You are on page 1of 8

Introduction to computer network- Topology; Base Band & Broad Band;

Guided & Unguided Media.

Overview of Data & Signal Bits. Baud & Bit Rate. Modulation (AM, PM, FM);
Multiplexing (TDM, FDM, STDM).

Encoding (RZ, NRZ, BIPLOAR, MANCHESTER, DIFF. MANCHESTER).


Digital To Analog ASK, PSK, FSK, QPSK.

Transmission methods Synchronous & Asynchronous, Flow Control, Error Control,


Error Detection methods.

Goals of Layered protocols- Introduction to OSI, TCP/IP, IBM, SNA, ATM.

Bit oriented (BSC) & Character oriented Protocol (SDLC, LAPB, LAPD, LLC)
HDLC- frame format, station, states, configuration, access control.

LAN Topology Ethernet (IEEE 802.3), Token Bus (IEEE 802.4), Token Ring (IEEE 802.5)
Introduction to WAN DQDB (IEEE 802.6) & FDDI.

Switching Technologies Circuit, Message, and Packet.

X.25, X.21, RS-232 C frame format, channel, packet frames, facilities (In brief Only).

ISDN- D channel, B-Channel, International Standards, NT1, NT2, TA, TE Devices.

Introduction to leased lines, DSL, Digital Carriers.

Bridging & Routing Static & Dynamic (In Brief).

IP, IP addressing, ICMP, ARP.RARP.

Congestion Control, TCP, UDP.

HTTP,FTP,Telnet,SMTP.

Introduction to data security (private key, public key, ISO standards).

Introduction to Mobile technology (Topology, FDM, TDM, CDMA), Satellite


Communication (LEO, GEO, TDM).

The area of the Earths surface from which an Earth Station can transmit to or receive from a particular
satellite. 7/18/2014 6:37:54 PM 9 FOOTPRINT
Q. Explain IP routing. How does it take place.
b) Flow control at transport layer
c) IP subnetting

11. a) Describe and compare the following routing algorithms


i) Shortest path routing
ii) Flooding

b) What is Foot Print ?

b) Five channels, each with a 100 kHz bandwidth, are to be multiplexed together. What is the
minimum bandwidth of the link if there is a need for a guard band of 10 kHz between the
channels to preventinterference ?

c) How does a router work in an internetwork ? Differentiate between static and dynamic
routers. List some common routing protocols. 5 + 5 + 5

Q. Explain the operation of Simple Network Management Protocol (SNMP).

Simple Network Management Protocol (SNMP) is an applicationlayer protocol defined by the Internet
Architecture Board (IAB) for exchanging management information between network devices. It is a
part of Transmission Control Protocol Internet Protocol (TCPIP) protocol suite.

SNMP is one of the widely accepted protocols to manage and monitor network elements. Most of the
professionalgrade network elements come with bundled SNMP agent. These agents have to be
enabled and configured to communicate with the network management system (NMS).

SNMP basic components and their functionalities


SNMP consists of

SNMP Manager
Managed devices
SNMP agent
Management Information Database Otherwise called as Management Information Base (MIB)

SNMP Manager:
A manager or management system is a separate entity that is responsible to communicate with the
SNMP agent implemented network devices. This is typically a computer that is used to run one or
more network management systems.

SNMP Managers key functions

Queries agents
Gets responses from agents
Sets variables in agents
Acknowledges asynchronous events from agents

Managed Devices:
A managed device or the network element is a part of the network that requires some form of
monitoring and management e.g. routers, switches, servers, workstations, printers, UPSs, etc...

SNMP Agent:
The agent is a program that is packaged within the network element. Enabling the agent allows it to
collect the management information database from the device locally and makes it available to the
SNMP manager, when it is queried for. These agents could be standard (e.g. Net-SNMP) or specific to
a vendor (e.g. HP insight agent)

SNMP agents key functions

Collects management information about its local environment


Stores and retrieves management information as defined in the MIB.
Signals an event to the manager.
Acts as a proxy for some nonSNMP manageable network node.
Basic SNMP Communication Diagram
Management Information database or Management Information Base
(MIB)
Every SNMP agent maintains an information database describing the managed device parameters.
The SNMP manager uses this database to request the agent for specific information and further
translates the information as needed for the Network Management System (NMS). This commonly
shared database between the Agent and the Manager is called Management Information Base (MIB).

Typically these MIB contains standard set of statistical and control values defined for hardware nodes
on a network. SNMP also allows the extension of these standard values with values specific to a
particular agent through the use of private MIBs.

In short, MIB files are the set of questions that a SNMP Manager can ask the agent. Agent collects
these data locally and stores it, as defined in the MIB. So, the SNMP Manager should be aware of
these standard and private questions for every type of agent.
The Simple Network Management Protocol (SNMP) is a framework for managing devices
in an internet using the TCP/IP protocol suite. It provides a set of fundamental operations for
monitoring and maintaining an internet.
SNMP uses the concept of manager and agent. That is, a manager, usually a host, controls
and monitors a set of agents, usually routers.

SNMP is an application-level protocol in which a few manager stations control a set of


agents. The protocol is designed at the application level so that it can monitor devices
made by different manufacturers and installed on different physical networks. In other
words, SNMP frees management tasks from both the physical characteristics of the
managed devices and the underlying networking technology. It can be used in a
heterogeneous internet made of different LANs and WANs connected by routers or
gateways made by different manufacturers.

Managers and Agents A management station, called a manager, is a host that runs the
SNMP client program. A managed station, called an agent, is a router (or a host) that runs
the SNMP server program. Management is achieved through simple interaction between a
manager and an agent. The agent keeps performance information in a database. The
manager has access to the values in the database. For example, a router can store in
appropriate variables, the number of packets received and forwarded. The manager can
fetch and compare the values of these two variables to see if the router is congested or not.
The manager can also make the router perform certain actions. For example, a router can
periodically check the value of a reboot counter to see when it should reboot itself. It
reboots itself, for example, if the value of the counter is 0. The manager can use this
feature to reboot the agent remotely at any time. It simply sends a packet to force a 0
value in the counter.

Agents can also contribute to the management process. The Server program running on
the agent can check the environment and, if it notices something unusual, it can send a
warning message (called a trap) to the manager.

In other words, management with SNMP is based on three basic ideas.

1. A manager checks an agent by requesting information that reflects the behavior of the agent.
2. A manager forces an agent to perform a task by resetting values in the agent database.
3. An agent contributes to the management process by warning the manager of an unusual situation.
Components Management in the Internet is achieved not only through the SNMP
protocol but also by using other protocols that cooperate with SNMP. At the top level,
management is accomplished with two protocols.

1. Structure of management information (SMI)


2. Management information base (MIB)

SNMP uses the services provided by these two protocols to do its job. In other words,
management is a team effort by SMI, MIB, and SNMP. All three use other protocols such
as abstract syntax notation l (ASN 1) and basic encoding rules (BER).

SMI - The SMI is a component used in network management. Its functions are to name
objects, to define the type of data that can be stored in an object, and to show how to
encode data for transmission over the network.

MIB - The management information base (MIB) is the second component used in
network management. Each agent has its own MIB, which is a collection of all the objects
that the manager can manage. The objects in the MIB are categorized under eight
different groups. They are, system, interface, address translation, ip, icmp, tcp, udp, and
egp.

Each group has defined variables and/ or tables.

SNMP defines five messages: GetRequest, GetNextRequest, SetRequest, GetResponse,


and Trap.

Get Request: This message is sent from the manager (client) to the agent (server) to
retrieve the value of a variable.

GetNextRequest This message is sent from the manager to the agent to retrieve the value
of a variable.
The retrieved value is the value of the object, following the defined object in the message.
It is mostly used to retrieve the values of the entries in a table. If the manager does not
know the indexes of the entries, it cannot retrieve the values. However, it can use
GetNextRequestand define the object.

GetResponse This message is sent from an agent to a manager in response to GetRequest


and GetNextRequest. It contains the value of the variable(s) requested by the manager.
SetRequest This message is sent from the manager to the agent to set (store) a value in a
variable.

Trap This message is sent from the agent to the manager to report an event. For example,
if the agent is rebooted, it inf0rms the manager and reports the time of rebooting.

b) ATM is a connection-oriented, scalable, and flexible with guaranteed QOS, a virtual circuit
packet switching technology that imposes no speed limitations and supports different types of
data. Justify all the terms used in the above statement.

5 b) What are the different classes of addresses used in IPv4 ? List their ranges in dotted
decimal notation.

5 c) Why is frequency modulation superior to amplitude modulation ?

b) Compare the following : Firewall and Proxy.

c) Explain the concept of framing with respect to Data Link Layer. 3

d) A bit word 1011 is to be transmitted. Construct the even parity seven-bit hamming code
for this data.

10. a) What is MAC address ?


b) What is Channelization ? Briefly explain CDMA method.
d) What is Hamming distance ?

You might also like