TNM-FIRST-MID-SEM-REGULAR-17-18



Birla Institute of Technology & Science, Pilani
Work-Integrated Learning Programmes Division
First Semester 2017-2018
Mid-Semester Test  (EC-2 Regular)

Course No.                  : SS ZG582/ CSI ZG582  
Course Title                 : TELECOM NETWORK MANAGEMENT 
Nature of Exam           : Closed Book
Text Box: No. of Pages        = 2
No. of Questions = 6
Weightage                    : 30%

Duration                      : 2 Hours 
Date of Exam              : 24/09/2017    (FN)
Note:
1.       Please follow all the Instructions to Candidates given on the cover page of the answer book.
2.       All parts of a question should be answered consecutively. Each answer should start from a fresh page. 
3.       Assumptions made if any, should be stated clearly at the beginning of your answer.

Q.1.        Compare and contrast hubs, bridges, switches and routers, in 3 aspects of their functionality/behavior. Present your answer in a tabular format as given below.    [6]

Functionality/Aspect
Hubs
Bridges
Switches
Routers
















Q.2.        Refer the table given below. The partial MIB definition of ipAddrEntry is given below. The key for the table is the 1st column (IP address) and the OID for ipAddrEntry is 1.3.6.1.2.1.4.20.1.                                                             [5]

Partial MIB Definition
IpAddrEntry ::=
    SEQUENCE {
        ipAdEntAddr IpAddress,
        ipAdEntIfIndex INTEGER,
        ipAdEntNetMask IpAddress,
        ipAdEntBcastAddr INTEGER,
        ipAdEntReasmMaxSize
            INTEGER (0..65535)
    }
 
 









Table Entries
No
ipAdEntAddr
ipAdEntIfIndex
ipAdEntNetMask
ipAdEntBcastAddr
ipAdEntReasmMaxSize
1
127.0.0.1
1
255.0.0.0
1
65535
2
192.168.1.102
9
255.255.255.0
10
1024
3
192.168.88.1
14
255.255.255.0
100
1800
4
192.168.254.1
20
255.255.255.0
1000
1500

(a)             What would be the OID of the cells given below:
a.       2nd row, 3rd column                      b. 4th row, 2nd column
(b)             What will be the output of doing an snmpgetnext command on the following attributes:
a.       3rd row, 1st column                          b. 4th row, 2st column
(c)             What is the output of executing the following SNMP commands on the above table:
                                i.            snmpbulkget -v2c -Cn1 -Cr3 -c public localhost ipAdEntAddr.127.0.0.1
                              ii.            snmpbulkget -v2c -Cn1 -Cr3 -c public localhost ipAdEntAddr.127.0.0.1 ipAdEntIfIndex.127.0.0.1
                            iii.            snmpbulkget -v2c -Cn1 -Cr3 -c public localhost ipAdEntAddr.127.0.0.1 ipAdEntIfIndex.127.0.0.1 ipAdEntNetMask.127.0.0.1
Q.3 (a)          What are the reasons SNMP is over UDP?
Q.3 (b)          What backup mechanisms do network management systems use to make up for potential loss of SNMP messages?
Q.3 (c)          Can SNMP be implemented over TCP?                                                [2+2+1=5]

Q.4.        How are the following mechanisms used by network management systems to address scaling issues caused by the need to monitor large amounts of MIB variables?                                                                                              [4]   
(a)             Manager of Manager model
(b)             Different polling intervals for different attributes

Q.5.        Explain the SNMP v3 architecture with a block diagram. Explain in brief the functionality of each block in the block diagram.                                                     [6]   

Q.6.        Consider a device with components A, B and C, and exhibits the following behavior.                                                                                                       [4]

(a)             The device is “out of service” if all of its components A, B and C are “out of service”. And vice versa, if all of A, B and C are “out of service”, then the device is “out of service”.
(b)             The device is “impaired” if some of its components are “out of service” and the rest are “in service”, and vice versa.
(c)             The device is “in service” if all of its components are “in service”, and vice versa.

The network management system managing the device has to show the status of the device and each of the components. Explain how rule-based event correlation is applied in the following cases, by answering the below 2 questions for each event (a) through (d):
                                i.            Will the network management system generate poll requests in response to the trap?
                              ii.            If yes, what will be polled? If not, why not?
Events:
a)      Initial condition: Device is “in service”.
Event: The device sends a trap indicating it is “impaired”.

b)      Initial condition: Device is “in service”.
Event: The device sends a trap indicating it is “out of service”.

c)      Initial condition: Device is impaired, with A being “impaired”; B and C being “out of service”.
Event: Device sends a trap that A is “out of service”.

d)     Initial condition: Device is “out of service”.
Event: Device sends traps, indicating that A and B are “in service”. 

***********



No comments:

Post a Comment