BIRLA
INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI
WORK
INTEGRATED LEARNING PROGRAMMES
COURSE
HANDOUT
Part A: Content Design
Course Title
|
Telecom Network Management
|
Course No(s)
|
SS
ZG582/ CSI ZG582
|
Credit Units
|
5
|
Credit Model
|
1: Class Room Hours
2: Students Preparation
2: Case Studies/Lab
(1 credit unit translates to approximately
32 hours)
|
Course Author
|
Anita Ramachandran
|
Version No
|
1.1
|
Date
|
Nov
9, 2017
|
Text Book(s)
T1
|
Mani
Subramanian, Network Management:
Principles and Practice, 2nd edition, Pearson
|
Reference Book(s) & other resources
R1
|
Stallings, W., SNMP, SNMPv2, SNMPv3, and RMON 1 and 2,
|
R2
|
Divakara K. Udupa, TMN Telecommunications Management Network, McGraw-Hill
Professional Pub., 1999
|
R3
|
SNMP RFCs 1157, 1905, 2571,
2572, 2573
|
R4
|
http://net-snmp.sourceforge.net
|
Glossary of Terms
Module
|
M
|
Module is a standalone quantum of designed content. A typical course is
delivered using a string of modules. M2 means module 2.
|
Recorded Lecture
|
RL
|
A recorded lecture will consist of a sequence of topic recordings
(typically less 10 minutes each). There will be assessments between topic
recordings to allow the learner test his/her understanding of video material
previously viewed.
RL2.1 = Recorded Lecture 1 in module 2.
|
Contact session
sub-module/topics
|
CS
|
Contact session topics refer to topics in form of concepts, discussions
items, problems which will be taken up by the course instructor during the
contact hours. A contact hours is built by stringing a bunch of contact
session topics.
|
Homework
|
HW
|
Specific problems/design/lab exercises assigned as homework.
|
Lab Exercise
|
LE
|
Lab exercises
|
Modular Content Structure
No
|
Title of the Module
|
Ref.#
|
M1
|
Data Communications and Network Management Overview
|
T1, Ch
1
|
M2
|
Network Technology
|
T1; Ch 2
|
M3
|
Network Management:
Standards, Models & Language
|
T1; Ch 3
|
M4
|
SNMPv1
|
T1; Ch 4, 5
Relevant RFCs
|
M5
|
SNMPv2
|
T1; Ch 6
Relevant RFCs
|
M6
|
SNMPv3
|
T1; Ch 7
Relevant RFCs
|
M7
|
Lab
|
http://elearn
.bits-pilani.ac.in
R4
|
M8
|
Network Management
Tools, RMON
|
T1; Ch 9, 8
|
M9
|
Network Management
Applications Overview & Event Correlation Techniques
|
T1; Ch 11
|
M10
|
Network
Management Systems and Engineering
|
T1; Ch 9
|
M11
|
OSI
Model, TMN
|
T1; Ch 10
Relevant standards
|
M12
|
Broadband
Network Management
|
T1; Ch 12, 13
Relevant standards
|
M13
|
Advanced
Management Concepts
|
T1; Ch 16
|
M14
|
Case
Studies
|
Instructor Supplied Material
|
Detailed Structure
Introductory Video/Document: << Introducing the faculty, overview of the
course, structure and organization of topics, guidance for navigating the
content, and expectations from students>>
▪
Each of the
sub-modules of Recorded Lectures
(RLx.y) shall delivered via 30 – 60mins
videos followed by:
▪
Contact session (CSx.y) of 2Hr each for Illustrating the concepts discussed in the
videos with exercises, tutorials and discussion on case-problems (wherever
appropriate); contact sessions (CS) may cover more than one recorded-lecture
(RL) videos.
Course Contents
Type
|
Title
|
Description
|
M1: Data
Communications and Network Management Overview
|
||
RL1.1
|
Data
Communications and Network Management Overview
|
RL1.1
Data Communications and Network Management Overview
This introductory module talks about data and telecom
Networks, distributed computing environment, TCP/IP based networks. This
module is intended to be a recap of basic networking fundamentals.
|
RL1.2
|
Communication
Standards and Protocols
|
RL 1.2Communication Standards and
Protocols
This sub-module explains why communication protocols are required, in
the context of interoperability. Also provides a brief overview of OSI and
Internet models.
|
RL1.3
|
Networks,
Systems & Services
|
RL 1.3Networks, Systems & Services
Introduces the
concepts of network elements, services, broadband networks, and provides a
brief explanation of broadband network technologies. This sub-module
introduces the need for network management by identifying some common network
problems. This sub-module also touches upon the goals of network management,
common challenges in network management and introduces the students to a
high-level architecture of network management systems,
|
M2: Network
Topology
|
||
RL 2.1
|
Network
Topologies
|
RL 2.1Network Topologies
This module describes the network topologies for LANs and WANs, brief
recap on how Ethernet works, the different Ethernet technologies, and other
Layer-2 technologies like switched Ethernet, VLANs, Token Ring, FDDI and
WLAN.
|
RL 2.2
|
Network Node
Components
|
RL 2.2 Network Node Components
This sub-module
talks about the different components in a network – hubs, bridges, switches,
routers, gateways, protocol converters, edge routers etc. An explanation of
the different transmission technologies is given. It also talks about the
various network elements needed for different technologies like GSM, CDMA,
DOCSIS, PON etc.
|
CS 1.0
|
|
Discuss the
fundamentals of networking concepts, network topologies, advantages and
disadvantages of each, and the different aspects of L2 and L3 network
elements. At the end of this session, students should have had a high level
understanding of the different network technologies and the various network
elements that constitute them, so that they are able to appreciate the need
for and the goals of network management.
|
M3:
Network
Management: Standards, Models & Language
|
||
RL 3.1
|
NM Standards,
Models & Language Overview
|
RL 3.1NM Standards, Models &
Language Overview
Having
introduced the need of network management in M1 & M2, this sub-module
describes in detail what network management is, and at a high level, how it
is done. It then talks about the need for standards and protocols in network
management, and describes some models in more detail.
|
RL 3.2
|
Organization
& Information Models
|
RL 3. 2Organization & Information
Models
This sub-module
describes the organization and information models for network management.
Introduces the concepts of manager, agent, managed object, and the different
types of organization model.
|
RL 3.3
|
Communication
&Functional Models
|
RL 3. 3Communication & Functional
Models
This sub-module
describes the communication and functional models for network management.
Provides a brief overview of ASN.1, and explains a MIB definition. It then
talks about the functional model for network management to introduce the
concepts of FCAPS.
|
M4: SNMPv1
Organization & Information Models
|
||
RL 4.1
|
SNMPv1
Organization Model
|
RL 4.1SNMPv1 Organization Model
In this module,
SNMP is introduced as an example of a network management protocol. This
sub-module talks about the SNMP organization model,
|
RL 4.2
|
SNMPv1
Information Model
|
RL 4.2SNMPv1 Information Model
In this
sub-module, how SNMP identifies a managed object, and how information is
represented for exchange between SNMP entities is explained. Describes scalar
and tabular objects.
|
RL 4.3
|
SNMP v1 MIBs
|
RL 4.3SNMP v1 MIBs
This sub-module
takes a more detailed look at some standard SNMP MIBs.
|
CS 2.0
|
|
Explain the
relevance of interoperability with examples from real deployment scenarios,
and thus the need for network management standards and protocols. Explain why
we need communication, functional, organization and information models and
what come under the purview of each. Introduce SNMP as one of the network
management protocols.
|
LE 1.0
(To be done as
HW)
|
|
1.
Install Net-SNMP. Configure it as given in the user
manual.
2.
Install a graphical MIB browser like SnmpB.
3.
Load the various MIBs and understand the capabilities
of the MIB browser.
|
M5: SNMPv1
Protocol Operations
|
||
RL 5.1
|
SNMPv1
Communication & Functional Models
|
RL 5.1SNMPv1 Communication &
Functional Models
This sub-module
describes the different SNMP messages for communication between SNMP
entities, and explains community strings/profile. Also describes the
functional model from an FCAPS perspective.
|
RL 5.2
|
SNMPv1 Protocol
Operations
|
RL 5.2SNMPv1 Protocol Operations
This sub-module
describes the SNMP protocol stack, different SNMP message formats, and how
these messages are exchanged between SNMP entities.
|
CS 3.0
(To be done in
class as LE 2.0)
|
|
Examine
Wireshark captures of SNMP messages between agents and managers, to explain
the SNMP protocol stack and what the fields in these messages represent.
|
M6: SNMPv2 &
SNMPv3
|
||
RL 6.1
|
SNMPv2
|
RL 6.1SNMPv2
This sub-module
describes the disadvantages of SNMPv1, and the need for SNMP v2. It
highlights the major differences between SNMPv1 and SNMPv2, and explains the
SNMPv2 protocol operations in detail.
|
RL 6.2
|
SNMPv3
|
RL 6.2SNMPv3
This sub-module
describes the need for SNMPv3, its architecture and applications.
|
RL 6.3
|
SNMPv3 Security
Model
|
RL 6.3SNMPv3 Security Model
This sub-module
recaps some common security threats, and explains the enhanced security
features of SNMPv3.
|
LE 3.0
(To be done as
HW)
|
|
1.
Try out various SNMP commands supported by Net-SNMP.
2.
Configure Net-SNMP for SNMPv3, and examine the SNMPv3
messages using Wireshark.
|
CS 4.0
|
|
Explain the
evolution of SNMP. Examine the protocol operation and message structures
(using Wireshark captures) of SNMPv2 and SNMPv3 messages. Understand the
aspects of SNMPv3 that provides it with strong security features. Evaluate
SNMP with respect to its strengths and weaknesses in today’s networking
environments.
|
M7: Network
Management Lab
|
||
RL 7.1
|
|
RL 7.1 Lab
Net-SNMP demo
|
RL 7.2
|
|
RL 7.2 Lab
SNMP MIB
browser
|
RL 7.3
|
|
RL 7.3Lab
Network
management tools, utilities
|
LE 4.0
(To be done as
HW)
|
|
1.
Install MRTG. Run it for some time and observe the
graphs produced by the tool.
2.
Set up Net-SNMP in a networked environment, and
exchange SNMP messages across different computers.
|
M8: Network
Management Tools, RMON
|
||
RL 8.1
|
Network
Management Tools
|
RL 8.1 Network Management Tools
This sub-module
provides an overview of some system utilities, network routing and traffic
monitoring tools for network management. Also mentions some free and
commercially available NM tools.
|
RL 8.2
|
RMON
|
RL 8.2RMON
This sub-module
talks about what RMON is, some RMON MIBs, and the advantages that network
operators get by deploying it.
|
RL 8.3
|
Lab
|
RL 8.3 Lab – MRTG
|
CS 5.0
|
Lab
|
Demo session
for Net-SNMP and MRTG
|
LE 5.0
|
Lab
|
Students are
expected to attend the session with Net-SNMP and MRTG running on their
computers. At the end of this session, students are expected to understand
how SNMP works in terms of information representation and exchange and how
simple applications like MRTG can be built over SNMP.
|
M9: Network
Management Applications
|
||
RL 9.1
|
NM Applications
Overview (FCAPS)
|
RL 9.1NM Applications Overview
(FCAPS)
This sub-module
takes a closer look at what FCAPS entails. Also explains the significance of
service and policy management in network management.
|
RL 9.2
|
Event
Correlation Techniques
|
RL 9.2Event Correlation Techniques
This sub-module
explains the different event correlation techniques used in network
management software. The approaches covered are rule based reasoning, model
based reasoning, case based reasoning and state transition graph model.
|
CS 6.0
|
|
Explain the
commonly used tools/utilities for network management. Give examples of
commercially available tools, the features they provide and market leaders in
this domain.
Explain the
significance of FCAPS, and the role that even correlation techniques play in
the development of network management systems, with examples from the
software industry.
|
M10: Network
Management Systems and Engineering
|
||
RL 10.1
|
NM Systems
& Engg-1
|
RL 10.1 NM
Systems & Engg-1
This sub-module
module explains some software design/architecture aspects of network
management systems. It covers MIB engineering in particular, in terms of what
aspects to keep in mind while designing a MIB for a network element, and the
various components of a typical network management software architecture.
|
RL 10.2
|
NM Systems
& Engg-2
|
RL 10.2 NM
Systems & Engg-2
This sub-module
explains the various modules of a network management server, aspects of data
collection in performance management and factors to consider while designing
the polling functionality in a network management server. Also covers the
various aspects of accounting and security management.
|
M11:
Telecommunication Management Network (TMN)
|
||
RL 11.1
|
OSI Model
|
RL 11. 1 OSI
Model
This sub-module
covers the network management model from an OSI perspective, and details how
the OSI is similar to and different from the Internet model.
|
RL 11.2
|
Telecommunication
Management Network (TMN)
|
RL 11.2
Telecommunication Management Network (TMN)
This sub-module
talks about the evolution of TMN, and why it was needed. This explains the
functional, physical and information architecture recommended by TMN
standards.
|
RL 11.3
|
TMN Logical
Layered Architecture
|
RL 11.3 TMN
Logical Layered Architecture
This sub-module
is dedicated to the logical layered architecture recommended by TMN. It
explains each layer in detail, and the significance of service management and
business management layers.
|
CS 7.0
|
|
Understand the
software architecture/design aspects of a network management systems.
Introduce the need for TMN, how it integrates into the deployments of network
management systems and what value it provides for network operators. At the
end of this module, students are expected to have understood not just the
information exchange and processing aspects of network management protocols,
but also the service and business aspects associated with it, and how network
operators derive meaningful decisions from the plethora of information
collected by managers via SNMP/other NM protocols.
|
M12: Broadband
Network Management
|
||
RL 12.1
|
Broadband
Network Management – MPLS
|
RL 12.1
Broadband Network Management – MPLS
This sub-module
explains the concept of MPLS, how packets are transmitted in an MPLS network,
and the advantages that this technology provides us with.
|
RL 12.2
|
Broadband
Network Management MPLS Network Management
|
RL 12.2
Broadband Network Management MPLS Network Management
Having looked
at the basics of MPLS, this sub-module explains the various network
management aspects of an MPLS network.
|
RL 12.3
|
Broadband
Network Management - Access Networks HFC
|
RL 12.3
Broadband Network Management - Access Networks HFC
This sub-module
gives an overview of HFC/DOCSIS network, the components that make up an HFC
network and how network management is done in an HFC network. It also
describes IPDR as a potential alternative to SNMP-based network management.
|
RL 12.4
|
Broadband
Network Management - Access Networks PON
|
RL 12.4
Broadband Network Management - Access Networks PON
This sub-module
gives an overview of PON network, the components that make up a PON network,
how network management is done in a PON network and the role of the OAM sublayer
in EPON management.
|
RL 12.5
|
Broadband
Network Management - Access Networks ADSL
|
RL 12.5
Broadband Network Management - Access Networks ADSL
This sub-module
gives an overview of ADSL network, the components that make up an ADSL
network, how network management is done in an ADSL network and the different
parameters for fault, config and performance management.
|
CS 8.0
|
|
Discussion on
various broadband access technologies, and their network management
techniques. At the end of this module students are expected to have widened
their understanding of network management – they should realize that there is
more to network management that just SNMP.
|
M13: Advanced
Management Topics
|
||
RL 13.1
|
Advanced
Management Concepts-CORBA
|
RL 13.1
Advanced Management Concepts-CORBA
This sub-module
covers CORBA-based network management technology.
|
RL 13.2
|
Advanced
Management Concepts-XML
|
RL 13.2
Advanced Management Concepts-XML
This sub-module
covers XML-based network management technology, and XML-based approaches to network
management.
|
RL 13.3
|
Advanced
Management Concepts-Other Topics
|
RL 13.3
Advanced Management Concepts-Other Topics
This sub-module
gives a brief overview of Over The Air Provisioning, Software Defined
Networking and IP Detail Record as alternate/emerging technologies for
network management. The intent of this session is to make the students
familiar with some of the recent advances in network management.
|
CS 9.0
|
|
Overview of
alternatives to SNMP for network management. At the end of this module, students
are expected to be familiar with some of the recent advances in network
management.
|
M14: Case Studies
|
||
RL 14.1
|
Case Study 1
|
RL 14.1 Case
Study 1
A hypothetical
case study covering the role of each layer in the logical layered
architecture, in network management. Explains how raw data collected by the
lowest layer is refined, correlated with other data and presents meaningful
information to the operator.
|
RL 14.2
|
Case Study 2
|
RL 14.2 Case Study 2
Another hypothetical case study covering the role of each layer in the
logical layered architecture, in network management.
|
CS 10.0
|
|
Discuss the
case studies, and any other questions that students may have.
|
Part B: Course Handout
Academic Term
|
Second Semester
2017-2018
|
Course Title
|
Telecom Network Management
|
Course No
|
SS ZG582/ CSI ZG582
|
Lead Instructor
|
Anand Kumar
|
Course Objectives:
No
|
Course Objective
|
CO1
|
Provide overview of network management principles,
practices and technologies for managing telecommunication and computer communication
networks and services
|
CO2
|
Explain the theoretical and practical aspects of
network management, from the perspectives of software design and network
operations.
|
CO3
|
Outline the concepts related to FCAPS, SNMP, RMON, monitoring
tools and new trends in the network management domain
|
CO4
|
Illustrate network management concepts with case studies and
examples from industry
|
Learning Outcomes:
No
|
Learning Outcomes
|
LO1
|
Students shall gain ability to appreciate the network
management principles applies in various networks and organizations
|
LO2
|
Students shall be able to demonstrate the usage of one or
more network management tools to perform simple network management operations
|
LO3
|
Given a network management problem that an NOC could be
faced with, students shall be able to analyse the problem, explain possible
scenarios that could have led to the problem, and design solutions to address
the same at the operations and business management level
|
LO4
|
Students shall be able to explain and compare alternate
technologies for network management used in different broadband access
networks
|
Course Description
This
course covers a recap of networking fundamentals, the goals and challenges of
network management, the need for standards and protocols in this domain,
SNMPv1/v2/v3, network management applications, event correlation techniques,
network management software systems architecture and design considerations,
TMN, broadband network management, advanced management concepts. It also covers
lab sessions on Net-SNMP and network monitoring tools/utilities.
Teaching Methodology (Flipped Learning Model)
The
pedagogy for this course is centered around flipped learning model in which the
traditional class-room instruction is replaced with recorded lectures to be
watched at home as per the student’s convenience and the erstwhile home-working
or tutorials become the focus of classroom contact sessions. Students are
expected to finish the home works on time.
Course Delivery
▪ There
are 10 Contact Sessions (of 2 hours each)--5 before mid-semester and 5
post-mid-semester over a period of 20 weeks with alternate weeks for
home-watching of Recorded Lectures
▪ The
students are expected to watch the prescribed Recorded Lectures (RLs) before
attending the above Contact Sessions
Contact Session Plan
o Each Module (M#) covers
an independent topic and module may encompass more than one Recorded Lecture
(RL).
o Contact Sessions (2hrs each week) are scheduled alternate
weeks after the student watches all Recorded Lectures (RLs) of the specified
Modules (listed below) during the previous week
o In the flipped learning
model, Contact Sessions are meant for in-classroom discussions on cases,
tutorials/exercises or responding to student’s questions/clarification--- may
encompass more than one Module/RLs/CS topic.
o
Contact Session topics listed in course structure (numbered CSx.y) may cover several RLs; and as per the pace of
instructor/students’ learning, the instructor may take up more than one CS
topic during each of the below sessions.
Contact
Session
|
Topics
|
Ref Modules
|
Pre-contact Session prep
|
During Contact Session
|
1
|
Data
Communications and Network Management Overview, Network Topology
|
M1, M2
|
RL 1.1, RL 1.2, RL 1.3
RL 2.1, RL 2.2
|
CS 1.0
|
2
|
Network Management: Standards, Models & Language, SNMPv1 Organization & Information Models
|
M3, M4
|
RL 3.1, RL 3.2, RL 3.3
RL 4.1, RL 4.2, RL 4.3
|
CS 2.0
|
3
|
SNMPv1
Protocol Operations
|
M5
|
HW 1.0
RL 5.1, RL 5.2
|
CS 3.0
|
4
|
SNMPv2
& SNMPv3
|
M6
|
HW 2.0
RL 6.1, RL 6.2, RL 6.3
|
CS 4.0
|
5
|
Network
Management Lab, RMON, Network Management Tools & Applications
|
M7, M8
|
HW 2.0
RL 7.1, RL 7.2, RL 7.3
|
CS 5.0,
Pre-Mid
Review
|
Review: All topics covered till date
|
M1 ➔ M6
|
All RLs in
M1➔M6
|
||
6
|
Network
Management Applications
|
M9
|
HW 3.0
RL 8.1, RL 8.2
RL 9.1, RL 9.2
|
CS 6.0
|
7
|
Network Management Systems and Engineering, TMN
|
M10, M11
|
RL 10.1, RL 10.2
RL 11.1, RL 11.2, RL 11.3
|
CS 7.0
|
8
|
Broadband Network Management
|
M12
|
RL 12.1, RL 12.2, RL 12.3, RL 12.4, RL 12.5
|
CS 8.0
|
9
|
Advanced Management Topics
|
M13
|
RL 13.1, RL 13.2, RL 13.3
|
CS 9.0
|
10
|
Discussion
of case studies
|
M14
|
RL 14.1, RL 14.2
|
CS 10.0,
Pre-Compre
Review
|
All topics in syllabus / covered
till date
|
M1 ➔ M14
|
All RLs
in M1 ➔ M14
|
Select Topics and Case Studies from business for experiential learning
For the below lab topics, refer TMN lab capsules -
the link for the same can be obtained from the WILP CS&IS Lab Setup
Instruction Manual located at http://elearn.bits-pilani.ac.in
Topics No.
|
Select
Topics in Syllabus for experiential learning
|
Access URL
|
1
|
a.
Install net-snmp on
your computer.
b.
Use the various
SNMP CLI commands to read the IF-MIB on your computer.
c.
Record the results
with screenshots.
|
|
2
|
a.
Configure and run
snmpd and snmptrapd.
b.
Use net-snmp
commands to walk through the IF-MIB on your laptop.
c.
Record the results
with screenshots.
d.
Install and
configure snmptrapd.
e.
Use CLI commands to
generate traps.
f.
Record the results
with screenshots.
|
|
3
|
a.
Install a graphical
MIB browser (like SnmpB).
b.
Load the various
MIBs on your computer.
c.
Browse the MIBs and
observe the values for each of the SNMP operations for scalar and tabular
attributes.
d.
Record the results
with screenshots.
|
|
3
|
Find out from the
Internet how IPDR is used for network management; support output with
screenshots & statistical data.
|
-
|
4
|
Design considerations
for a metamodel/MIB for any device (eg: wireless AP, TV, mobile phone, router
etc), given its characteristics
|
-
|
Evaluation Scheme
Legend: EC = Evaluation Component
No
|
Name
|
Type
|
Duration
|
Weight
|
Day, Date, Session, Time
|
EC-1
|
Quiz-1
|
Online
|
-
|
5%
|
February 1 to 10, 2018
|
Quiz-2
|
Online
|
-
|
5%
|
March 1 to 10, 2018
|
|
Assignment 1
|
Online
|
-
|
15%
|
March 20 to 30, 2018
|
|
EC-2
|
Mid-Semester Test
|
Closed Book
Lab: Will also be tested in Midsem Test
|
2 hours
|
30%
|
04/03/2018 (FN) 10 AM – 12 Noon
|
EC-3
|
Comprehensive Exam
|
Open Book
|
3 hours
|
45%
|
22/04/2018 (FN) 9 AM – 12 Noon
|
Note - Evaluation components can be
tailored depending on the proposed model.
Note to faculty: For sample assignment questions, refer Computer
Networking Courses LabExercises.doc
Important Information:
Syllabus for Mid-Semester Test (Closed Book): Topics in Weeks
1-7
Syllabus for Comprehensive Exam (Open Book): All topics given in
plan of study
Evaluation Guidelines:
1.
EC-1 consists of two
quizzes and one assignment. Announcements regarding the same will be made in a
timely manner.
2.
For Closed Book tests: No
books or reference material of any kind will be permitted. Laptops/Mobiles of
any kind are not allowed. Exchange of any material is not allowed.
3.
For Open Book exams: Use
of prescribed and reference text books, in original (not photocopies) is
permitted. Class notes/slides as reference material in filed or bound form is
permitted. However, loose sheets of paper will not be allowed. Use of
calculators is permitted in all exams. Laptops/Mobiles of any kind are not
allowed. Exchange of any material is not allowed.
4.
If a student is unable to
appear for the Regular Test/Exam due to genuine exigencies, the student should
follow the procedure to apply for the Make-Up Test/Exam. The genuineness of the
reason for absence in the Regular Exam shall be assessed prior to giving
permission to appear for the Make-up Exam. Make-Up Test/Exam will be conducted
only at selected exam centres on the dates to be announced later.
It shall be the
responsibility of the individual student to be regular in maintaining the
self-study schedule as given in the course handout, attend the lectures, and
take all the prescribed evaluation components such as Assignment/Quiz,
Mid-Semester Test and Comprehensive Exam according to the evaluation scheme
provided in the handout.
Keep on Posting such great blog network management
ReplyDeleteBlog is very well written data center security solutions
ReplyDeleteExcellent managed hosting services
ReplyDeleteAn informative and engaging blog that provides valuable insights and practical tips. managed security services
ReplyDeleteTelecom Signaling Penetration Testing ensures the robustness of communication networks. By probing vulnerabilities in signaling protocols, this essential cybersecurity process helps safeguard against potential threats, ensuring uninterrupted and secure telecommunication services. Safeguard your telecom infrastructure with precise testing services experts penetration testing services for enhanced reliability and peace of mind.
ReplyDeleteIn the ever-evolving landscape of telecommunications, understanding the role of robust web hosting solutions in ensuring network availability and reliability is increasingly crucial, making this course handout even more relevant.
ReplyDelete