+ All Categories
Home > Documents > VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM...

VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM...

Date post: 17-May-2018
Category:
Upload: trinhdien
View: 230 times
Download: 0 times
Share this document with a friend
15
VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK VI SEMESTER CS6002-NETWORK ANALYSIS AND MANAGEMENT Regulation 2013 Academic Year 2017 18 Prepared by Dr.M.Senthil Kumar, Associate Professor/CSE
Transcript
Page 1: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur – 603 203

DEPARTMENT OF

COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK

VI SEMESTER

CS6002-NETWORK ANALYSIS AND MANAGEMENT

Regulation – 2013

Academic Year 2017 – 18

Prepared by

Dr.M.Senthil Kumar, Associate Professor/CSE

Page 2: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

QUESTION BANK

SUBJECT : CS6002 NETWORK ANALYSIS AND MANAGEMENT

SEM/YEAR: VI/III

UNIT I A system Approach to N/W Design and Requirement Analysis

Introduction, network Service, Service based Networks – System Services, Characterizing the services,

Requirement Analysis. – User requirements, Application Requirements and Host Requirements, Network

Requirements – Guidelines for Networks, Requirements gathering and listing. – Developing Services

metrics to metrics performance – Developing performance threshold – Distinguish between service level

performances – Requirement analysis. Practice-Template – Table and maps-Simplifying the Requirement

analysis-Case Study

PART-A

Q.No Questions BT

Level

Competence

1 Express the Components of the analysis and design process. BTL 2 Understand

2 Analyze the traditional view of a system and draw it. BTL 4 Analyze

3 Define system and draw the generic components of system. BTL 1 Remember

4 List the generation of networking. BTL 1 Remember

5 Describe the network Services. BTL 2 Understand

6 Interpret services characteristics and service levels. BTL 2 Understand

7 Point out the system components and Network services. BTL 4 Analyze

8 Distinguish Service requests and offerings. BTL 2 Understand

9 What are the Service performance requirements? BTL 1 Remember

10 Demonstrate the types of applications. BTL 3 Apply

11 Draw the application delay types and network component interface. BTL 6 Create

12 Explain the four categories of network management tasks. BTL 5 Evaluate

13 Formulate how the Location information is helps to the system? BTL 6 Create

14 State the initial conditions of the design project. BTL 1 Remember

15 Show the IP packet loss as Measurements of reliability using Ping. BTL 3 Apply

16 Define Recoverability. BTL 1 Remember

17 What do you mean by Network propagation delay? BTL 1 Remember

18 Analyze the formula for System Responsiveness and Burstiness. BTL 4 Analyze

19 Illustrate the table for user and application requirements BTL 3 Apply

20

Assess the map for the applications that cover the entire design

environment (A), that cover one campus (B, C, and D), and those that

cover parts of each campus (E,F,G and H)..

BTL 5 Evaluate

PART B

1 i) Explain the goals of Network analysis.(7)

ii) Summarize the characterizing services in detail.(6) BTL 5

Evaluate

2 Describe in detail about User requirements with neat diagram. (13) BTL 1 Remember

3 i) Tabulate the Application Requirements.(7) BTL 1 Remember

Page 3: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

ii) Describe the types of applications, Reliability, capacity, delay and

application groups in detail .(6)

4.

i)Describe the Host requirements in detail.(10)

ii) Label the location dependencies between applications and hosts and

illustrate it.(3)

BTL 1 Remember

5

i)Explain in detail about the Network Requirements with suitable

diagrams.(8)

ii)Summarize the guidelines in distinguishing services.(5)

BTL 2

Understand

6

Explain in detail about the specialized equipment includes equipment

that is location-dependent or specialized in function, or information that

is location -specific. Consider a network that connects a medical library

to hospitals and universities as shown in below figure. What types of

information will be specific to each medical library? What types of

information will be common to all medical libraries? List some possible

difficulties in transferring medical data across such a network. (13)

BTL 4 Analyze

7

i)Illustrate the gathering and listing requirements in detail.(7)

ii)Demonstrate the developing service metrics to Measure

performance.(6)

BTL 3 Apply

8 i)Describe the Characterizing behavior in detail.(4)

ii)Summarize the developing performance thresholds in detail.(9) BTL 2 Understand

9 i) Formulate Capacity Requirements. (8)

ii)Explain about the specified services in detail.(5) BTL 6 Create

10 Illustrate Templates in detail with neat diagram.(13) BTL 3 Apply

11

Describe the following in detail

i)Tables.(7)

ii) Maps. (6)

BTL 1 Remember

12

Analyze the network design for a small business using the following

information.

1. There are no known specific performance requirements for any of the

applications that the company plans on using.

2. The company has offices in Austin, Houston and Dallas/Fort Worth.

3. Applications include database transaction processing, currently based

out of Dallas/fort worth, and a bursty communications package used in

Austin.

4. The goal of this project is to connect these offices with a wide-area

service.

5. This project is expected to cost less than $250k.

Estimates of Capacities:

App A-100 kb/s

App B-70 kb/s

App C-400 kb/s

App D 1.5 Mb/s

No of Hosts at each site:

Austin-25 PCs

Houston-15 PCs

BTL 4 Analyze

Page 4: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

Dallas-17 Pcs(13)

13

Consider the design of a network where you cannot talk to the end

users. What other resources can you use to gather requirements about

the users, applications, hosts, and existing networks? Briefly Explain

outline a method for gathering requirements in the absence of end user

involvement.(13)

BTL 4 Analyze

14

Discuss in detail about how can delay variation impact a traffic flow?

What characteristics of an application indicate that it is sensitive to

delay variation? How can delay variation be measured within the

network?(13)

BTL 2 Understand

PART-C

1 Design the layout for Test and development center of a single building

in Oakland, California which contains five testing centers. BTL6 Create

2.

Classify the Requirement analysis for MAN to allow this organization

to expand to san Francisco and San jose, and a LAN to expand within

the Oakland facility. Connect the LAN at the 1013 building, to their

existing Ethernet and FDDI Networks.

BTL4 analyze

3

Measure the service metrics are used to monitor measure and verify

services in the network and to determine if requirements are being met.

Therefore, service metrics must be meaningful to the network operator,

manager, and/or end users. For example, to verify a service level of 40-

ms round-trip delay, we could use the utility ping and monitor for the

threshold of 40 ms:

For each service level below, describe a service metric that could be

used for measuring the service level, and a corresponding tool or

variable for the metric.

A) Availability between two connected networks, A and B.

B) End –to-end delay between n/w A and a Computing resource on

n/w B.

C) Average traffic rate to/from server C, measured across all

BTL5 Evaluate

Page 5: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

network interfaces on C over 5-minute intervals.

D) End-to-end Path(s) between host X on network A and resource

Y on n/w B.

4

Compose the delay estimates for human response time, interaction

delay and network propagation delay. Give an application example for

each delay estimate. Are there applications that can be bounded by two

of these delay estimates? List examples and explain.

BTL6 Create

UNIT II - Flow Analysis: Concepts, Guidelines and Practice

Background-Flows-Data sources and sinks – Flow Model-Flow Boundaries – Flow distributions-flow

Specifications – Applying the flow model-Establishing the flow boundaries – Developing flow

Specifications – Prioritizing flow dging – Flow analysis process – Examples-Case study.

PART-A

Q.No Questions BT

Level

Competence

1 Show the three common flows in the network design. BTL 3 Apply

2 Analyze about Data sources and sinks. BTL 4 Analyze

3 Examine what is Flows? BTL 3 Apply

4 Tell about types of flow models. BTL 1 Remember

5 Define flow boundaries. BTL 1 Remember

6 Discuss about Flow distribution. BTL 2 Understand

7 Illustrate the requirements for Flow specification. BTL 3 Apply

8 Classify the Performance modifiers. BTL 4 Analyze

9 Contrast the process model for flow analysis with chart. BTL 2 Understand

10 Generalize the data movement with example. BTL 6 Create

11 Tabulate the uses of flow distribution in the network. BTL 1 Remember

12 Formulate the Cooperative –computing flow model for data mining

environment. BTL 6 Create

13 What is Prioritizing flows? BTL 5 Evaluate

14 List out the different ways of simplifying the flow analysis process. BTL 1 Remember

15 Differentiate application service requirement and host service

requirement. BTL 2 Understand

16 What are the steps necessary to get the performance characteristics of

the composite flows? BTL 1 Remember

17 Summarize Guaranteed service. BTL 2 Understand

18 Point out the important feature of the multipart flowspec. BTL 4 Analyze

19 Define Capacity and service planning. BTL 1 Remember

Page 6: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

20 Explain how we can identify data sources and sinks. BTL 5 Evaluate

PART-B

1

i)Discuss in detail about the flows and types of flows in detail?(7)

ii)Describe the Data sources and sinks with suitable applications in

detail.(6)

BTL 2 Understand

2 Illustrate the Flow models with suitable environments like scientific

visualization etc.(13)

BTL 3

Apply

3 i)Describe in detail about the Flow Boundaries?(6)

ii)Examine the flow distributions in detail?(7) BTL 1 Remember

4

i) Generalize on what is Flow specification? What is the algorithm used

for it?(10)

ii) How to modify performance? Explain in detail.(3)

BTL 6 Create

5

Examine the devices can act as both data sources and sinks, depending

on the application and flow. Which of the following would be data

sources and which would be data sinks? Why?

a) A storage device receiving streaming video from a camera.

b) A video editing unit, using video from the above storage

device.

c) A web server and its elements.

d)A storage disk farm.(13)

BTL 1 Remember

6 With suitable example describe the following.

(i)applying the flow models (6) (ii)Establishing flow boundaries.(7) BTL 2 Understand

7

i)Explain in detail about Guidelines for flow distributions.(9)

ii)Explain in detail about the situation when backbone flows are

indicated.(4)

BTL 4 Analyze

8 i)Examine the developing the flow specifications.(7)

ii)Tabulate the prioritizing flows .(6) BTL 1 Remember

9

Describe in detail about how would the data sources and sinks for each

application in the data mining environment(Four Campus W,X,Y,Z)

change if

a) There were no caches in the environment.

b) Data flows were directly between the storage/archival device and the

web servers for each data request, and the web servers updated the

caches after each request was completed.

c)There was only one web server for the environment, located at campus

Z.(13)

BTL 1 Remember

10

Predict the Place for flow boundaries in data mining environment (Four

Campus W, X, Y, Z).try both campus/campus and building/building

boundaries. What does each tell us about the client-server and/ or

cooperative –computing flows in this environment?(13)

BTL 2 Understand

11 Explain the Simplifying the flow analysis process in detail?(13) BTL 5 Evaluate

12 Explain with the examples of Applying Flowspecs.(13) BTL 4 Analyze

13 Summarize the concept of applying cost information to flows with

suitable examples.(13) BTL 4 Analyze

14 Demonstrate how the flowspec can be viewed as a multitiered network BTL 3 Apply

Page 7: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

service hierarchy, where the capacity plan is the most basic service

level, and the service plan describes individual and combined service

requirements and guarantees. How does the flowspec relate to the

network services.(13)

PART-C

1

Design MAN environment for Valliammai Engineering College by

connecting New block, Admin Block and First year Block .show the

flow Analysis of information between them.

BTL6 Create

2

Develop the flow specification of our college, considering a list of the

application, application maps, potential users, flow models, boundaries

and distributions.

BTL4 analyze

3.

Assess the Flows of the given flow diagram.

BTL5 Evaluate

4

Create a network for an online transaction processing (OLTP)

environment. Their current environment is a mainframe that has several

terminals connected to it, either directly or through a terminal server.

They are moving to a cooperative computing environment, where there

will be multiple regional database servers acting in a client server

fashion and updating each other’s regions via a database manager as

shown in figure. show the probable data sources and sinks for both

environments. How does migrating from the mainframe environment to

the cooperative –computing environment modify the traffic flows in the

system? In what ways does the new environment improve the traffic

flows? What are some of the trade-offs between the two environments-

for example, in security, management, simplicity, ease of use,

performance cost?

BTL6 Create

Page 8: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

UNIT III Logical Design

Background-Design goals – Developing criteria for technology evolution – Shared medium-switching and

routing – Hybrid routing/Switching mechanisms – Applying interconnection mechanism to design -

Integrating Network Management and Security to Design- Defining Network Management- Designing the

Manageable Resources- Network Management and Security plan-Case Study.

PART-A

Q.No Questions BT

Level

Competence

1 Express the process for design of the logical network. BTL 2 Understand

2 How to establishing design goals of the network? BTL 2 Understand

3 Tabulate the relationships between capacity and service plans. BTL 1 Remember

4 Define NBMA. BTL 1 Remember

5 Discuss the two important characteristics between NBMA and broadcast

technologies. BTL 2 Understand

6 Give the asymmetric flows in a network and draw it. BTL 2 Understand

7 What is Capacity upgrade path? List out the uses of it. BTL 1 Remember

8 Assess the problems in designing network size and segments. BTL 5 Evaluate

9 State the black box method. BTL 1 Remember

10 Compose the interconnection mechanisms in the network. BTL 6 Create

11 Classify switching and routing. BTL 4 Analyze

12 Illustrate the shared medium and planned hierarchy in network. BTL 3 Apply

13 Assess the four categories of Network management. BTL 5 Evaluate

14 Define Monitoring and metering. BTL 1 Remember

15 Show the parameters to monitor for instrumentation methods. BTL 3 Apply

16 Explain effective security. BTL 4 Analyze

17 What are the two common security philosophies? BTL 1 Remember

18 Show What are the effects of security risk analysis? BTL 3 Apply

19 Analyze Contingency plans. BTL 4 Analyze

20 Generalize the steps in developing management and security plans. BTL6 Create

PART-B

Page 9: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

1 Discuss establishing design goals in detail. (13)

BTL 2 Understand

2 Describe in detail about the making technology choices for the

design.(13) BTL 1 Remember

3 Examine in detail about the developing criteria for technology

evaluation.(13) BTL 1 Remember

4

Create your answers for the following primary design goals; list at least

three secondary or derivative goals. Explain your answers.

a)Minimizing WAN costs

b)simplifying network troubleshooting

c) Scaling the network.

-From LAN to WAN.(13)

BTL 6

Create

5 i)Explain shared medium mechanism with suitable example.(7)

ii)Discuss the comparison and contrast of switching and routing.(6) BTL 1 Remember

6 i)Summarize on switching.(7)

ii) Discuss about ATM switching.(6) BTL 2 Understand

7

Explain briefly the following

i)routing (5)

ii)Hybrid switching/routing mechanisms.(8)

BTL 4 Analyze

8 Summarize the applying interconnection mechanisms to the

design.(13) BTL 5 Evaluate

9 Demonstrate briefly about the network elements and

characteristics.(13) BTL 3 Apply

10 Explain the architectural issues in network management with

diagrams.(13)

BTL 4

Analyze

11

Discuss the following.

i)security policies(6)

ii)Security risk analysis(7)

BTL 2 Understand

12 Analyze the various security mechanisms available today in detail.(13) BTL 4 Analyze

13

i)Describe in detail about different types of firewalls used in

Security. (7)

ii)Examine the distributed host security in detail.(6)

BTL 1 Remember

14 Illustrate the Network management and security plans in detail.(13) BTL 3 Apply

PART-C

1

Create a case study for maximize performance for the network,

particularly for those flows that contain the mission-critical and real

time applications.

BTL6 Create

2

Infer the case study to improve the reliability by using the redundant

paths between and within campuses and redundant network hardware at

each campus.

BTL4 analyze

3

Evaluate the case study to decide whether we will use in band or out-of-

band monitoring, as well as centralized of distributed monitoring. And

also determine the requirements and flows for our data.

BTL5 Evaluate

4

Plan the new capacities for the backbone flows. What Scaling factors

should you use on these backbone capacities by using two backbones

(BB1 and BB2) connect three regions of the network.

BTL6 Create

Page 10: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

UNIT IV Network Design-Physical, Addressing and Routing

Introduction-Evaluating cable plant design options – Network Equipment Placements – Diagramming

Physical Design – Diagramming the worksheet-Case study – Introduction to addressing and Routing –

Establishing the Route flow in design – Manipulating the Route flow – Developing Address strategies –

Developing Routing strategies-Case study.

PART-A

Q.No Questions BT

Level

Competence

1 How the design of the physical network process. BTL 2 Understand

2 Illustrate the two wiring schemes of design. BTL 3 Apply

3 List how the level of redundancy wiring in a campus. BTL 1 Remember

4 Analyze the environmental components in a design. BTL 4 Analyze

5 Define the rules of thumb for placing network equipment. BTL 1 Remember

6 Define the hub placement and cruft. BTL 1 Remember

7 What is the placement strategy used in switches? BTL 2 Understand

8 State the role of circuit level equipment placement. BTL 1 Remember

9 Differentiate leaf sites and tail sites. BTL 2 Understand

10 Show the diagram for class 1,2 and 3 tail sites. BTL 3 Apply

11 Assess the common elements of a tag of coding scheme. BTL 5 Evaluate

12 What is Coding schemes and Demarcation points? BTL 1 Remember

13 Write the process for adding addressing and routing to the design. BTL 6 Create

14 Explain functional areas. BTL 5 Evaluate

15 What is Default route? BTL 1 Remember

16 Express Route filtering. BTL 2 Understand

17 Formulate the Route Aggregation and peering. BTL 6 Create

18 Categorize subnetting and subnet mask. BTL 4 Analyze

19 Compare RIP and OSPF. BTL 4 Analyze

20 Demonstrate the procedure for applying routing protocols. BTL 3 Apply

PART-B

1 What is Physical plant and describe how evaluating cable plant design

options in network? (13) BTL 1 Remember

2 Describe in detail about Network equipment placement.(13) BTL 2 Understand

Page 11: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

3 Discuss on diagramming the physical design in detail with suitable

example.(13) BTL 2 Understand

4 Describe in detail about diagramming worksheets with suitable

examples.(13) BTL 1 Remember

5 Illustrate in detail about establishing routing flows in the design

environment.(13) BTL 3 Apply

6 i) Formulate the structure of Route flow manipulation .(7)

ii)Describe in detail about default route propagation.(6) BTL 6 Create

7 i) Analyze the route filtering in the networks.(8)

ii) Explain in detail about Route aggregation.(5) BTL 4

Analyze

8

Explain in detail about the following.

i) Peering(5)

ii)Policies and policy enforcement(8)

BTL 5 Evaluate

9

i)Analyze how the IP addressing provides a logical network counterpart

to the physical network addressing.(7)

ii)Classify the subnetting address masking in detail with example.(6)

BTL 4 Analyze

10 Describe in detail about Variable-length subnetting with suitable

example.(13)

BTL 1

Remember

11 i) Explain the supernetting in detail.(8)

ii)What are the difference between subnetting and supernetting.(5) BTL 4 Analyze

12 Describe how to apply addressing strategies in the network using

suitable examples.(13) BTL 1 Remember

13

i)List some of the routing algorithm configured in the network

design.(3)

ii)Illustrate in detail about RIP,OSPF.andBGP-4(10)

BTL 3 Apply

14 Discuss the procedure to choose, combine and applying routing

protocols.(13) BTL 2 Understand

PART-C

1

Create your justifications for given choice.

a)An expressway

b)An airport runway

c) A park, owned and operated by the company

In these options, which would you recommend when the area

between buildings A/B/C and D(Area 51).

BTL6 Create

Page 12: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

2

Point out how should redundant connectivity be provided using the

single CO? Using Cos, at different locations?

Given:

The company desires redundancy to its service provider. They currently

connect to one central office (CO) of the service provider. Given that the

communication building(C) is the main point of entry for outside

communications (such as the service provider), and that the computing

building (A) is the termination point of all the high performance

communications and the focal point of the entire network.

BTL4 analyze

3

Decide what would be required to turn the backup connection from hot-

standby mode to a fully operational, load –sharing mode.

Given:

Many design environments are requiring redundant access to the

internet, with the backup connection either in a hot-standby mode or an

operational mode. using BGP-4,outline a strategy for providing a backup

connection to the internet, where the connection is in hot-standby mode.

Given Figure shows what the primary and standby connections would

look alike.

BTL5 Evaluate

Page 13: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

4

Create the plan for separating the design into functional areas, develop

the list of routing protocols available for the design and recommend a

routing protocol as the candidate routing protocol for this network based

on the levels of hierarchy and redundancy in the MAN.

BTL6 Create

UNIT V Network Management and SNMP Protocol Model Network system management - Network system management platforms – Current SNMP broadband and

TMN Environment – Network management Standards Version 1 & 2.– Structure of Management

Information – SNMP V2-MIB-SNMP v2 protocol - SNMP v3 Arch, Application, MIB- Security based

security model- Access control RMON.

PART-A

Q.No Questions BT

Level

Competence

1 Formulate the goals of Network management and define OAMP. BTL 6 create

2 Predict the challenges of Network managers. BTL 2 Understand

3 State the network provisioning. BTL 1 Remember

4 Compare the any two network management standards. BTL 4 Analyze

5 Describe the salient features of TMN. BTL 1 Remember

6 What are the OSI network management models? BTL 1 Remember

7 What is the role of intermediate layer in three tier configuration. BTL 1 Remember

8 Summarize how the MIB is used by agent and management process. BTL 5 Evaluate

9 Give some examples of information that can be stored in MIB. BTL 2 Understand

Page 14: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

10 Analyze How can we use Management Information tree. BTL 4 Analyze

11 Integrate the five parameters defined in managed object in the internet. BTL 6 Create

12 Define structure of management information. BTL 1 Remember

13 Demonstrate the SNMP version1. BTL 3 apply

14 What are data types used in SNMP? BTL 1 Remember

15 Point out the major changes in SNMP v2. BTL 4 Analyze

16 Show the key features of SNMPv3. BTL 3 Apply

17 Illustrate the security threats in network management. BTL 3 Apply

18 Assess RMON. BTL 5 Evaluate

19 Express how the RMON MIB framework works. BTL 2 Understand

20 Differentiate RMON2 from RMON. BTL 2 Understand

PART-B

1 i) What does the network management do, explain it? (7)

ii) List the network management functional groupings. (6) BTL 1 Remember

2 i)Describe the Network management functional flow chart?(7)

ii)Explain Network management Architecture.(6) BTL 1 Remember

3 Discuss in detail about SNMP current broadband.(13) BTL 2 Understand

4

i)How will the Network system management works in different

platforms?(6)

ii)Summarize in detail about Network management in TMN

environment.(7)

BTL 2 Understand

5 Classify the salient features of network management standards in

detail.(13) BTL 4 Analyze

6

Demonstrate the following in detail

i) OSI Network Management model.(7)

ii)Organization model.(6)

BTL 3 Apply

7 i)Discuss about Management information tree.(7)

ii)Describe in detail about managed object perspective.(6) BTL 1 Remember

8 Illustrate the structure of management information in detail .(13) BTL 3 Apply

9 Evaluate SNMP version 2 system architecture in detail with suitable

structures.(13) BTL 5 Evaluate

10 Formulate the SNMPv2 Management information base with suitable

example.(13) BTL 6 Create

11

Analyze the following in detail

i)SNMPv3 documentation architecture.(7)

ii)Abstract service interfaces.(6)

BTL 4 Analyze

12 i)Analyze the applications of SNMPv3.(7)

ii)Discuss about SNMPv3 MIB.(6) BTL 4

Analyze

13

i)Describe in detail about the security model .(7)

ii)Examine the Authentication protocols in detail.(6)

BTL 1 Remember

14 i) Discuss in detail about Access Control in Network management. (7)

ii)Express in detail about RMON with network configuration.(6) BTL 2 Understand

Page 15: VALLIAMMAI ENGINEERING COLLEGE Semester/CS6002-Network... · VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur ... 17 What do you mean by Network propagation ... Examine the

PART-C

1

You are establishing a small company with your network managed by a

network management system. Compose an example of each of the five

functional applications with that you would implement.

BTL6 Create

2

Analyze which MIB group contains this information for the technician

to find out the physical location of the component, when a network

manager discovers that a network component is performing poorly and

issues as order to the technician to replace it. Justify your answer.

BTL4 analyze

3 Rank the factors required to implement SNMP to manage the network

in your institution. Justify your answer with suitable example. BTL5 Evaluate

4

Create a Case study on internet traffic using RMON in your institution

based on growth rate, traffic pattern and develop the plan to find out the

top five domain of users and top most sites used.

BTL6 Create


Recommended