputs may generate either alarms or events, which are reported to the network
manager. The output of the filter group can be stored in the packet capture module for further
analysis by the network manager.
c. Explain four broad band access technology with example. [05 Marks]
Broadband access technology is still ao emerging field. There are four modes of access using
four different technologies. They are Cable, DSL, wireless, and PON.
• Cable Access Network technology uses television transmission facilities and CMs and is
the most widely deployed access network in North America. Cable access network could
be implemented as either on &-way with telephony return or two-way. In the one-way
telephony-return configuration, the downstream signal to the customer traverses the cable
medium. The return upstream signal from the customer premises is carried over the
telephone facilities using a regular modem. Typically, data from a residential customer
arc significantly less than that to the customer and hence this approach of two- or one-
way communication is acceptable.
• The DSL has three different implementations and is generally referred to as xDSL, where
x stands for asymmetric (A), high--speed (H), or very high data rate (V). All are based on
using existing local loop telephone facilities.
• Wireless access technology uses wireless transmission for the downstream link to the
customer site and either wireless or telephony-return for the upstream link from the
customer site. Wireless access network can be implemented either as fixed wireless or
mobile wireless.
• PON technology is technically ready for commercial deployment, but has been delayed
due to business consideration of cost and lack of need for large bandwidth to residential
customers.
Basic operations of the protocol entity involve the following steps as a guide to implementation:
1) The protocol entity that generates the message constructs the appropriate data PDU as an
ASN.1 object.
2) It then passes the ASN.1 object, along with a community name and the transport addresses of
itself and the destination to the authentication scheme.
3) The authentication scheme returns another ASN.1 object.
4) The protocol entity now constructs the message to be transmitted with the version number,
community name and the new ASN.1 object, then serializes it using the BER, and transmits it.
5) The reverse process goes on at the receiver.
6) The message is discarded if error is encountered in any of the steps.
7) A trap may be generated in case of authentication failure.
8) On successful receipt of the message, a return message is generated, if the original message is
a get or set message.
Module-4
7 a. Briefly explain HFC Technology, with neat block diagram. [06 Marks]
All CMs terminate on a server, called the CMTS at the head end. The hybrid optical fiber and
coaxial cable link(HFC) connect the CMs to the CMTS at the head end. The CMTS provides a
number of services to the access network. It is the gateway to the external network from the
access network. It multiplexes and demultiplexes the signals from the CMs 10 interface to the
external network.
As we would expect with tlu~ topology of a broadband LAN, the upstream and downstream
propagation frequencies are different. CMTS performs the frequency conversion.
For example, when a CM wants to communicate with another CM in the same access network,
the signal goes upstream to the CMTS at the head end.
It converted to the downstream carrier frequency by the CMTS and propagated downstream as a
broadcast message. The receiving CM picks up the message by reading the destination address in
the message.
From the above two functions, we notice that CMTS does the function of either routing (to the
external network) or bridging (intra-access network). The CM system developed by some
vendors builds these functions within CMTS. The routing function could also be accomplished
by an external router.
CMTS interfaces with operations support systems that serve the function of managing the access
network. It also supports security and the access controller system to handle the integrity and
security of the access network.
Among all the xDSLs, the asymmetric digital subscriber line (ADSL) is the technology that is
being deployed now in most oft-he world. A simplified access network using ADSL is shown in
Figure and consists of an ADSL transmission unit (ATU) and splitter at each end of the ADSL
line. The ATU acronym bas also been expanded in print as the ADSL transceiver unit as well as
the ADSL 1em1inating unit, although ADSL TR-001 defines it as the ADSL transmission unit.
The ATU the central office is ATU-C and the one at the customer residence is ATU-R.
The ATU is also called the ADSL modem. The data and video signal .from the broadband
network is convened to an analog signal by the ATU-C and multiplexed and demultiplexed. The
splitter at the central office combines the plain old telephone service (POTS) voice signal and the
broadband signal. The reverse process occurs at the splitter and ATU-R at the customer premises
( residence). There are modems available that embed the splitter and thus eliminate a separate
splitter at the customer site. This configuration is referred to as ADSL-Lite, also known as GLite.
b. Briefly explain the role of ADSL access Network in an overall Network with
One oft be main objectives, if not the main objective, in developing SNMPv3 is the addition of
security features to SNMP management. Authentication and privacy of information, as well as
authorization and access controls, have been addressed in SNMPv3 specifications.
SNMPv3 architecture permits flexibility to use any protocol for authentication and privacy of
information. However, the IETF SNMPv3 working group has specified a USM for its security
subsystem. The working group has specified HMAC-MDS-96 and HMAC-SHA-96 as the
authentication protocols. Cipher Block Chaining mode of Data Encryption Standard (CBCDES)
has been adopted for privacy protocol.
Module-5
9 a. Briefly explain ADSL Fault Management with example. [08 Marks]
The ADSL line status shows the current state oft be line as to whether it Is operational, or there is
a loss of any of the parameters on frame, signal. power. or link. It also indicates initialization
errors, Alarms are generated when the preset counter reading exceeds 15 minutes on loss of
signal frame, power, link, and error seconds.
[08 Marks]
b. What is Privacy Enhanced Mail (PEM)? Briefly PEM Process, with neat
diagram. [08 Marks]
Privacy-Enhanced Mail (PEM). Privacy-enhanced mail (PEM) was developed by IETF, and
specifications are documented in RFC 1421-RFC 1424. H is intended to provide PEM using cod-
to-end cryptography between originator and recipient processes [R.FC 1421]. The PEM provides
privacy enhancement services (what else), which are defined as (1) confidentiality, (2)
authentication, (3) message integrity assurance, and ( 4) non repudiation of origin. The
cryptographic key, called the data encryption key (DEK), could be either a secret key or a public
key based on the specific implementation and is thus flexible. however, the originating and
terminating ends must have common agreement (obviously!).
Figure shows three PEM processes defined by IETF: MIC-CLEAR, MIC-ONLY, and
ENCRYPTED based on message integrity and encryption scheme. Only the originating end is
shown. In all three procedures, reverse procedures are used to extract the message and validate
the originator 10 and message integrity. The differences between the three procedures are
dependent on the extent of cryptography used and message encoding.