TNM-SECOND-END-SEM-MAKE-UP-17-18


Birla Institute of Technology & Science, Pilani
Work-Integrated Learning Programmes Division
Second Semester 2017-2018

Comprehensive Examination 
(EC-3 Make-up)

Course No.                   : CSI ZG582
Course Title                  : TELECOM NETWORK MANAGEMENT
Nature of Exam                  : Open Book
Weightage                       : 45%
Duration                          : 3 Hours
Date of Exam                 : 29/04/2018 FN) 
1.       Please follow all the Instructions to Candidates given on the cover page of the answer book.
2.       All parts of a question should be answered consecutively. Each answer should start from a fresh page.  
3.       Assumptions made if any, should be stated clearly at the beginning of your answer. 
               each field.                                                                                              

0000   30 32 02 01 01 04 0b 5b 52 30 5f 43 40 63 74 69
0010   21 5d a2 20 02 04 21 18 2c d7 02 01 00 02 01 00
0020   30 12 30 10 06 08 2b 06 01 02 01 01 03 00 43 04 0030   04 92 6f a4

Q.2.     Answer the following questions.
(a) Using RMON, how could the IT Manager determine if an alarm generated was due to errors in the data link layer, network layer or application layer? What are the
    [6 + 4 = 10]
object ids for the key SNMP objects needed in this analysis? 
           
(b)    Can an Internet Service Provider (ISP) read the contents of an SNMPv3 message
                 [10] 
for which the security model has been enabled? Can
message has been encrypted or not? Can the ISP know whether the message is even SNMP? Discuss.
the ISP conclude that the
                                                                     

Q.3.     Answer the following questions.
(a) The figure below shows a network management environment consisting of a MoM (Manager of Managers) NMS, several agent NMSs that manage individual network domains, and managed network elements. Identify the TMN functions performed
                 [10]
                             by:                                                                                                  [3 x 2 = 6]
(a)              MOM NMS
(b)             Agent NMS
(c)              Managed elements

(b) For the network below, describe, how NMS with model based reasoning (MBR) can be implemented. Describe how failures would be analyzed and reported with
                             MBR.                                                                                                                         [9]

No comments:

Post a Comment