SlideShare a Scribd company logo
1 of 1
Download to read offline
Question 1 What updates have been brought by snmpv2 to SNMPv1 communication
architecture?
Question 2 How SNMPv3 enhances security compared to SNMPv2?
Question 3 a) Define RMON b) What are the benefits of RMON ?
Question 4 As a network manager, you are responsible for the operation of a network. You
notice heavy traffic in a host that is on a TCP/IP network and want to find out the details:
a) What basic network monitoring tool(s) would you use?
b) What would you look for in your results?
Question 5 What is the difference between nslookup & dig? Question No. 5 Install wireshark and
capture IP packets on your Ethernet interface.
a) Put a screenshot of IP packets captured on your device.
b) Analyze their headers and contents. bonus for analysis)
Solution
Question 1
Answer
SNMPv1 (Simple Network Management Protocol) v1 was designed as a short term solution to
allow management of TCP/IP - based internets. Although it was simple there were some major
issues in SNMPv1, viz Expressiveness of MIB definitions, performance and security issues.
Some key differences brought in SNMPv2 are:
· Protocol operations used in SNMPv1 are Get, GetNext, put and Trap. SNMPv2 define
two additional set of rules option GetBulk and Inform.
· catch PDU format is dissimilar than other PDU’s format in SNMPv1. In version 2, trap
PDU format is same as the arrangement of get and put PDU’s.
· In SNMPv1, if in a get demand one of the object instance in multiple-attribute request
does not exist or is invalid, no response would be known, only an mistake message would go
back. In SNMPv2, in such a situation, response would go back for all other thing example or
attributes apart from the invalid value i.e. partial response would be there quite than mistake.

More Related Content

Similar to Question 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdf

SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker Project
Praveen Mathews
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
MOHD ARISH
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
useonlyfortech140
 
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
tamicawaysmith
 

Similar to Question 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdf (20)

SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker Project
 
Networking in the Cloud for Enterprises
Networking in the Cloud for EnterprisesNetworking in the Cloud for Enterprises
Networking in the Cloud for Enterprises
 
Netw 208 Success Begins / snaptutorial.com
Netw 208  Success Begins / snaptutorial.comNetw 208  Success Begins / snaptutorial.com
Netw 208 Success Begins / snaptutorial.com
 
Troubleshooting for Intent-based Networking
Troubleshooting for Intent-based NetworkingTroubleshooting for Intent-based Networking
Troubleshooting for Intent-based Networking
 
cogiel-OLT.pdf
cogiel-OLT.pdfcogiel-OLT.pdf
cogiel-OLT.pdf
 
Ike Al Pres on 5G and 5G Advanced selected Capabilities to LF Edge Akraino Su...
Ike Al Pres on 5G and 5G Advanced selected Capabilities to LF Edge Akraino Su...Ike Al Pres on 5G and 5G Advanced selected Capabilities to LF Edge Akraino Su...
Ike Al Pres on 5G and 5G Advanced selected Capabilities to LF Edge Akraino Su...
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via FirewallIRJET- SDN Simulation in Mininet to Provide Security Via Firewall
IRJET- SDN Simulation in Mininet to Provide Security Via Firewall
 
SDL Based Validation of a Node Monitoring Protocol
SDL Based Validation of a Node Monitoring Protocol SDL Based Validation of a Node Monitoring Protocol
SDL Based Validation of a Node Monitoring Protocol
 
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOLSDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
SDL BASED VALIDATION OF A NODE MONITORING PROTOCOL
 
Pushing Packets - How do the ML2 Mechanism Drivers Stack Up
Pushing Packets - How do the ML2 Mechanism Drivers Stack UpPushing Packets - How do the ML2 Mechanism Drivers Stack Up
Pushing Packets - How do the ML2 Mechanism Drivers Stack Up
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
 
Wi fi-security-the-details-matter
Wi fi-security-the-details-matterWi fi-security-the-details-matter
Wi fi-security-the-details-matter
 
Project report
Project reportProject report
Project report
 
Unit 5.1 network 2.pptx
Unit 5.1 network 2.pptxUnit 5.1 network 2.pptx
Unit 5.1 network 2.pptx
 
LTE Network structure
LTE Network structure LTE Network structure
LTE Network structure
 
Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
272018 Review Test Submission Lab 8 Quiz – 2018_...http.docx
 

More from boothlynntur11512

In C program, how to write two short programs one which hides a sho.pdf
In C program, how to write two short programs one which hides a sho.pdfIn C program, how to write two short programs one which hides a sho.pdf
In C program, how to write two short programs one which hides a sho.pdf
boothlynntur11512
 
explain in details, auditing and its importanceSolutionANSWER.pdf
explain in details, auditing and its importanceSolutionANSWER.pdfexplain in details, auditing and its importanceSolutionANSWER.pdf
explain in details, auditing and its importanceSolutionANSWER.pdf
boothlynntur11512
 
Discuss the differences between attributes and characteristics of sy.pdf
Discuss the differences between attributes and characteristics of sy.pdfDiscuss the differences between attributes and characteristics of sy.pdf
Discuss the differences between attributes and characteristics of sy.pdf
boothlynntur11512
 
Define the terminology (10 words) common to the immune system and th.pdf
Define the terminology (10 words) common to the immune system and th.pdfDefine the terminology (10 words) common to the immune system and th.pdf
Define the terminology (10 words) common to the immune system and th.pdf
boothlynntur11512
 
Create two linked lists each having eight nodes…..the first list has.pdf
Create two linked lists each having eight nodes…..the first list has.pdfCreate two linked lists each having eight nodes…..the first list has.pdf
Create two linked lists each having eight nodes…..the first list has.pdf
boothlynntur11512
 
Chrome File Edit View History Bookmarks People Window He.pdf
Chrome File Edit View History Bookmarks People Window He.pdfChrome File Edit View History Bookmarks People Window He.pdf
Chrome File Edit View History Bookmarks People Window He.pdf
boothlynntur11512
 
Chapter 12 Information Systems, Read this book Computer Science Illu.pdf
Chapter 12 Information Systems, Read this book Computer Science Illu.pdfChapter 12 Information Systems, Read this book Computer Science Illu.pdf
Chapter 12 Information Systems, Read this book Computer Science Illu.pdf
boothlynntur11512
 
Write a Java program that creates a drawing area of appropriate size.pdf
Write a Java program that creates a drawing area of appropriate size.pdfWrite a Java program that creates a drawing area of appropriate size.pdf
Write a Java program that creates a drawing area of appropriate size.pdf
boothlynntur11512
 

More from boothlynntur11512 (20)

Lean methodology as it is practiced today can be traced back to Mot.pdf
Lean methodology as it is practiced today can be traced back to  Mot.pdfLean methodology as it is practiced today can be traced back to  Mot.pdf
Lean methodology as it is practiced today can be traced back to Mot.pdf
 
is about coping with complexity andis about coping with c.pdf
is about coping with complexity andis about coping with c.pdfis about coping with complexity andis about coping with c.pdf
is about coping with complexity andis about coping with c.pdf
 
In C program, how to write two short programs one which hides a sho.pdf
In C program, how to write two short programs one which hides a sho.pdfIn C program, how to write two short programs one which hides a sho.pdf
In C program, how to write two short programs one which hides a sho.pdf
 
How important is cloud for GraybarSolution You may have.pdf
How important is cloud for GraybarSolution You may have.pdfHow important is cloud for GraybarSolution You may have.pdf
How important is cloud for GraybarSolution You may have.pdf
 
give me a list of positive risk factors for a charitySolutiont.pdf
give me a list of positive risk factors for a charitySolutiont.pdfgive me a list of positive risk factors for a charitySolutiont.pdf
give me a list of positive risk factors for a charitySolutiont.pdf
 
explain in details, auditing and its importanceSolutionANSWER.pdf
explain in details, auditing and its importanceSolutionANSWER.pdfexplain in details, auditing and its importanceSolutionANSWER.pdf
explain in details, auditing and its importanceSolutionANSWER.pdf
 
Discuss the differences between attributes and characteristics of sy.pdf
Discuss the differences between attributes and characteristics of sy.pdfDiscuss the differences between attributes and characteristics of sy.pdf
Discuss the differences between attributes and characteristics of sy.pdf
 
Define the terminology (10 words) common to the immune system and th.pdf
Define the terminology (10 words) common to the immune system and th.pdfDefine the terminology (10 words) common to the immune system and th.pdf
Define the terminology (10 words) common to the immune system and th.pdf
 
Describe five robot application areas for vision systems. (Select fiv.pdf
Describe five robot application areas for vision systems. (Select fiv.pdfDescribe five robot application areas for vision systems. (Select fiv.pdf
Describe five robot application areas for vision systems. (Select fiv.pdf
 
Cousin Vinnie is a shareholder and an employee in the family busines.pdf
Cousin Vinnie is a shareholder and an employee in the family busines.pdfCousin Vinnie is a shareholder and an employee in the family busines.pdf
Cousin Vinnie is a shareholder and an employee in the family busines.pdf
 
Create two linked lists each having eight nodes…..the first list has.pdf
Create two linked lists each having eight nodes…..the first list has.pdfCreate two linked lists each having eight nodes…..the first list has.pdf
Create two linked lists each having eight nodes…..the first list has.pdf
 
Chrome File Edit View History Bookmarks People Window He.pdf
Chrome File Edit View History Bookmarks People Window He.pdfChrome File Edit View History Bookmarks People Window He.pdf
Chrome File Edit View History Bookmarks People Window He.pdf
 
Chapter 12 Information Systems, Read this book Computer Science Illu.pdf
Chapter 12 Information Systems, Read this book Computer Science Illu.pdfChapter 12 Information Systems, Read this book Computer Science Illu.pdf
Chapter 12 Information Systems, Read this book Computer Science Illu.pdf
 
×y Connect nect Securehttpsnewcon connect.html 11.pdf
×y Connect nect Securehttpsnewcon connect.html 11.pdf×y Connect nect Securehttpsnewcon connect.html 11.pdf
×y Connect nect Securehttpsnewcon connect.html 11.pdf
 
You are instructing a class of high school students on different wir.pdf
You are instructing a class of high school students on different wir.pdfYou are instructing a class of high school students on different wir.pdf
You are instructing a class of high school students on different wir.pdf
 
Write a Java program that creates a drawing area of appropriate size.pdf
Write a Java program that creates a drawing area of appropriate size.pdfWrite a Java program that creates a drawing area of appropriate size.pdf
Write a Java program that creates a drawing area of appropriate size.pdf
 
Why is it that bacterial ribosomes can begin translation before mRNA .pdf
Why is it that bacterial ribosomes can begin translation before mRNA .pdfWhy is it that bacterial ribosomes can begin translation before mRNA .pdf
Why is it that bacterial ribosomes can begin translation before mRNA .pdf
 
Which of the statements below is FALSE 1 Common stocks ownership c.pdf
Which of the statements below is FALSE 1 Common stocks ownership c.pdfWhich of the statements below is FALSE 1 Common stocks ownership c.pdf
Which of the statements below is FALSE 1 Common stocks ownership c.pdf
 
Which of the following is NOT part of the information about foreign o.pdf
Which of the following is NOT part of the information about foreign o.pdfWhich of the following is NOT part of the information about foreign o.pdf
Which of the following is NOT part of the information about foreign o.pdf
 
What is the yield curve Why is the yield curve considered a leading.pdf
What is the yield curve Why is the yield curve considered a leading.pdfWhat is the yield curve Why is the yield curve considered a leading.pdf
What is the yield curve Why is the yield curve considered a leading.pdf
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Question 1 What updates have been brought by snmpv2 to SNMPv1 commun.pdf

  • 1. Question 1 What updates have been brought by snmpv2 to SNMPv1 communication architecture? Question 2 How SNMPv3 enhances security compared to SNMPv2? Question 3 a) Define RMON b) What are the benefits of RMON ? Question 4 As a network manager, you are responsible for the operation of a network. You notice heavy traffic in a host that is on a TCP/IP network and want to find out the details: a) What basic network monitoring tool(s) would you use? b) What would you look for in your results? Question 5 What is the difference between nslookup & dig? Question No. 5 Install wireshark and capture IP packets on your Ethernet interface. a) Put a screenshot of IP packets captured on your device. b) Analyze their headers and contents. bonus for analysis) Solution Question 1 Answer SNMPv1 (Simple Network Management Protocol) v1 was designed as a short term solution to allow management of TCP/IP - based internets. Although it was simple there were some major issues in SNMPv1, viz Expressiveness of MIB definitions, performance and security issues. Some key differences brought in SNMPv2 are: · Protocol operations used in SNMPv1 are Get, GetNext, put and Trap. SNMPv2 define two additional set of rules option GetBulk and Inform. · catch PDU format is dissimilar than other PDU’s format in SNMPv1. In version 2, trap PDU format is same as the arrangement of get and put PDU’s. · In SNMPv1, if in a get demand one of the object instance in multiple-attribute request does not exist or is invalid, no response would be known, only an mistake message would go back. In SNMPv2, in such a situation, response would go back for all other thing example or attributes apart from the invalid value i.e. partial response would be there quite than mistake.