The document discusses data communication and network management. It covers topics like telephone network models, data transmission modes, OSI reference model layers, TCP/IP protocols, and more. Key points include:
- Telephone networks use a hierarchical model with switches at different levels and trunks connecting switches.
- Data can be transmitted digitally or analog, via circuit-switched, message-switched, or packet-switched modes.
- The OSI reference model defines 7 layers of protocols with physical, data link, network, transport, session, presentation and application layers.
- TCP/IP is a suite of protocols that use IP for addressing and routing and TCP or UDP for transport with TCP providing reliable connections
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
These slides cover a topic on Multiplexing in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
These slides cover a topic on Multiplexing in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
Analyze the Customer Requirements
Characterize the Existing Network and Sites
Design the Network Topology and Solutions
Design a Network Topology
Design a Model for Network Layer Addressing and Naming
Select the Switching and Routing Protocols
Network Security Design
Network Management Design
Optimize the Network Design
Select Technologies and Devices
Test the Network Design
Document the Network Design
Overview of UDP protocol.
UDP (User Datagram Protocol) is a simple extension of the Internet Protocol services. It basically provides simple packet transport service without any quality of service functions.
Unlike TCP, UDP is connection-less and packet-based. Application PDUs (application packets) sent over a UDP socket are delivered to the receiving host application as is without fragmentation.
UDP is mostly used by applications with simple request-response communication patterns like DNS, DHCP, RADIUS, RIP or RPC.
Since UDP does provide any error recovery such as retransmission of lost packets, the application protocols have to take care of these situations.
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections (data links) between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as WiFi.
The term network is defined as a set of computers of different types, terminals, telephones, and other communication equipments, connected by data communication links, which allow the network components to work together. The network components may be located within a small area or spread over many remote locations. In any case, data communications hold the network together.
The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add and remove simulated network devices as they see fit.
Analyze the Customer Requirements
Characterize the Existing Network and Sites
Design the Network Topology and Solutions
Design a Network Topology
Design a Model for Network Layer Addressing and Naming
Select the Switching and Routing Protocols
Network Security Design
Network Management Design
Optimize the Network Design
Select Technologies and Devices
Test the Network Design
Document the Network Design
Overview of UDP protocol.
UDP (User Datagram Protocol) is a simple extension of the Internet Protocol services. It basically provides simple packet transport service without any quality of service functions.
Unlike TCP, UDP is connection-less and packet-based. Application PDUs (application packets) sent over a UDP socket are delivered to the receiving host application as is without fragmentation.
UDP is mostly used by applications with simple request-response communication patterns like DNS, DHCP, RADIUS, RIP or RPC.
Since UDP does provide any error recovery such as retransmission of lost packets, the application protocols have to take care of these situations.
Increasing network efficiency by preventing attacks at access layereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
CSS L12 STRUCTURE OF COMPUTER NETWORK
At the end of this learning module the students will be able to . . .
○ Discuss the client and servers functions in computer networking.
○ Understand the concept of Network Protocol
○ Enumerate and classify computer networking topologies.
Introduction
Distributed Operating system
Evaluation of distributed computing system
Models
Gaining Popularity
Operating system
Issues in designing DOS
DCE
DCE component
Computer networks
Network types
Lan Technologies
tan technologies
wan technologies
WAN Switching Techniques
Communication Protocols
Protocols for DOS
Internetworking
Interconnection technique
Network management techniques
ATM technologies
A computer network is network of computer .It connects multiple computer in manner to enable meaningful transmission and exchange of data among them.Main objective of CN is sharing of information ,resources and processing load among the connected computer.
you can easily get basic introduction of COMPUTER NETWORK
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Introduction to AI for Nonprofits with Tapp Network
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
1.
2. NETWORK MANAGEMENT SYSTEMS
1
CHAPTER 1: DATA COMMUNICATION &
NETWORK MANAGEMENT OVERVIEW
1>The architecture of the telephone network is hierarchical (true/false)__________
2>In telephone network model, there are ____levels of network switches and ____types of trunks that connect
these switches (3/5/5)
3>__________is a logical link between two switches that may traverse one or more physical links (loop/trunk)
4>In telephone network model, the end office is the __________in the hierarchy (lowest/highest)
5>figure 1.1__________
6>Match the following
Regional center : class 4 switch
Sectional center : class 5 switch
Primary center : class 1 switch
Toll center : class 3 switch
End office : class 2 switch
7>In telephone network model, the customer's telephone or PBX which is a switch on the customer premises , is
connected to the end office via a dedicated link called___________ (trunk/loop)
8>Toll switches carry long distance calls (true/false)___________
9>DDD stands for___________
10>In telephone network model, _______ (DET/DDD)network enables up to dial the far end telephone w/o an
operator’s assistance, comprises___ transmission trunks (2/3/4)
11>Match the following
direct trunk :connects any two toll offices
toll connecting trunk :connects an end office to any toll office
toll (internal) trunks :connects two end offices
12>In telephone network model , a circuit connection is set up
a: directing using a local trunk
b: via the higher level switches and routes
Ans :__________ (a/b/either)
13>In telephone network model, primary and secondary routes are already programmed into the___________
(bridge/switch)
14>Operations support systems ensure the quality of service in the telephone network (true/false)___________
15>The quality of the call, measured in terms of SNR is measured regularly by a trunk maintenance
system________ (true/false)
16>NOC stands for__________
17>For a given region, there is ___________where the global status of the network is monitored (PBX/NOC)
18>___________is the nerve center of telephone network operations (PBX/NOC)
19>The telephone network is managed from the perspective o_________ (service provider/user)20>In telephone
network, with the emphasis on the users' point of view, the first objective in operations is_____ and then ______
(quality & economy of service/restoration of service)
21>POTS stands for___________
22>___________communications technology deals with the theories of electrical engineering, computer
engineering, and computer science and their application to all types of communications over networks
(telecommunication/data/network)
23>A basic network can be viewed is interconnected ________ (nodes/links/both)
24>___________carrier information from one node to another that is directly connected to it (network/link)
25>A node behaves as
a: end node
b: intermediate node
Ans:___________ (a/b/both)
26>If the node behaves as_____ node, information either originates or terminates there. ______node redirects the
information from one link to another (intermediate/end)
27>In telephone network model, End office nodes behaves as___________ (intermediate/end)
28>Each ___________node has connection to a user interface , if the information originates or terminates there
(intermediate/end)
29>DTE stands for___________
30>___________is any equipment that generates or accepts digital data (DDD/DTE)
VTU
N
O
TESBYSR
I
3. NETWORK MANAGEMENT SYSTEMS
2
31>Data can be transmitted in
a: analog format
b: digital format
Ans:___________ (a/b/either)
32>The __________data is sent either as base band or on top of a carrier (digital/analog)
33>___________data is generated either directly by the user equipment or as analog data and converted to digital
data (digital/analog)
34>ISDN stands for___________
35>Long distance data transmission today is mostly ___________due to its superior price and performance
(digital/analog)
36>The data can be transmitted in following modes
a: circuit switches
b: message switched
c: packet switches
Ans:___________ (a/b/c/all)
37>In__________ switched mode , a physical circuit is established between the originating and terminating ends
before the data is transmitted (circuit /
message/ packet switches)
38>In_____ &______switched modes, the data is broken into packets and each packet is enveloped with the
destination and originating addresses (circuit /
message/ packet switches)
39>___________switched mode is used to send long messages such as email (circuit /
message/ packet switches)
40>___________switched mode is used to transmit small packets used in applications such as interactive
communication (circuit /
message/ packet switches)
41>In telephone network, _____&_____open each packet to find the destination address and forward the data to
the appropriate output links (switch/bridge/router)
42>In _________switched mode, each packet may take a different route (circuit/packet)
43>The main difference between packet and message switching is that in the ___________the data is stored by the
system and then retrieved by the user at the later time (former/latter)
44>In___________ switched mode, the packets are fragmented and reassembled in almost real time
(message/packet)
45>email is an example of_________ switched mode (message/packet)
46>PSDN stands for___________
47>Network communications are classified as either _____or______ communication (tele/wireless/data)
48>Telecommunication network is a __________switched network that is structured as a public network accessible
by any user (message/circuit)
49>Data communication network is also called computer communication network (true/false)___________
50>___________transfer the information from digital to analog at source and back to digital at destination
51>In corporate data and telecommunication networks, the computer terminals are connected to___________
which manages the local terminals and provides a single interface to the telephone network (onsite switch
PBX/onsite communication controller)
52>In corporate data and telecommunication networks, the telephones are connected locally by ___________
which interfaces to the telephone network (onsite switch PBX/onsite communication controller)
53>Processor to processor communications over the telecommunications lines take _____time and therefore
are______ expensive (less/more)
54>SNA stands for___________
55>In SNA, the host is connected to the terminals via the _____controllers and ______controllers
(communications/cluster/both)
56>In SNA, _____ controllers manage the DTEs at the peripheral nodes and the ______controllers manage the
traffic at the subnetwork levels (communications/cluster/both)
57>DCE stands for___________
58>The system of links that connect remote LANs is called___________ (MAN/WAN)
59>A LAN is physically connected to a WAN link by ______or _____at each end (switch/bridge/router)
60>Important aspects of DCEs are
a: the different platforms and applications running on DCEs have the ability to communication with each other
b: the ability of the processors attached to LANs do multiple functions
Ans: ___________ (a/b/both)
61>The processor that requests a service is called the _____, and the processor that provides the service is called
the______ (server/client)
VTU
N
O
TESBYSR
I
4. NETWORK MANAGEMENT SYSTEMS
3
62>The process that initiates a transaction to run an application in either a local or remote processor is called the
_____.The application process that is invoked by a _____ is called the______ (server/client)
63>In client/server architecture, the ____initiates the request and the _______responds (server/client)
64>Client cannot initiate a process in the server (true/false)___________
65>A real world analogy of the client/server operation is a post office (true/false)___________
66>The communication between operative computing processes is called ___________communication (end to
end/peer to peer)
67>___________is a suite of protocols that enable networks to be interconnected (UDP/IP or TCP/IP)
68>IP is a _____ protocol. TCP is a ______protocol. UDP is a ______protocol (connection
oriented/connectionless)
69>Most of Internet traffic really uses___________ because of the reliability of data transmission (UDP/IP or
TCP/IP)
70>The Internet is a network of networks (true/false)___________
71>___________serve as the interface between dissimilar and independent , autonomous , networks and perform
many functions including protocol conversions (routers/gateways)
72>Autonomous networks have little knowledge each other's attributes , configurations and addresses and yet
communication is automatically facilitated by a hierarchy of Internet servers along the path
(true/false)___________
73>Email messages are transmitted by a___________ scheme all along the path (stop & wait/ store & forward)
74>Internet users are currently doubling n population each year (true/false)___________
75>In layered architecture, the workstations belong to the___________ plane (LAN/user)
76>in layered architecture, the interfaces are defined as the fabrics (true/false)___________
77>In Internet fabric model, the LAN and WAN planes interface through _____fabric. The WANs in the WAN
plane interface via the______ fabric (gateway/switching)
78>In Internet fabric model, the user's workstation interfaces to a LAN via a ___________interface
(gateway/switching/MAC)
79>In Internet fabric model, LANs interface to a WAN by a switching fabric of ___________
(bridges/routers/switches/all)
80>____________fabric interconnects different WANs (gateway/switching)
81>_____is a private network and access to it is controlled by the enterprise that owns it, whereas______is public
(internet/intranet)
82>In communication lingo, commonality can be interpreted as _____and procedures as______
(protocols/standards)
83>___________can be defined as the basic structure of a system that shows its functional components and the
relationships among the
84>___________architecture describes the functional components of a communication network as well as the
operational interfaces among them (network/communication)
85>The operational procedures are specified in terms of ___________ (standards/protocols)
86>Standardization of___________ involves agreement in the physical characteristics and operational procedures
of communication equipment that performs similar functions (policy/protocol)
87>Email exchange across the world is possible because most vendors have adopted the standard ___________in
their software (MIME/SMTP)
88>Each system can be divided into ______broad sets of communication layers (2/3/4)
89>in communication architecture , top set of layers consists of the _____layers and the bottom set of the______
layers (transport/application)
90>The data can be transmitted in one of____ modes (2/3/4)
91>The ISO has developed a highly modular or layered , architecture for communication protocols that is called
the OSI reference model , published as OSI RM--ISO______ (7948/749)
92>OSI reference model was developed based on the premise that
a: the different layers of protocol provide different services
b: each layer can communicate with only its own neighboring level
Ans:___________ (a/b/both)
93>In OSI reference model, two systems can communicate on a ___________level (end to end/peer to peer)
94>In OSI reference model, layers __ __are the transport system protocol layers; and layers ______are application
support protocol layers (1/2/3/4/5/6/7)
95>In OSI reference model, the intermediate system is involved only up to the first ________layers in the process
(3/4)
VTU
N
O
TESBYSR
I
5. NETWORK MANAGEMENT SYSTEMS
4
96>Match the following
Physical :provides application specific protocols for each application and each transport protocol
system
Data link :establishes and clears sessions for applications, and thus minimizes loss of data during large
data exchange
Network :forms the switching/routing layer of the network
Transport :multiplexes and de-multiplexes messages from applications
Session :transfers to and gathers from the physical medium raw bi data
Presentation :Consists of two sublayers LLC and MAC
Application :provides a set of standard protocols so that the display would be transparent to syntax of the
application
97>_____formats the data to go on the medium; performs error control and flow control.______ controls data
transfer to and from LAN; resolves conflicts with other data on LAN (MAC/LLC)
98>Identify feature of transport layer in OSI reference model
a: multiplexes and demultiplexes messages from applications
b: acts as a transparent layer to applications and thus isolates them from the transport system layers
c: makes and breaks connections for connection-oriented communication
d: controls flow of data in both directions
Ans:___________ (a/b/c/d/all)
99>Identify features of physical layer in OSI reference model
a: provides a set of standard protocols so that the display would be transparent to syntax of the application
b: transfers to and gathers from the physical medium bit data
c: data encryption and decryption
d: handles physical and electrical interfaces to the transmission medium
Ans:___________ (a/b/c/d/all)
100>Identify features of presentation layer in OSI reference model
a: provides a set of standard protocols so that the display would be transparent to syntax of the application
b: transfers to and gathers from the physical medium bit data
c: data encryption and decryption
d: handles physical and electrical interfaces to the transmission medium
Ans:___________ (a/b/c/d/all)
101>In OSI reference model , the message in each layer is contained in message units called__________
102>PDU consist of _____parts (2/3)
103>PDU consists of ____&______ (PCI/VCI/UD)
104>In PDU , ____contains header information about the layer while ______contains the data that he layer , acting
as a service provider , receives from or transmits to the upper layer/service user layer (PCI/UD)
105>In OSI reference model, the size of the PDU increases as it goes toward _______layers (higher/lower)
106>__________layer is responsible for physically placing the electrical signal on the physical medium and picking
up the signal from it (presentation/physical)
107>__________layer controls and manages the physical and electrical interfaces to the physical medium including
the connector or transceiver (presentation/physical)
108>There are various protocol standards for physical layer interface, _____classes of standards have been
established by the ITU-T and EIA (2/3)
109>ITU-T stands for__________
110>EIA stands for__________
111>The data communication between two DTEs is controlled and managed by __________layer (network/data
link)
112>In data link layer, the data communication is serial __________oriented stream (bit/byte)
113>functions of data link layer are
a: establish and clear the link
b: transmit the data
c: error control and data compression
d: flow control
Ans:__________ (a/b/c/d/all)
114>Flow control on the data link layer is done on a hop to hop basis (true/false)__________
115>In data link layer, the lower __________layer controls the access and transmittal of data to the physical layer
in an algorithm manner (LLC/MAC)
116>There are _____basic forms of LANs (2/3)
117>Ethernet LAN:____ type: :FDDI:____ type (ring/bus)
VTU
N
O
TESBYSR
I
6. NETWORK MANAGEMENT SYSTEMS
5
118>features of network layer are
a: controls and manages the switching fabric of the network
b: provides both connectionless network service and connection oriented network service
Ans:________ (a/b/both)
119>CLNS stands for___________
120>CONS stands for__________
121>__________is used when the lower layers are highly reliable such as LANS and bridges as well as when the
messages are short (CONS/CLNS)
122>__________is the method for transmitting long messages such as file transfer (CONS/CLNS)
123>__________is used when the transmission medium is not reliable (CONS/CLNS)
124>___________at the nodes of a network performs the function of routing and switching the data (switch/router)
125>The OSI architecture model divides the network layer into ________sublayers (2/3/4)
126>Sublayers of network layer are
a: SNICP
b: SNDCP
c SNDAP
Ans:_________ (a/b/c/all)
127>SNICP stands for___________
128>SNDCP stands for__________
129>SNDAP stands for___________
130>In network layer , the top sublayer is _________that interfaces to the transport layer (SNICP/SNDCP/SNDAP)
131>The Internet communicates between nodes using an Internet address and _____.The nodes in turn
communicate with subnetworks using_____ which depends on the subnetwork protocol (SNICP/SNDCP/SNDAP)
132>The SNDCP communicates with is data link layer via the third network sublayer___________
(SNICP/SNDAP)
133>In OSI terminology, TCP/IP is called __________ (ISO-IP/ISO-CLNP/either)
134>A connection ____OSI protocol is X.25 PLP, a packet layer protocol (less/oriented)
135>Identify feature of transport layer
a: multiplexes the user data provided by the application layers and passes the packets to the network layer
b: service is independent of the network on which the packets are transmitted
c: can be connectionless or connection oriented and is implemented in both Internet and OSI protocols
d: flow control is implemented and functions as a data rate manager between the application programs and the
network layer
Ans:__________ (a/b/c/d/all)
136>Layers ___through ___application layer protocols (4/5/6/7)
137>__________layer establish the communication at the beginning of the session, monitor , synchronize and error
correct the information exchanged during the session and then release the logical link at the end of the session
(presentation/session)
138>__________layer is the medium of presentation of message's context to the user or application program
(physical/presentation)
139>__________layer is a context sensitive layer (physical/presentation)
140>wrt presentation layer , a common syntax that is used for semantics is__________ (BER/ASN.1)
141>ASN.1 stands for__________
142>Data encryption and data compression are also generally done in __________layer (physical/presentation)
143>The _____&_____layers form the suite of TCP/IP protocols (transport/data link/network)
144>wrt SNA , arrange the following in correct sequence (top to bottom)
a: physical
b: path control
c: transmission control
d: data link
e: data flow control
f: presentation services
g: end user application
Ans:__________ (gfecabd/gfecbda/gfeabdc)
145>In SNA, the combination of _____&_____services are called the SNA transmission subsystem (transmission
control/presentation/data flow )
146>In SNA , _________services are also known as SNA high level services (data flow/transmission
control/presentation )
147>All application specific protocol services in OSI are sandwiched between the_____ and_____ layers
(user/transport/presentation)
148>In the Internet model, all application specific protocol services are sandwiched between the____&_____
layers (session/user/transport)
VTU
N
O
TESBYSR
I
7. NETWORK MANAGEMENT SYSTEMS
6
149>A user interfaces with a host at a remote terminal using ____in the OSI model and ______in the Internet model
(Telnet/VT)
150>File transfers are accomplished using _____in the OSI model and _____in the Internet (FTP/FTAM)
151>FTAM stands for___________
152>The most common mail service function in the Internet is______. A similar protocol in the OSI model is_____
(MOTIS/SMTP)
153>MOTIS stands for_________
154>Network management is accomplished using ____in the OSI model and _______in the Internet (CMIP/SNMP)
155>CMIP stands for___________
156>OAM&P stands for___________
157>NMS stands for__________
158>The most common and serious problems of networks are connectivity failures, which are in the category
of__________ management (security/fault)
159>__________is generally interpreted to mean failures in accessing networks and systems by the users
(risk/fault)
160>Power hits could reset network component configuration, causing network failures (true/false)________
161>CIO stands for_________
162>The corporate network needs to be secured for privacy and content using __________
(firewalls/encryption/both)
163>____network was monopolistic and had expensive redundancy. ______network is adhoc, decentralized, has
loosely specified interfaces, and has dynamic routing (data/telephone)
164>The latest user satisfaction for an ISP is _____% (8/16/32)
165>Which elements of managing your network require most of your time?
a: configuring the management system itself
b: expanding the network
c: gathering and analyzing statistics for presentation to upper management
Ans:__________ (a/b/c/all)
166>Sniffer is an example of troubleshooting tools (true/false) __________
167>What does a network failure cost the user
a: there are tangible and intangible losses
b: the cost is a function of the dependence of the business upon shared data
c: A&R labs need high technology and tolerate low reliability. Business accept lower and proven technology but
require high reliability
Ans:__________ (a/b/c/all)
168>__________management can be defined as OAM&P of network and services (configuration/network)
169>Match the following
Operations group :involves network planning and circuit provisioning
network administration :handles functions that include both installation con repairs of facilities
and equipment
installation & maintenance group: concerned with daily operations in providing network services
Provisioning :concerned with establishing and administering the overall goals ,
policies
and procedures of network managements
170>The goal of network management is to ensure that the users of a network receive the information technology
services with the quality of service that they expect (true/false)__________
171>Network management comprises of _______major groups (2/3/4)
172>Network management comprises of following groups
a: network provisioning
b: network operations
c: network installation and maintenance
Ans:__________ (a/b/c/all)
173>_______is the primary responsibility of the engineering groups and ____is the primary responsibility of the
plant facilities group (network provisioning/network operations/network I&M)
174>The normal daily operations are the function of the __________groups, which controls and administers a
network operation center (network provisioning/network operations/network I&M)
175>NOC stands for__________
176>__________is the nerve center of network management operations (NMS/NOC)
177>The functions of the NOC are concerned primarily with _____;its secondary responsibilities are_____&_____
(network provisioning/network operations/network I&M)
178>__________consists of network planning and design and is the responsibility of the engineering group
(network provisioning/network operations/network I&M)
VTU
N
O
TESBYSR
I
8. NETWORK MANAGEMENT SYSTEMS
7
179>ISO has defined __OSI network management applications (4/5/6)
180>__________are concerned with daily operations of the network and providing network services (network
provisioning/network operations/network I&M)
181>ISO has defined following OSI network management applications
a: fault management
b: configuration management
c: performance management
d: security management
e: account management
Ans:__________ (a/b/c/d/e/all)
182>Whenever there is a service failure, it is responsibility of _______to restore service as soon as possible
(NMS/NOC)
183>In several failure situations , the network will detect and restore service automatically .This network feature is
called __________ (grooming/self healing)
184>Restoration of service does not include fixing the cause of the problem. That responsibility to fix the problem
usually rests with the__________ group (network provisioning/network operations/network I&M)
185>__________administration is the administrative part of fault management and is used to track problems in the
network (session ticket/trouble ticket)
186>wrt network management , there are ______configurations of the network (3/4/5)
187>Following are the configurations of the network
a: static configuration
b: current running configuration
c: planned configuration
Ans:__________ (a/b/c/all)
188>_____configuration is one that would come up if the network is started from idle status. In_____ configuration
of the future , the configuration data will change as the network is changed (planned/current/static)
189>__________management includes physically securing the network as well as controlling access to the network
by the users (fault/security)
190>Access privilege to application software is not the responsibility of the NOC unless the application is either
owned or maintained by the NOC (true/false)__________
191>Traffic statistics are helpful in detecting trends and planning future needs (true/false)__________
192>NOC gathers data and keeps them up to date in order to tune the network for optimum performance
(true/false)__________
193>__________administers costs and allocate the use of the network (NMS/NOC)
194>Since the network consists of components manufactured by multiple vendors, commonality in the definition
and relationship of component attribute is needed. This is defined by the __________ (SMI/MIB)
195>__________is the Internet management protocol which is the most popular protocol to acquire the data
automatically using protocol and performance analyzing tools (SMTP/SNMP)
196>There______ classes of reports (3/4/5)
197>Following are different classes of reports
a: system report
b: management report
c: user report
Ans:__________ (a/b/c/all)
198>Match the following
System report :are distributed to the users on a periodic basis to let them know the status of network
performance
management report :are needed for network operations to track the activities
user report :goto the management of the network management group to keep them informed about
the activities and performance of the NOC and the networks
199>__________group takes care of all installation and maintenance of equipment and cables (network
operation/network I&M)
200>___________group is the service arm of the engineering group for installation and fixing troubles for network
operations (network operation/network I&M)
201>__________management is the management of systems and system resources in the network while_________
management is concerned with network resources such as hubs , switches , bridges , routers and gateways, and the
connectivity among them via a network (system/data/network)
202>___________management addresses end to end connectivity between any two processors in the network
(system/network)
203>A network consists of network components and their inter connections (true/false)_________
204>A network management system manages all the components that are connected to a network
(true/false)__________
VTU
N
O
TESBYSR
I
9. NETWORK MANAGEMENT SYSTEMS
8
205>The two major standards are the Internet and the OSI standards (true/false)___________
206>TMN stands for___________
207>The popular _____ end systems are housed either on SUN or HP UNIX based workstations. The ______end
network management systems run either on Windows 95/98 or Windows NT (low/high)
208>Network connectivity could be tested using the ping command in UNIX (traceroute) and Windows NT
(tracert) based system (true/false)___________
209>The current network management systems are based on the ________protocol (SMTP/SNMP)
210>following are limitations of current network management systems
a: they need a dedicated NMS monitoring station, which must be on a specific type of platform
b: the values of the managed objects should be defined as scalar values
c: SNMP based management is a poling based system
Ans:___________ (a/b/c/all)
211>__________ based management protocol CMIP is object oriented (OSI/Internet)
212>Limitations in SNMP based management have been overcome by the emerging web based management
(true/false)___________
213>A web based system is platform independent for the management software using Java languase in the managed
components , for the Web based NMS server as well as for Web browser monitors (true/false)___________
214>Following are web based management schemes
a: Java based JMX developed by Sun
b: WBEM based on the Common Information Model developed by Microsoft
Ans:___________ (a/b/both)
215>JMX stands for___________
216>WBEM stands for__________
217>The broadband multimedia service is based on ATM SONET wide area network and several emerging access
technologies such as HFC and ADSL (true/false)___________
218>HFC stands for___________
219>ADSL stands for___________
220>___________network, which is the direction of the next generation network, would include embedded
network management applications (intelligent/active)
221>following methods can be used to find the root of a problem in network
a: artificial intelligence
b: algorithmic schemes
c: finite state machine
Ans:___________ (a/b/c/all)
222>_____establish secure networks , and______ ensures secure communication (cryptography/firewalls)
ANSWERS:
1>T
2>5,3
3>trunk
4>lowest
5>
6>1-c 2-e 3-d 4-a 5-b
7>loop
8>T
9>Direct Distance Dialing
10>DDD,3
11>1-c 2-b 3-a
12>either
13>switch
14>T
15>T
16>Network Operation Center
17>NOC
18>NOC
19>user
20>restoration of services, quality and economy
21>Plain Old Telephone Service
22>network
23>both
24>link
25>both
VTU
N
O
TESBYSR
I
10. NETWORK MANAGEMENT SYSTEMS
9
26>end, intermediate
27>end
28>end
29>Data Terminating Equipment
30>DTO
31>either
32>analog
33>digital
34>Integrated Services Digital Network
35>digital
36>all
37>circuit
38>message & packet
39>message
40>packet
41>bridges & routers
42>packet
43>latter
44>packet
45>message
46>Public Switched Data Network
47>tele, data
48>circuit
49>T
50>modem
51> onsite communication controller
52> onsite switch PBX
53>less, less
54>Systems Network Architecture
55>both
56>cluster, communication
57>Distributed Computing Environment
58>WAN
59>bridge, router
60>both
61>client, server
62>client, client, server
63>client, server
64>T
65>T
66>peer to peer
67>TCP/IP
68>connectionless, connection oriented, connectionless
69>UDP/IP
70>T
71>gateway
72>T
73>store & forward
74>T
75>user
76>T
77>switching, gateway
78>MAC
79>all
80>gateway
81>intranet, internet
82>standards, protocols
83>architecture
84>communication
85>protocols
86>protocols
87>SMTP
VTU
N
O
TESBYSR
I
11. NETWORK MANAGEMENT SYSTEMS
10
88>2
89>application, transport
90>3
91>7498
92>both
93>peer to peer
94>1to4 5to7
95>3
96>1-e 2-f 3-c 4-d 5-b 6-g 7-a
97>LLC, MAC
98>all
99>b,d
100>a,c
101>protocol data unit
102>2
103>PCI, UD
104>PCI, UD
105>lower
106>physical
107>physical
108>2
109>International Telecommunications Union-Telecommunication Sector
110>Electronics Industries Association
111>data link
112>bit
113>all
114>T
115>MAC
116>2
117>bus, ring
118>both
119>Connectionless Network Service
120>Connection Oriented Network Service
121>CLNS
122>CONS
123>CONS
124>router
125>3
126>all
127>SubNetwork Independent Convergence Protocol
128>SubNetwork Dependent Convergence Protocol
129>SubNetwork Dependent Access Protocol
130>SNICP
131>SNICP, SNDCP
132>SNDAP
133>either
134>oriented
135>all
136>5to7
137>session
138>presentation
139>presentation
140>ASN.1
141>Abstract Syntax Notation Number One
142>presentation
143>transport, network
144>gfecbda
145>transmission control, data flow
146>presentation
147>user, presentation
148>user, transport
149>VT, telnet
VTU
N
O
TESBYSR
I
12. NETWORK MANAGEMENT SYSTEMS
11
150>FTAM, FTP
151>File Transfer Access & Management
152>SMTP, MOTIS
153>Message Oriented Text Interchange Standard
154>CMIP, SNMP
155>Common Management Information Protocol
156>Operations Administration Maintenance & Provisioning
157>Network Management System
158>fault
159>fault
160>T
161>Chief Information Officer
162>both
163>telephone, data
164>16
165>all
166>T
167>all
168>network
169>1-c 2-d 3-b 4-a
170>T
171>3
172>all
173>network provisioning, network I&M
174>network operation
175>Network Operations Center
176>NOC
177>network operations, network provisioning and network I&M
178>network provisioning
179>5
180>network operation
181>all
182>NOC
183>self healing
184>network I&M
185>trouble ticket
186>3
187>all
188>static, planned
189>security
190>T
191>T
192>T
193>NOC
194>MIB
195>SNMP
196>3
197>all
198>1-b 2-c 3-a
199>networkI&M
200>network I&M
201>system, network
202>network
203>T
204>T
205>T
206>Telecommunication Management System
207>high, low
208>T
209>SNMP
210>all
211>OSI
VTU
N
O
TESBYSR
I
13. NETWORK MANAGEMENT SYSTEMS
12
212>T
213>T
214>both
215>Java Management Extensions
216>Web Based Enterprise Management
217>T
218>Hybrid Fiber Coax
219>Asymmetric Digital Subscriber Loop
220>active
221>all 222>firewalls, cryptography
VTU
N
O
TESBYSR
I
14. NETWORK MANAGEMENT SYSTEMS
13
CHAPTER 3: BASIC FOUNDATION -- STANDARDS, MODELS
AND LANGUAGE
1>__________ model addresses the applications that fall into the categories of fault, configuration, performance,
security and accounting (information/functional)
2>Match the following
Network management :management of a system's resources such as central processor usage, disk usage
and application processes
System management :deals with services provided by organizations to customers
Service management :management of the network comprising nodes and links
3>_____management is an extension to _____&_____management (network/system/service)
4>The two leading models of network management are the Internet model and the OSI model
(true/false)__________
5>__________model is the most widely used for network management (OSI/Internet)
6>_____model is a simpler scalar model and hence easy to implement. ______model is object oriented , is more
complex and harder to implement (OSI/Internet)
7>A higher level management network called TMN is based on the ___________model (OSI/Internet)
8>TMN stands for___________
9Identify features of OSI/CMIP standard
a: International standard (ISO/OSI)
b: management of data communications networks- LAN and WAN
c: deals with all seven layers
d: object oriented and most complete
e: consumes large resource in implementation
f: well structured and layered
Ans:___________ (a/b/c/d/e/f/all)
10>Identify features of SNMP/Internet Standard
a: Industry standard (IETF)
b: easy to implement
c: most widely implemented
d: originally intended for management of Internet components, currently adopted for WAN and telecommunication
systems
Ans:___________ (a/b/c/d/all)
11>Identify features of TMN standard
a: International standard (ITU-T)
b: Management of telecommunications network
c: based on OSI network management framework
d: addresses both network and administrative aspects of management
Ans:___________ (a/b/c/d/all)
12>Identify features of IEEE standard
a: IEEE standards adopted internationally
b: addresses management of LANs and MANs
c: adopts OSI standards significantly
d: deals with first two layers of the OSI reference model
Ans:__________ (a/b/c/d/all)
13>Following are web based management standards
a: WBEM
b: JMX
Ans:___________ (a/b/both)
14>CMIP stands for___________
15>CMIS stands for___________
16>The OSI management protocol standard is ____, and has built in services, ______, that specify the basic
services needed to perform the various functions (CMIS/CMIP)
17>Both LANs and WANs can be managed using___________ (CMIS/CMIP/both)
18>Major drawbacks of the OSI management standard are
a: it is complex b: CMIP stack is large
Ans:___________ (a/b/both)
VTU
N
O
TESBYSR
I
15. NETWORK MANAGEMENT SYSTEMS
14
19>In contrast to _____, ______is truly simple (SNMP/CMIP)
20>___________is responsible for all Internet specifications including network management (IEEE/IETF)
21>___________is designed to manage the telecommunications network and is oriented toward the needs of
telecommunications service providers (ITU/TMN)
22>_____is the standard of______ and is based on OSI CMIP/CMIS specifications (ITU/TMN)
23>The IEEE standards for LAN and MAN specifications are concerned only with OSI layers__&___1/2/3)
24>Both OSI/CMIP and Internet/SNMP protocols use _______standards for the lower layers (IETF/IEEE)
25>The IEEE ____.x series of specifications defines the standards for the various physical media and data link
protocols (802/803)_______
26>IEEE 802.__ specifications present overview, architecture and management. IEEE 802.__standard specifies the
LLC layer. IEEE 802.__ specifications are defined for Ethernet LANs (1/2/3/4)
27>___________layer provides transparency of the various physical media and protocols to the network layer
(MAC/LLC)
28>Web based management is based on using web technology , a web _____for the management system and web
______for network management stations (browsers/server)
29>DMTF stands for_________
30>___________is developing specifications for WBEM (IETF/DMTF)
31>___________has chosen the Microsoft object oriented management model, Common Information Model
(IETF/DMTF)
32>___________is based on a special subset of Java applets developed by Sun Microsystems that runs in the
network components (BEM/JMX)
33>TMM uses_______ (SNMP/CMIP )
34>Both SNMP and CMIP use polling methodology (true/false)___________
35>OSI network management architecture model comprise of ____models (3/4/5)
36>Following are the models of OSI network management
a: organization model
b: information model
c: communication model
d: functional model
Ans: ___________ (a/b/c/d/all)
37>In OSI model, _________model describes the components of a network management system, their functions
and their infrastructure (functional/organization/information/communication)
38>The organization model is defined in ISO______OSI systems management Overview (10400/10040/10004)
39>___________model defines the terms object, agent and manager
(functional/organization/information/communication)
40>___________model deals with the structure and organization of management information
(functional/organization/information/communication)
41>ISO=________ specifies the SMI and the information database, MIB (10156/10165)
42>SMI stands for___________
43>MIB stands for___________
44>_____describes how the management information is structured and ______deals with the relationship and
storage of management information (MIB/SMI)
45>Communication model has ___________components (2/3/4)
46>Components of communication model are
a: management application processes that function in the application layer
b: layer management between layers
c :layer operation within the layers
Ans:___________ (a/b/c/all)
47>___________model deals with the user oriented requirements of network management
(functional/organization/information/communication)
48>OSI defines ____functional application areas (4/5/6)
49>Only ____model presents the complete model for network management (Internet/OSI)_______
50>OSI deals wit all 7 networking layers (true/false)___________
51>The IETF does not define architecture for the SNMP management model explicitly (true/false)___________
52>TMN is based on the___________ model (OSI/internet)
53>______standard is dedicated to the management of layers 1 and 2 of the OSI reference model
(IEEE/IETF)_____
54>The IEEE standard is primarily concerned with the ___________model
(functional/information/organization/communication)
55>In Web based management , ___________model uses Web server - Web browser architecture
(functional/information/organization/communication)
VTU
N
O
TESBYSR
I
16. NETWORK MANAGEMENT SYSTEMS
15
56>Following object oriented technologies are influencing Web based managementa:hypermedia server
b: CORBA oriented transportation
c: client/server push technology
Ans: ___________ (a/b/c/all)
57>___________model describes the components of network management and their relationships
(functional/information/organization/communication)
58>In organization model, network objects can be classified into managed and unmanaged objects
(true/false)___________
59>MDB stands for___________
60>The managed elements have a management process running in them called___________ (broker/agent)
61>_________ elements do not have a management process running in them (managed/unmanaged)
62>Managed hub is more expensive than the unmanaged hub (true/false)___________
63>_________manages the managed element (agent/manager)
64>In organization model, there is database in_____ _but not in_____ (agent/manager)
65>In _____tier configuration of organization model, the intermediate layer acts both agent and manager
(two/three)______
66>In three tier configuration of organization model, as______, intermediate layer collects data from the network
elements, processes it, and stores the results in its database. As _____, it transmits information to the top level
manager (agent/manager)
67>MoM stands for___________
68>_____refers to a system that runs a management process (NOC/NMS)
69>___________model is concerned with the structure and the storage of information
(organization/information/functional/communication)
70>The representation of objects and information relevant to their management form the management___________
model (organization/information/functional/communication)
71>___________model specifies the information base to describe managed objects and their relationships
(organization/information/functional/communication)
72>____defines the syntax and semantics of management information stored in_______ (MIB/SMI)
73>___________is used by both agent and management processes to store and exchange management information
(MIB/SMI)
74>In information model , _____MIB consists of information on all the network components that it manages ,
whereas ______MIB needs to know only its local information, its MIB view (agent/manager)
75>______is a real database whereas _____is a virtual database (MIB/MDB)
76>_____contains the measured or administratively configured value of the elements of the network. On the other
hand, ______ contains the information necessary for processes to exchange information (MIB/MDB)
77>Following types of information can be stored in the MIB
a: network elements-hubs, bridges , routers, transmission facilities
b: software processes-programs, algorithms , protocol functions , databases
c: administrative information-contact person, account number
Ans:___________ (a/b/c/all)
78>___________objects are uniquely defined by a tree structure specified by the OSI model and are used in the
Internet model (managed/unmanaged)
79>MIT stands for___________
80>In____________ model, the managed objects are defined by a containment tree that represent the MIT
(OSI/Internet)
81>In OSI MIT, there are ____nodes in the layer beneath the root (2/3/4)
82>Wrt OSI MIT, the following are the nodes in the layer beneath the root
a: iso
b: ccitt (itu)
c: iso-ccitt (iso-itu)
Ans:___________ (a/b/c/all)
83>iso stands for___________
84>itu stands for___________
85>There are_____ basic attributes of a managed object type from the Internet perspective (4/5/6)
86>Following are the basic attributes of a managed object type from the Internet perspective
a: object type (object identifier & descriptor)
b: definition
c: syntax
d: access
e: status
Ans:___________ (a/b/c/d/e/all)
VTU
N
O
TESBYSR
I
17. NETWORK MANAGEMENT SYSTEMS
16
87>Specification for the Internet are defined in RFC documents (true/false)___________
88>A managed object in the Internet model is defined by _____parameters (4/5/6)
89>A managed object in the Internet model is defined by five parameters and for this RFC=____ (1551/1515/1155)
90>A managed object in the Internet model is defined by following parameters
a: object identifier and descriptor
b: syntax
c: access
d: status
e: definition
Ans:___________ (a/b/c/d/e/all)
91>Match the following
object identifier and descriptor : textual description of the semantics of object type
Syntax : implementation requirements
Access : access privilege to a managed object
Status : used to model the object
Definition : unique ID and name for the object type
92>_____ object model is a scalar model and is easy to understand. In contrast , ______perspective of a managed
object is complex and has a different set of characteristics (OSI/Internet)
93>___________specifications are object oriented and hence a managed object belongs to an object class
(OSI/Internet)
94>___________of an object defines the external perspective of the object (entity/attribute)
95>___________of the object is to change its attribute (behavior/operation)
96>An OSI managed object has the following characteristics
a: object class
b: attributes
c: operations
d: behaviour
e: notifications
Ans:___________ (a/b/c/d/e/all)
97>Operation in the Internet model is done by _____&______ commands. Notification s done by
____&_____messages (get/set/response/alarm)
98>In____ , we can create and delete objects, these concepts do not exist in _______ (OSI/Internet)
99>_____characteristics of the Internet model is part of the security function in the OSI functional model
(status/access)______
100>___________characteristics of the Internet model is handled by conformance as part of application services in
OSI (status/access)
101>Match the following
Object type :counts number of packets
Syntax :Mandatory
Access :counter
Status :read only
Description :PktCounter
102>Match the following
Object class :generates notifications on new value
Attributes :get or set
Operations :retrieves or resets values
Behavior :packet counter
Notifications :Single valued
103>Following are characteristics from Internet perspective
a: object type
b: syntax
c: access
d: status
e: description
Ans:__________ (a/b/c/d/e/all)
104>Characteristics from OSI perspective are
a: object class b: attributes
c: operations d: behaviour
e: notifications
Ans:__________ (a/b/c/d/e/all)
VTU
N
O
TESBYSR
I
18. NETWORK MANAGEMENT SYSTEMS
17
105>Management data is communicated between agent and manager processes, as well as between manager
processes (true/false)__________
106>__________aspects need to be addressed in the communication of information between two entities (2/3/4)
107>Following aspects need to be addressed in the communication of information between two entities
a: transport medium of message exchange
b: message format of communication
c: actual message
Ans:__________ (a/b/c)
108>Match the following
transport protocol :actual message
application protocol :transport medium exchange
commands & responses :message format of communication
109>__________is the unsolicited messages such as alarms, generated by the agent (notification/trap/both)
110>__________model uses CMIP along with CMIS (Internet/OSI)
111>__________model uses SNMP for communication (Internet/OSI)
112>OSI uses _________protocol for transportation (connection oriented/connectionless/both)
113>Internet uses __________UDP/IP protocol to transport messages (connection oriented/connectionless/both)
114>The TP4 transport layer protocol riding on top of the x.25 protocol could be used for__________ transporting
and application messages (connection oriented/connectionless/both)
115>______&_____specifies the management communication protocols for OSI and Internet management
respectively (SNMP/CMIP)
116>__________is a formal language developed jointly by CCITT and ISO for use with application layers for data
transfer between systems (BER/ASN.1)
117>ASN.1 is at the__________ layer (presentation/session)
118>__________is defined as the set of rules used to specify data types and structures for storage of information
(transfer syntax/abstract syntax)
119>___________represents the set of rules for communicating information between systems (transfer
syntax/abstract syntax)
120>____is applicable to the information model while ______is applicable to the communication model (transfer
syntax/abstract syntax)
121>__________can be used with any presentation syntax, depending on the medium of presentation (transfer
syntax/abstract syntax)
122>__________in ASN.1 makes it independent of the lower layer protocols (transfer syntax/abstract syntax)
123>ISO____/_____ standards specify ASN.1 (8825/X.209 or 8824/X.208)
124>The algorithm to convert the textual ASN.1 syntax to machine readable code is called__________ (DER/BER)
125>BER stands for___________
126>BER is defined by ISO_________ (882/X.209 or 8824/X.208)
127>___________is based on the Backus system and uses the formal syntax language and grammar of the BNF
(BER/ASN.1)
128>BNF stands for__________
129> <name>::=<definition> in this expression, <name> denotes _____and the symbol ::= represents______
(defined as/entity/)
130> <digit>::=0|1|2 in this expression, the symbol | represents_____ (and/not/or)
131><op>::=+|-|*|/ in this expression, the definitions on the right side are called ___________
(production/primitives)
132> <SAE>::<number> | <SAE> | <SAE><op><SAE>, in this expression, the format of each line is defined
as___________ (production/assignment/either)
133><BooleanValue>:: TRUE| FALSE, in this expression, entities that are all in capital letters such as TRUE and
FALSE are called__________ (identifiers/keywords)
134>The data types are built up from primitive data types such as
a: INTEGER
b: REAL
c: NULL
d: GraphicString
Ans:__________ (a/b/c/d/all)
135>__________is one of several CharacterString type primitives (StringGraphic /GraphicStshng)
136>Match the following
Alternatives : SET & SEQUENCE
List : SET OF & SEQUENCE OF
Repetition : CHOICE
137>Above constructs are used to build __________data types (primitive/structured)
VTU
N
O
TESBYSR
I
19. NETWORK MANAGEMENT SYSTEMS
18
138>__________data types are also called atomic entities (primitive/structured)
139>ASN.1 definition allows both backward and forward references as well as in-line definition
(true/false)__________
140>The constructs _____&_____are list builders (SET/SET OF/SEQUENCE/SEQUENCE OF)
141>The order in the list will be maintained if the list is built with the__________ construction (SET/SEQUENCE)
142>If the construct has been _____instead of_____, order in the list would be irrelevant (SEQUENCE OF/SET
OF)
143>{ product-based [0] NULL, basic [1] NULL } these assignments have integers in square brackets and these
are called________ (module/tags)
144>The definition of_________ is introduced in ASN.1 to uniquely identify a data type (module/tag)
145>We can group assignments that are related, this group is called__________ (subroutine/module)
146>identify correct formal definition of a module
a:<module name> DEFINITIONS ::= BEGIN
<name> :: <definition>
END
b: BEGIN ::=DEFINITIONS <module name>
<name> :: <definition>
END
c:<module name> BEGIN ::=DEFINITIONS
<name> :: <definition>
END
Ans:__________ (a/b/c)
147>Match the following
::= range
| start & end of a subtype
- start & end of a list
-- start & end of a tag
{} signed number
[] following the symbol are comments
() defined as or assignment
'' or, alternatives , options of a list signed number
148><module name> DEFINITIONS ::= BEGIN
<name> :: <definition>
END
The terms DEFINITIONS, BEGIN and END are primitives and are called __________in ASN.1
(identifier/keyword)
149>Grouping assignments into modules has following advantages
a: modules can be imported into and exported from other modules
b: modules are reusable
Ans:__________ (a/b/both)
150>Match the following
BEGIN : any negative or non-negative number
CHOICE :a sequence of non-negative numbers
DEFINITIONS :end of an ASN.1 module
END :list of alternatives
EXPORTS :start of an ASN.1 module
IDENTIFIER :definition of a data type or managed object
IMPORTS :data types that can be exported to other modules
INTEGER :data types defined in external modules
151>Match the following
NULL :used with OCTET for denoting string of octets
OBJECT :unordered list makes
OCTET :ordered list maker
OF :unbounded 8 bit bytes (octts) of binary data
SEQUENCE :a placeholder
SEQUENCE OF :used with IDENTIFIER to uniquely identify an object
SET :used with SET and SEQUENCE
SET OF :ordered array of repetitive data
STRING :unordered list of repetitive data
VTU
N
O
TESBYSR
I
20. NETWORK MANAGEMENT SYSTEMS
19
152>Match the following
Object name :INTEGER, BEGIN
Application data type :RMON-MIB
Module :Counter, IpAddress
Macro, MIB module :PersonalRecord
Keywords :sysDescr, etherStatsPkts
153>Simple data type is also called_________ (primitive/atomic/basic/all)
154>___________uniquely identifies the data type irrespective of the syntax version (atomic/tag)
155>Data types are defined based on___________ (structure/tag/both)
156>wrt Object and Data types, the structure is divided into _______categories (3/4/5)
157>wrt Object and Data types , the tag is divided into___ categories (2/3/4)
158>The tag is divided into following
a: class
b: tag number
Ans:__________ (a/b/both)
159>Following are different categories of data type structure
a: simple type
b: structured type
c: tagged type
d: other type
Ans:_________ (a/b/c/d/all)
160>________type is one for which the values are specified directly (structured/tagged/simple)
161>INTEGER is a________ type (structured/tagged/simple)
162>A data type is a __________type when it contains other types (structured/tagged/simple)
163>Types that are within a structured type are called _________types (component/tagged)
164>SET is distinguished from SEQUENCE in following respects
a: data types should all be distinct
b: order of values in SET is of no consequence
Ans:__________ (a/b/both)
165>Order of values is critical in _______ (SET/SEQUENCE)
166>The component data types in the __________construct need not be distinct because the order is preserved
(SET/SEQUENCE)
167>__________type is a type derived from another type (structured/tagged)
168>__________type is a data type that is not predefined (structured/tagged/other)
169>___________type is chosen from CHOICE and ANY types, which are contained in other types
(structured/tagged/other)
170>Type__________ defines the selection of one value from specified list of distinct types (ANY/CHOICE)
171>Every data type except __________has a tag associated with it (CHOICE/ANY/both)
172>A tag has following components
a: class
b: tag number
Ans:__________ (a/b/both)
173>There are _____classes of tag (3/4/5)
174>Following are different classes of tag
a: universal
b: application
c: context specific
d: private
Ans:__________ (a/b/c/d/all)
175>__________class is the most common (application/context specific/universal/private)
176>Data types in the __________class are application independent (application/context specific/universal/private)
177>__________class is similar to the use of a global variable in a software program and is applicable anywhere in
a program (application/context specific/universal/private)
178>BOOLEAN & INTEGER are examples of __________class , whose tag numbers are [1] and [2] respectively
(application/context specific/universal/private)
VTU
N
O
TESBYSR
I
21. NETWORK MANAGEMENT SYSTEMS
20
179>Match the following
Universal 1 :REAL
Universal 2 :Object description
Universal 3 :NULL
Universal 4 :BIT STRING
Universal 5 :BOOLEAN
Universal 6 :EXTERNAL
Universal 7 :OBJECT IDENTIFIER
Universal 8 :OCTET STRING
Universal 9 :INTEGER
180>Match the following
Universal 10 :TeletexString
Universal 11 :NumericString
Universal 12-15 :SEQUENCE & SEQUENCE OF
Universal 16 :ENCRYPTED
Universal 17 :ENUMERATED
Universal 18 :Reserved for future use
Universal 19 :SET & SET OF
Universal 20 :PrintableString
181>Match the following
Universal 21 :reserved for future use
Universal 22 :GeneralString
Universal 23 :GraphicString
Universal 24 :UTCTime
Universal 25 :VideotexString
Universal 26 :IASString
Universal 27 :GeneralizedTime
Universal 28 :VisibleString
Universal 29 :CharacterString
182>Tags in the __________class are specific to applications (universal/context specific/application/private)
183>_____class tag number can be overridden with _____tag number (universal/context specific/application)
184>Types in two different applications can have the same __________specific tag but each tag could carry a
different meaning in each application (context specific/application)
185>____type is a subset of_____ , is limited to that application (universal/context specific/application/private)
186>__________type is used extensively by vendors of network products (universal/context
specific/application/private)
187>In _____, there is an identifier for each occurrence of an object. In_____, it is the OBJECT IDENTIFIER
(ASN.1/MIB)
188>The ASN.1 syntax that contains the management information is encoded using the __________defined for the
transfer syntax (DER/BER)
189>TLV stands for__________
190>In TLV , the type has_____ subcomponents (3/4)
191>In TLV, the type has following subcomponents
a: class
b: P/C
c: tag number
Ans:__________ (a/b/c/all)
192>__________specifies whether the structure is a primitive or simple, type or a construct , which is anything
other than a simple type (class or P/C or
tag number)
193>__________is encoded as a one byte or an octet field (class or P/C or
tag number)
194>Match the following
Universal :1 1
Application :0 1
Context specific :0 0
Private :1 0
195>In TLV, the value of P/C is___ for primitive and ___for construct and is designated as the 6th bit (0/1)
196>In TLV, the lowest ___bits designates tag value in binary (4/5/6)
197>In TLV, class :____bits:: ___P/C: ___bits ::Tag number :___bits (1/2/3/4/5/6/7/8)
VTU
N
O
TESBYSR
I
22. NETWORK MANAGEMENT SYSTEMS
21
198__________is defined as a series of octets (type/length/value)
199>In TLV, the length specifies the length of the value field in number of__________ (bits/octets)
200>In TLV, the integer value is encoded using ______complement form (ones/twos)
201>Wrt TLV , for positive value , the actual value is the binary representation, with the MSB always being___ to
indicate the positive sign (0/1)
202>wrt TLV, -5 becomes ___________in twos complement form (11110111/111111101/11111011)
203>Wrt Macros , ____defines the syntax of the new types and _____defines the syntax of the new values (TYPE
NOTATION/VALUE NOTATION)
204>________model component of the OSI model addresses the user oriented applications
(communication/functional)
205>Functional model consists of ______submodels (4/5/6)
206>Functional model has following submodels
a: configuration management
b: fault management
c: performance management
d: security management
e: accounting management
Ans:___________ (a/b/c/d/e/all)
207>___________management addresses the setting and changing of configurations of networks and their
components (performance/accounting/configuration)
208>Relevant management information is embedded in managed objects such as switches, hubs, bridges and
routers .___________management involves setting up these parameters (performance/accounting/configuration)
209>___________displays in real time the configuration of the network and its status (NOC/NMS)
210>___________management involves detection and isolation of the problem causing the failure in the network
(performance/accounting/configuration/fault)
211>In several failure situations, the network could restore service automatically. This network feature is called
___________ (grooming/self healing)
212>___________ticket administration of fault management tracks all problems in the network including
nonproblems, until they are resolved (service/trouble)
213>___________management is concerned with the performance behavior of the network
(performance/accounting/configuration)
214>___________management involves physically securing the network, access to the network resources and
secured communication over the network (performance/accounting/configuration/security)
215>___________protect corporate networks and network resources from being accessed by unauthorized
personnel and programs, including virus programs (cryptography/firewalls)
216>__________management administers costs of the network (performance/accounting/configuration)
217>___________management is directed toward service providers, in order for them to provide customer
satisfaction and to ensure the profitability of business (performance/accounting/configuration/service &business)
218>Traffic data gathered by_____ management serves as input to _____management
(performance/accounting/configuration)
219>The traffic statistics, trouble ticket administration data and accounting management results are inputs to
___________management (performance/configuration/service & business)
220>Following are network management models
a: OSI
b: Internet
c: TMN
d: IEEE 801
e: Web technology
Ans:___________ (a/b/c/d/e/all)
221>The OSI management model categorizes the____ functions of network management into____ models (3/4/5)
222>The OSI has following network management models
a: organization
b: information
c: communication
d: application
Ans:__________ (a/b/c/d/all)
223>The organization model describes the management process in the network element called the
___________process, and the management process in the ___________ (manger/agent)
224>___________model addresses the structure of management information that enables processes running in
different components in the network to exchange management data (organization/information/communication)
225>The two primary communication protocols are_____ in OSI and ______in the Internet (SNMP/CMIP)
226>The application functions are divided into___ categories of management (3/4/5)
VTU
N
O
TESBYSR
I
23. NETWORK MANAGEMENT SYSTEMS
22
227>The application functions are divided into following categories of management
a: configuration
b: fault
c: performance
d: security
e: accounting
Ans:___________ (a/b/c/d/e/all)
ANSWERS
1>functional
2>1-c 2-a 3-b
3>service, system, network
4>T
5>Internet
6>Internet, OSI
7>OSI
8>Telecommunication Management Network
9>all
10>all
11>all
12>all
13>both
14>Common Management Information Protocol
15>Common Management Information Service
16>CMIP, CMIS
17>both
18>both
19>CMIP, SNMP
20>IETF (Internet Engineering Task Force)
21>TMN
22>TMN, ITU
23>1,2
24>IEEE
25>802
26>1,2,3
27>LLC
28>browser
29>Desktop Management Task Force
30>DMTF
31>DMTF
32>JMX
33>CMIP
34>T
35>4
36>all
37>organization
38>10040
39>organization
40>information
41>10165
42>Structure of Management Information
43>Management Information Base
44>SMI,MIB
45>3
46>all
47>functional
48>5
49>OSI
50>T
51>T
52>OSI
53>IEEE
VTU
N
O
TESBYSR
I
24. NETWORK MANAGEMENT SYSTEMS
23
54>communication
55>organization
56>all
57>organization
58>T
59>Management Database
60>agent
61>unmanaged
62>T
63>manager
64>manager, agent
65>3
66>manager, agent
67>Manager of Managers
68>NMS
69>information
70>information
71>information
72>SMI, MIB
73>MIB
74>manager, agent
75>MDB,MIB
76>MDB,MIB
77>all
78>managed
79>Management Information Tree
80>OSI
81>3
82>all
83>International Standards Organization
84>International Telecommunications Union
85>5
86>all
87>T
88>5
89>1155
90>all
91>1-e 2-d 3-c 4-b 5-a
92>Internet, OSI
93>OSI
94>attribute
95>behavior
96>all
97>get&set, response&alarm
98>OSI, Internet
99>access
100>status
101>1-e 2-c 3-d 4-b 5-a
102>1-d 2-e 3-b 4-c 5-a
103>all
104>all
105>T
106>3
107>all
108>1-b 2-c 3-a
109>both
110>OSI
111>Internet
112>both
113>connectionless
114>connection oriented
115>CMIP,SNMP
VTU
N
O
TESBYSR
I
27. NETWORK MANAGEMENT SYSTEMS
26
CHAPTER 4:SNMPv1 NETWORK MANAGEMENT—
ORGANIZATION & INFORMATION MODELS
1>__________management is also referred to as Internet management (SMTP/SNMP)
2>SNMP network management systems can manage even non-TCP/IP network elements through proxy agents
(true/false)__________
3>SNMP management is the most widely used __________ (NMS/NOC)
4>__________comprises management process, agent process and network elements (NMS/NOC)
5>The SNMP information model consist of
__________ (MIB/SMI/both)
6>___________uses ASN.1 syntax to define managed objects (MIB/SMI)
7>___________defines the relationship between managed objects and groups of related objects into MIB modules
(MIB/SMI)
8>MIB2 is a superset of MIB1 and is used in SNMPv__ (1/2)
9>The SNMP architecture, administration and access policies fall under___________ model
(organization/communication)
10>ICMP was developed to manage___________ (ARPANET/INTERNET)
11>___________is a mechanism to transfer control messages between nodes (PING/ICMP)
12>PING stands for__________
13>A popular example of ICMP is___________ (RING/PING)
14>___________i a simple tool used to investigate the heath of a node and the robustness of communication with it
from the source node (PING/ICMP)
15>IAB stands for___________
16>__________was formed to administer Internet activities (ICB/IAB)
17>SGMP stands for___________
18>___________is used to monitor and configure gateways remotely (SNMP/SGMP)
19>_____is an enhancement of______ (SNMP/SGMP)
20>SNMPv__ was developed to make it independent of the OSI standard (1/2/3)
21>IAB was charged with the responsibility to manage following task forces
a: IEEE
b: IETF
c: IRTF
Ans:___________ (a/b/c/all)
22>___________is an organization that maintains several archives of documents related to the Internet and the
IETF's activities (IntraNIC/InterNIC)
23>InterNIC stands for___________
24>STD stands for___________
25>FYI stands for___________
26>IANA stands for___________
27>___________is the central coordinator for the assignment of unique parameter values for Internet protocols
(IETF/IANA)
28>___________RFC subseries was created by to document overviews and topics that are introductory (STD/FYI)
29>___________RFC subseries was created to identify those RFCs that do in fact specify Internet standards
(STD/FYI)
30>There are ___ series of RFC and STD documents (3/4/5)
31>Following are the series of RFC and STD documents
___________ (SMI/MIB/SNMP/all)
32>RFC=____defines the SNMP protocol. RFC=____is on protocol operations. RFC=___ is on transport mappings
(1905/1905/1157)
33>SMI form the contents of RFC=___________ (1155/1156/1157)
34>RFC=____/STD=_____ is currently in use for MIB (1213/1217/13/17)
35>RFC=______is a draft version of MIB2 for SNMPv2 (1155/1907)_____
36>The infrastructure of the manager agent and the SNMP architecture that it is based form ___________model
(information/organization/functional)
37>wrt SNMP, definition of syntax and semantics form the basis of the ___________model
(information/organization/functional)
38>The two tier organization model consists of_____ process which resides in the managed object and______
process which resides in the NMS and manages the managed object (network manager/network agent)
VTU
N
O
TESBYSR
I
28. NETWORK MANAGEMENT SYSTEMS
27
39>In two tier organization model, multiple managers can interact with one agent (true/false)___________
40>RMON stands for___________
41>In three tier organization model, _________is inserted between the managed object and the network manager
(RMAN/RMON)
42>The pure SNMP management system consists of ___________ (SNMP agent/SNMP manager/both)
43>HFC stands for___________
44>An SNMP management system can behave as an agent as well as a manager (true/false)___________
45>___________model is concerned only with the TCP/IP suite of protocols and does not address the layers above
or below it (OSI/Internet)
46>SNMP interfaces to the TCP/IP with ________are the transport layer protocol (TCP/UDP)
47>RFC=____ describes SNMP system architecture (1156/1157/1158)_
48>RFC=_____ defines SNMP by which management information for a network element may be inspected or
altered by logically remote users (1156/1157/1158)
49>RFC=____describes the structure and identification of management information, and RFC=_______addresses
the information base that is required for management (1154/1155/1156/1157)
50>The communication of management information among management entities is realized through exchange
of___ protocol messages (4/5/6)
51>The communication of management information among management entities is realized through exchange of
following protocol messages
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e/all)
52>Following protocol messages are initiated by the manager application process
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e)
53>Following messages are generated by the agent process
a: get-request
b: get-next-request
c: set-request
d: get-response
e: trap
Ans:___________ (a/b/c/d/e)
54>The message generation is called___________
55>__________is unsolicited alarm message (get-response/trap)
56>___________message is generated by the management process requesting the value of an object (get-
request/get-next-request/set-request/get-response/trap)
57>An object may have multiple values because of multiple instances of the object, in this case, _________
message can be used (get-request/get-next-request)
58>___________message is generated by the management process to initiate or reset the value of an object variable
(get-request/get-next-request/set-request/get-response/trap)
59>___________message is generated by an agent process (get-request/get-next-request/set-request/get-
response/trap)
60>___________is an unsolicited message generated by an agent process w/o a message or event arriving from the
manager process (get-request/get-next-request/set-request/get-response/trap)
61>SNMP manager contains following sets of data
a: one on the information about the objects
b: one on the values of the objects
Ans:___________ (a/b/both)
62>In q61, b is ______ (static/dynamic) and contains the measured values associated with the object_____
(true/virtual) database
.63>A MIB is _____ (true/virtual) database and is_________ (static/dynamic)
64>SNMP _____has a database which is the physical database and the SNMP ______does not have a physical
database (agent/manager)
65>_________have MIB which is compiled into the software module (agent/manager)
66>___________model deals with SMI and MIB (organization/functional/information)
VTU
N
O
TESBYSR
I
29. NETWORK MANAGEMENT SYSTEMS
28
67>The syntax used to describe management information is ASN._ (0/1/2)
68>The specification and organizational aspects of managed objects are addressed in______ (MIB/SMI)
69>The specifications of managed objects and the grouping of. And relationship between, managed objects are
addressed in ________ (MIB/SMI)
70>RFC=___ for SMI. RFC=____ for MIB (1213/1312/1157/1157)
71>Match the following
FDDI :RFC 1695
OSPF :RFC 1285
ATM :RFC 1253
72>A managed object is composed of___________ (object type/object instance/both)
73>SMI is concerned only with_____ and not______ (object type/object instance)
74>___________is a data type , has a name, syntax , and an encoding scheme (object type/object instance)
75>The syntax of an object type is defined using ____and _____have been adopted as the encoding scheme for
transfer of data types between agent and manager processes , as well as between manager processes (BER/ASN.1)
76>Every object type (every name) is uniquely identified by___________ (DESCRIPTOR/OBJECT IDENTIFIER)
77>DESCRIPTOR and OBJECT IDENTIFIER are in uppercase letters because they are___________ keywords
(BER/ASN.1)
78>There are____ objects under the internet object (3/4/5)_______
79>Following are the subnodes under Internet node in SNMPv1
a: directory
b: mgmt
c: experimental
d: private
Ans:___________ (a/b/c/d/all)
80>____________node is reserved for future use of OSI directory in the Internet
(directory/mgmt/experimental/private)
81>___________node is used to identify all IETF recommended and IAB approved subnodes and objects
(directory/mgmt/experimental/private)
82>___________node was created to define objects under IETF experiments (directory/mgmt/experimental/private)
83>___________is a heavily used node (directory/mgmt/experimental/private)
84>___________syntax is used to define the structure of object types (BER/ASN.1)
85>in ASN.1 data type, there are___ categories under structure (3/4/5)________
86>in ASN.1 data type, there are following categories under structure
a: simple
b: defined
c: constructor
Ans:___________ (a/b/c/all)
87>Simple, defined and constructor types are also called___ ____&____respectively
(application/structured/primitive)
88>SEQUENCE & SEQUENCE OF are not called base types (true/false)___________
89>The primitive or simple types are atomic and are INTEGER, OCTET STRING, OBJECT IDENTIFIER &
NULL. These are also referred to as ___________types (aggregate/non-ggregate)
90>When the integer value is restricted by a range it is called___________ (signed/ subtype)
91>The data type ENUMERATED is a special case of the ______data type (REAL/INTEGER)
92>Following are data types under Primitive types
a: INTEGER
b: OCTET STRING
c: OBJECT IDENTIFIER
d: NULL
Ans:___________ (a/b/c/d/all)
93>Following are data types under defined types
a: NetworkAddress b: IpAddress
c: Counter d: Gauge
e: TimeTicks f: Opaque
Ans:___________ (a/b/c/d/e/f/all)
94>Following are data types under constructor types
a: SEQUENCE
b: SEQUENCE OF
Ans:___________ (a/b/both)
95>Match the following
INTEGER :placeholder
VTU
N
O
TESBYSR
I
30. NETWORK MANAGEMENT SYSTEMS
29
OCTET STRING :object position in MIB
OBJECT IDENTIFIER :8bit bytes binary and textual data
NULL :subtypes INTEGER (n1. . . .nN)
96>Match the following
NetworkAddress :application wide arbitrary ASN.1 syntax, double wrapped OCTET STRING
IpAddress :non-negative integer in hundredth of second units
Counter :capped, on-negative integer, increase or decrease
Gauge :wraparound, non-negative integer, monotonically increasing, may 2^32-1
TimeTicks :dotted decimal IP address
Opaque :Not used
97>____:List maker::______: Table maker (SEQUENCE/SEQUENCE OF)
98>___________data type is used to specify either binary or textual information that is 8 bits long (OCTET
IDENTIFIER/OCTET STRING)
99>The combination keyword __________is the object position in the MIB (OBJECT STRING/OBJECT
IDENTIFIER)
100>___________are application specific data types and are SNMP based types (primitive/defined)
101>The base type ________is used to specify octets of binary information (Gauge/Opaque)
102>__________is intended for adding new base types to extend SNMP SMI (Gauge/Opaque)
103>__________is a choice of the address of the protocol family (IpAddress/NetworkAddress)
104>__________is the conventional four groups of dotted decimal notation of IPv4 (IpAddress/NetworkAddress)
105>__________is an application wide data type and is a non-negative integer (TimeTicks/Gauge/Counter)
106>Counter can only increase in value up to a maximum of 2^__-1 and then wraps around starting from 0
(16/32/64)
107>The data type __________is a non-negative integer , but its value can move either up or down
(Counter/Gauge/TimeTicks)
108>Gauge pegs at its maximum value of 2^__-1 (16/32/64)________
109>__________is a non-negative integer and measures time in units of hundredth of a second
(Counter/Gauge/TimeTicks)
110>The maximum value of TimeTicks is 2^__-1 (16/32/64)
111>__________is an application wide data types that supports the capability to pass arbitrary ASN.1 syntax
(Gauge/Opaque)
112>__________is used to create data types based on previously defined data types (Gauge/Opaque)
113>Size of ________is undefined in SNMPv1, which causes some problem in its implementation (Gauge/Counter/
Opaque)
114>The Opaque data type can be defined both IMPLICITly and EXPLICITly (true/false)__________
115>The constructs ______&____which are in ASN.1, are not included in SNMP based management syntax
(SEQUENCE/SEQUENCE OF/SET/SET OF)
116>____is used to build a list and______ is used to build a table (SEQUENCE/SET/SEQUENCE OF/SET OF)
117>Identify syntax for list
a: SEQUENCE OF <entry>
b: SEQUENCE {<type1>, <type2>. . . . <typeN>}
Ans:__________ (a/b/either)
118>Identify syntax for table
a: SEQUENCE OF <entry>
b: SEQUENCE {<type1>, <type2>. . . . <typeN>}
Ans:__________ (a/b/either)
119>Identify SNMPv1 keywords
a: ACCESS b: BEGIN
c: CHOICE d: Counter
e: DEFINITIONS f: DEFVAL
Ans:___________ (a/b/c/d/e/f/all)
120>Identify SNMPv1 keywords
a: DESCRIPTION b: END
c: ENTERPRISE d: FROM
e: Gauge f: IDENTIFIER
Ans:___________ (a/b/c/d/e/f/all)
121>Identify SNMPv1 keywords
a: IMPORTS b: INDEX c: INTEGER
d: IpAddress `e: NetworkAddress f: OBJECT
Ans:___________ (a/b/c/d/e/f/all)
VTU
N
O
TESBYSR
I
31. NETWORK MANAGEMENT SYSTEMS
30
122>Identify SNMPv1 keywords
a: OBJECT-TYPE
b: OCTET
c: OF
d: Opaque
e: REFERENCE
f: SEQUENCE
Ans:___________ (a/b/c/d/e/f/all)__________
123>Identify SNMPv1 keywords
a: SIZE
b: STATUS
c: STRING
d: SYNTAX
e: TRAP-TYPE
f: VARIABLES
g: TimeTicks
Ans:___________ (a/b/c/d/e/f/g/all)__________124>SNMPv1 has adopted ____with its____for encoding the
information to be transmitted between agent and manager processes (TLV/ASN.1/BER)___
125>Match the following
ipAdEntAddr :SEQUENCE
ipAdEntIfIndex :INTEGER
ipAdEntNetMask :IpAddress
ipAdEntReasmMaxSize:
ipAdEntBcastAddr:
ipAdEntry
126>Wrt OBJECT IDENTIFIER, if the most significant bit (8th bit) is set to___ , then the subidentifier is only one
octet long. The 8th bit is set to ___for the value that requires more than one octet and indicates more octets to
follow (0/1)___
127>_____ is encoded as straight octet strings._____ _____ & _____ coded as integers._____Is coded as OCTET
STRING type (IP address/opaque/counter/gauge/TimeTicks)
128>Match the following
OBJECT IDENTIFIER :APPLICATION 1
SEQUENCE :APPLICATION 3
IpAddress :APPLICATION 2
Counter :APPLICATION 4
Gauge :APPLICATION 0
TimeTicks :UNIVERSAL 6
Opaque :UNIVERSAL 16
129>A managed object has ____parameters (3/4/5)
130>A managed object has following parameters
a: textual name b: syntax
c: definition d: access
e: status
Ans:_________ (a/b/c/d/e/all)
131>OBJECT DESCRIPTOR does not specify instances of a managed object (true/false)___________
132>Associated with each _____is ______, which is the unique position it occupies in the MIB (OBJECT
IDENTIFIER/OBJECT DESCRIPTOR)
133>__________is the ASN.1 definition of the object type (definition/access/status/syntax)
134>__________is an accepted textual description of the object type (definition/access/status/syntax)
135>__________is the specification for the type of privilege associated with accessing the information
(definition/access/status/syntax)
136>Access is the specification for the type of privilege associated with accessing the information, it can be
__________ (read only/read write/not accessible/either of them)
137>__________specifies whether the managed object is current or obsolete (definition/access/status/syntax)
138>Related objects can be grouped to form ______ object type and the objects that make up the aggregate object
type are called ____object type component/subordinate /aggregate)
139>In order to encode the information on a managed object to be processed by machines , it has to be defined in a
formalized manner. This is done using__________ (micro/macro)
140>The body of the macro module consists of __________parts (3/4/5)
141>The body of the macro module consists of following parts
a: type notation
VTU
N
O
TESBYSR
I
32. NETWORK MANAGEMENT SYSTEMS
31
b: value notation
c: supporting productions
Ans:__________ (a/b/c/all)
142>____NOTATION defines the object types in the module and ______NOTATION defines the name of the
object (TYPE/VALUE)
143>Access can be only one of following options
a: read only
b: read write
c: write only
d: not accessible
Ans:__________ (a/b/c/d/all)
144>Allowed values for Status are
a: mandatory
b: optional
c: obsolete
Ans:__________ (a/b/c/all)
145>__________object is a group of related objects (compound/aggregate)
146>Object ___ is the managed object ipAddrEntry consist of the subordinate object types of___ through ___
(1/2/5)
147>ipAddrEntry describes the complete set of information consisting of the__ fields needed for an entry in the IP
interface address table (4/5/6)
148>The text following ___are comments and are not encoded (** / --)
149>The __________clause uniquely identifies the instantiation of the entry object type in the table
(REFERENCE/INDEX)
150>The__________ clause is the textual reference to the document from which the object is being mapped
(REFERENCE/INDEX)
151>_____clause is the columnar object identifier while______ clause is the default value to be object
(REFERENCE/INDEX/DEVAL)
152>SNMP operations apply exclusively to scalar operations (true/false)___________
153>_________object type comprises one or more subtypes (compound/aggregate)
154>RFC=____ for SMI (1551/1515/1155)_______
155>RFC=____ for MIB2 (1312/1213)_______
156>MIB is a_______ information store (true/virtual)
157>Objects in the MIB are defined using ASN.1 (true/false)__________
158>__________defines the mechanism for describing the objects (MIB/SMI)
159>The definition of MIB consists of___ components (3/4/5)
160>The definition of MIB consists of following components
a: name
b: syntax
c: encoding
Ans:________ (a/b/c/all)
161>The term __________mandates the implementation of the object in the current version of MIB2
(decrypted/deprecated)
162>Objects that are related are grouped into _____while object types are grouped to form_____ (aggregate object
type/object group)
163>The MIB module structure consists of
a: module name
b: imports from other modules
c: definitions of the current module
Ans:__________ (a/b/c/all)
164>Identify correct MIB module structure
a: <module name> DEFINITIONS::=BEGIN
<imports>
<definitions>
END
b: <module name> BEGIN::=DEFINITIONS
<imports>
<definitions>
END
Ans:__________ (a/b/either)
165>__________group contains the objects that describe system administration (System/Interface/Address
Translation)
VTU
N
O
TESBYSR
I
33. NETWORK MANAGEMENT SYSTEMS
32
166>__________group defines the interfaces of the network component and the network parameters associated
with each interface (System/Interface/Address Translation)
167>__________group is a cross reference table between the IP address and the physical address
(System/Interface/Address Translation)
168>__________group is a placeholder for future use of the OSI protocol (Transmission/CMOT)
169>___________group was created as a placeholder for network transmission related parameters
(Transmission/CMOT)
170>__________group is the communication protocol group associated with SNMP management (SMT/SNMP)
171>__________group is a placeholder and is not yet defined (Transmission/CMOT)
172>__________group is based on the transmission media that underlie each interface of the system
(transfer/transmission)
173>Match the following
System :mib2 11
Interfaces :mib2 9
at :mib2 7
ip :mib2 5
icmp :mib2 3
Tcp : mib2 1
Udp :mib2 2
egp :mib2 4
cmot :mib2 6
Transmission :mib2 8
Snmp :mib2 10
174>__________group is the basic group in the Internet standard MIB (at/snmp/System)
175>Implementation of the System group is mandatory for all systems in both agent and manager
(true/false)__________
176>The System group consists of___ entities (5/6/7)
177>The System group consists of following entities
a: sysDescr
b: sysObjectId
c: sysUpTime
d: sysContact
e: sysName
f: sysLocation
g: sysServices
Ans:__________ (a/b/c/d/e/f/g/all)
178>_________group contains managed objects associated with the interfaces of a system (System/Interface/snmp)
179>Implementation of the Interfaces group is mandatory for all systems (true/false)__________
180>The Interface group consists of following nodes__________ (ifNumber/ifTable/both)
181>wrt Interface group, the number of interfaces of the entity is defined by ____and the information related to
each interface is defined in the Interface table______ (ifIndex/ifTable/ifNumber)
182>Match the following
sysDescr : system 7
sysObjectId :system 5
sysUpTime :system 3
sysContact :system 1
sysName :system 2
sysLocation :system 4
sysServices :system 6
183>Match the following
ifNumber :largest size of the datagram for the interface
ifTable :type of interface layer below the network layer defined as an enumerated integer
ifEntry :total number of network interfaces in the system
ifDescr :list of entries that describes information on each interface of the system
ifType :an interface entry that contains objects at the subnetwork layer for a particular interface
ifMtu :a unique integer value for each interface
184>Match the following
ifSpeed :value of sysUpTime at the current operational status
ifPhysAddress :current operational status of the interface
ifAdminStatus :current or nominal data rate for the interface in bps
VTU
N
O
TESBYSR
I
34. NETWORK MANAGEMENT SYSTEMS
33
ifOperStatus :interface's address at the protocol layer immediately below the network layer
ifLastCange :reference to MIB definitions specific to the particular media used to realize the interface
ifSpecific :desired status of the interface ie up, down or testing
185>Match the following
ifInOctets :number of unsupported protocol packets discarded
ifInUcastPkts :number of inbound packets discarded
ifInNUcastPkts :number of subnetwork unicast packets delivered to a higher layer protocol
ifInDiscards :total number of input octets received
ifInErrors :number of non-unicast packets delivered to a higher layer protocol
ifInUnknownProtos :number of inbound packets with errors
186>Match the following
ifOutOctets :length of the output queue in packets
ifOutUcastPkts :number of outbound packets discarded
ifOutNUcastPkts :total number of unicast packets that higher level layer requested to be transmitted
ifOutDiscrds :number of octets transmitted out of the interface
ifOutErrors :total number of non-unicast packets that higher level layer requested to be transmitted
ifOutQLen :number of outbound packets tat could not be transmitted because of errors
187>__________is defined are an Enumerated INTEGER (ifNumber/ifType)
188>In interface group, object identifiers 11 through 15 refer to the measurements on_____ traffic and object
identifiers 16 through 21 to measurement on_____ traffic (outbound/inbound)
189>The Address Translation group consists of table that converts _____to _____for all the interfaces of the system
(physical address/NetworkAddress)
190>The Internet uses __as the networking protocol (TCP/IP)________
191>__________group has the information on the various parameters of the protocol (system/ip/at)
192>The implementation of IP group is mandatory (true/false) __________
193>The IP group contains following tables
a:IP address table
b:IP routing table
c:IP address translation table
Ans:__________ (a/b/c/all)
194>__________indicate whether the node is acting as just as route or gateway between two autonomous networks
(ipForwDatagrams/ipForwarding)
195>Match the following
ipForwarding :number of input datagrams discarded due to unsupported
protocolipDefaultTTL :number of input datagrams discarded due to header error
ipInRecieves :number of datagrams discarded due to address errors
ipInHdrErrors :number of input datagrams attempted to forward to the destination
ipInAddrError :number of locally addressed datagrams received successfully but discarded due to
unsupported protocol
ipForwDatagrams :total number of input datagrams received from interfaces including those in error
ipInUnknownProtos :node acting as a gateway or not
ipInDiscards :time-to-live field of IP header
196>Match the following
ipInDelivers :number of failures detected by the IP reassembly algorithm
ipOutRequests :number of successfully reassembled datagrams
ipOutDiscards :number of IP datagrams received that need reassembly
ipOutNoRoutes :maximum number of seconds that received fragments are held while they are awaiting
reassembly
ipReasmReqds :number of IP datagrams discarded because no route could be found to transmit than to
their destinations
ipReasmOKs :number of no error IP datagram discarded due to lack of buffer space
ipReasmFails :total number of IP datagrams which local IP user protocols supplied to IP
ipReasmTimeOut :total number of input datagrams successfully delivered to IP user protocols
197>Match the following
ipFragOKs :number of routing entries discarded even though they were valid
ipFragFails :IP address translation table that maps IP addresses to physical address
ipFragCreates :IP routing table containing an entry for each route
ipAddrTable :Number of datagram fragments generated as a result of fragmentation
ipNetToMediaTable :number of IP datagrams not fragmented due to Don’t fragment flag set
ipRoutingDiscards :number of successfully fragmented datagrams
VTU
N
O
TESBYSR
I
35. NETWORK MANAGEMENT SYSTEMS
34
ipRouteTable :table of IP addresses
198>An entry_____ in ipRouteDest Is considered a default route (1.1.1.1/0.0.0.0)
199>Match the following
ipAddrTable :broadcast address indicator bit
ipAddrEntry :index value of the entry
ipAdEntAddr :one of the entries in the IP address table
ipAdEntIfIndex :table of IP addresses
ipAdEntNetMask :the IP address to which this entry's addressing information pertains
ipAdEntBcastAddr :subnet mask for the IP address of the entry
ipAdEntReasmMaxSize :largest IP datagram that can be reassembled on this interface
200>Match the following
ipRouteTable :reference to MIB definition specific to the routing protocol
ipRouteEntry :mask to be logically ANDed with the destination address before comparing with the
ipRouteDest field
ipRouteDest :Routing mechanism by which this route was learned
ipRouteIfIndex :IP address of the next hop
ipRouteMetric1 :primary routing metric for this route
ipRouteNextHop :number of seconds since routing was last updated
ipRouteType :type of route
ipRouteProto :IP routing table
ipRouteAge :route to a particular destination
ipRouteMask :destination IP address of this route
ipRouteInfo :index of interface
ipRouteMetric2 :an alternative metric for this route
201>Match the following
ipNetToMediaTable :type of mapping
ipNetToMediaEntry :IP address
ipNetToMediaIfIndex :media dependent physical address
ipNetToMediaPhysAddress :table mapping IP addresses to physical addresses
ipNetToMediaNetAddress :IP address to physical address for the particular interface
ipNetToMediaType :Interface on which this entry's equivalence is effective
202>Match the following
ipForward :address of next system
ipForwardNumber :mask to be logically ANDed with the destination address before comparing with the
ipRouteDest field
ipForwardTable :a particular route to a particular destination under a particular policy
ipForwardEntry :number of entries in the IP forward table
ipForwardDest :contains information on IP forwarding table, deprecator IP routing table
ipForwardMask :routing table of this entity
ipForwardPolicy :destination IP route of this address
ipForwardNextHop :set of conditions that selects one multipath route
203>Match the following
ipForwardIfIndex :an alterntive routing metric for this route
ipForwardType :primary routing metric for this route
ipForwardProto :autonomus system number of next hop
ipForwardInfo :reference to MIB definition specific to the routing protocol
ipForwardNextHopAS :number of seconds since routing was last updated
ipForwardMetric1 :routing mechanism by which this route was learned
ipForwardMetric2 :type of route--remote, local, invalid or otherwise
ipForwardAge :ifIndex value of the interface
204>The entity__________defines the general set of conditions that would cause the selection of one multipath
route over others (ipForwardProto/ipForwardPolicy)
205>___________is a precursor of SNMP and is part of the TCP/IP suite (IGMP/ICMP)
206>Match the following
icmpInMsgs :number of ICMP echo reply message received
icmpInErrors :number of ICMP echo message received
icmpInDestUnreachs :number of ICMPredirect messages received
icmpInTimeExcds :number of ICMP source quench messages received
icmpInParmProbs :number of ICMP parameter problem messages received
VTU
N
O
TESBYSR
I
36. NETWORK MANAGEMENT SYSTEMS
35
icmpInSrcQuenches :number of ICMP time exceeded messages received
icmpInRedirects :number of ICMP destination unreachable messages received
icmpInEchoe :total number of ICMP messages received by the entity including icmpInErrors
icmpInEchoReps :number of message received by the entity with ICMP specific errors
207>Match the following
icmpInTimestamps :number of ICMP parameter problem messages sent
icmpInTimestampReps :number of ICMP Time exceeded messages sent
icmpInAddrMasks :number of ICMP destination unreachable messages sent
icmpInAddrMasksReps :number of ICMP timestamp message received
icmpOutMsgs :number of ICMP reply messages received
icmpOutErrors :number of ICMP address mask request messages received
icmpOutDestUnreachs :number of ICMP address mask reply messages received
icmpOutTimeExcds :total number of ICMP messages attempted to be sent by this entity
icmpOutParmProbs :number of good ICMP messages not sent, does not include the ones with errors
208>Match the following
icmpOutSrcQuechs :number of ICMP address mask reply messages sent
icmpOutRedirects :number of ICMP address mask request messages sent
icmpOutEchos :number of ICMP timestamp reply messages sent
icmpOutEchoReps :number of ICMP timestamp message sent
icmpOutTimestamp :number of ICMP echo reply messages sent
icmpOutTimestampReps :number of ICMP echo messages sent
icmpOutAddrMasks :number of ICMP redirect messages sent
icmpOutAddrMasksReps :number of ICMP source quench messages sent
209>In TCP group, the table entry has following indices to uniquely define it in the table
a:tcpConnLocalAddress
b:tcpConnLocalPort
c:tcpConnRemAddress
d:tcpConnRemPort
Ans:___________ (a/b/c/d/all)
210>Match the following
tcpRtoAlgorithm :number of resets done to either CLOSED or LISTEN
tcpRtoMin :number of failed attempts to make connection
tcpRtoMax :number of passive connections made LISTEN to SYN-RCVD state
tcpMaxConn :number of active connections made CLOSED TO SYN-SENT state
tcpActiveConn :Maximum number of TCP connections
tcpPassiveOpens :maximum value for timeout in milliseconds retransmission
tcpAttemptsFails :minimum value for timeout in milliseconds for retransmission
tcpEstabResets :timeout algorithm for retransmission of octets
211>Match the following
tcpCurrEstab :number of segment send containing RST flag
tcpInSegs :Total number of segments received in error
tcpOutSegs :Total number of segments retransmitted
tcpRetransSegs :TCO connection table
tcpConnTable :Total number of segments sent excluding retransmission
tcpInErrs :total number of segments received including with errors
tcpOutRsts :no of connections for which the current state is either ESTABLISHED or CLOSED WAIT
212>Match the following
tcpConnTable :remote port number
tcpConnEntry :remote IP address
tcpConnState :local port number
tcpConnLocalAddress :local IP address
tcpConnLocalPort :state of the TCP connection
tcpConnRemAddress :information about a particular TCP connection
tcpConnRemPort :TCO connection table
213>Match the following
udpInDatagrams :information about a particular connection or UDP listener
udpNoPorts :local IP address
udpInErrors :local UDP port
udpOutDatagrams :total number of datagrams delivered to the users
VTU
N
O
TESBYSR
I