SlideShare a Scribd company logo
SEM VIII EXTC
Question Bank: Network Management in Telecommunication [ECCDLO 8044]
2 marks question
Module 1: Introduction of Network Management
1] What problem would you expect the NMS to resolve, and how?
2] What are the Challenges of IT Manager?
3] Explain trouble ticket administration?
4] Draw Network Management Dumb bell architecture.
5] In absence of a sophisticated NMS, explain the methods used for Management in an
organization.
6] List some common network problems.
7] Why NMS is required?
8] Draw the Dumbbell architecture for Network management.
9] What is the goal of Network Management?
10] What is self healing in network management?
Module 2: OSI Network Management
1] Draw the OSI Management information Tree.
2] What is CMISE? List the services of CMISE.
3] Sketch the functional groupings of Network Management.
4] Encode the INTEGER 1456 using TLV encoding
5] Encode ObjectIdentifier 1.3.6.1 (iso.org.dod.internet) using TLV encoding.
6] In a ballroom dance, the conductor asks the guests to group themselves into couples made up
of a male and a female (order does not matter) for a dance. Write an ASN.1 module for the dance
Group with data type DanceGroup that is composed of data type Couple; couple is constructed
using male and female.
Note:[ Refer to problems from Mani : solved and Unsolved. Solutions are available online]
7] Show the encoding for the OCTET STRING “Hello World.”
8] Show the TLV encoding of IPAddress 131.21.14.8.
9] Sketch two-tier network management organization model.
10] Sketch three-tier network management organization model.
11] Differentiate between MIB and MDB
12] Identify difference between list and ordered list in abstract syntax notation one (ASN.1)
13] What are managed and unmanaged objects? How are they different from each other?
14] Explain the structure of MACRO in ASN.1
15] What SMI composed of?
16] Explain NMS behaving as manager and agent both.
17] Give the scenario when trap notification is generated by agent.
18] What is the purpose of RMON? How does it help manager?
19] How a network element added to the network a discovery process?
Module 3: Internet Management
1] Draw SNMPv1 PDU and label it.
2] What do you mean by SNMP bilingual manager?
3] Enlist features of SNMPv3 security model
4] Draw and label the Get and Set type PDU.
5] Draw architecture of SNMPv3
6] What do you mean by MIB?
7] What do you mean by SMI?
8] Draw SNMP message format.
9] Draw the PDU format of get/set in SNMP.
10] What is the primary goal of SNMP v 3.
11] Compare Internet management and OSI Management.
12] Give the scenario when trap notification is generated by SNMPv1 agent.
13] Draw architecture of SNMPv2.
Module 4: Telecommunication Management Networks (TMN)
1] Why there is need for TNM?
2] What are the basic objectives of TNM?
3] Draw the TMN Relationship to Data and Telecommunication Networks
4] Draw the TMN Conceptual Model.
5] What are TMN standards? (Draw)
6] Draw TMN Functional Architecture.
7] Explain the significance of TMN reference point.
8] What do you mean by eToM
Module 5: Network Management Tools and Applications
1] What is data monitoring?
2] What are the parameters that define the network management?
3] Draw generic architecture of event correlation system.
4] Mention the guides to setup policies and procedures.
5] What is performance management?
6] What is secure communication network? Explain security breaches and the resource needed to
prevent it.
7] What is the role of network management in accounting management?
8] List the process involved in fault management.
9] What are the parameters that define the network management?
10] What are the types of firewalls?
Module 6: Broad Band Network Management
1] What is the purpose of M2 interface?
2] Define VPC.
3] What is the role of SNMP and ILMI in ATM management?
4] Where M2 interface is employed?
5] What is ATM LANE?
6] What is ATM digital exchange interface management?
5 Marks Questions OF NMT
Module 1: Introduction of Network Management
1] What is the Perspective of Network Management?
2] Describe the goal of Network Management
3] List the network management standards and write two salient points about each.
4] What are the challenges/ Perspective of IT Manager?
5] Discuss about the goals and functions of network management.
6] Explain about the network management architecture and organization.
7] List the problems that can be resolved by NMS?
8] Give a top-down view of network management function?
Module 2: OSI network Management
1] Compare managed object from Internet and OSI perspective.
2] Write the ASN.1 structure for the following informal structure.
Name John P. Smith
Address 1234 Global Mills Road City Jersey
State LA
Zipcode 31134
3] a) Encode Octet string '0C1B'H using TLV encoding
b) Encode INTEGER 16 using TLV encoding using binary and Hex notation
[Note: practice on similar examples only]
4] Define MACROS with respect to ASN.1 encoding.
5] Define and Draw the ASN.1 Data type Structure and Tag.
6] Explain the OSI communication model
7] Explain the conceptual view of managed object.
8] Illustrate the management information model
9] Describe the OSI functional model.
10] Describe the encoding structure and macros of ASN.1.
11] Explain about the terminology, Symbols and conventions of ASN.1
12] Explain the Communication Model of OSI that deals with the application entity layer and the
intersystem message protocol. (Refer appendix of Book by Mani)
13] What is Aggregate Object? Discuss the representation of Aggregate Object as Columnar
object.
14] Explain Web-Based Enterprise Management (WBEM) .
15] Explain Java Management Extension (JMX)) .
16] Explain XML – based Network Management.
17] Explain CORBA- based Network Management.
Module 3: Internet Management
1] Analyze the major changes in SNMP version 2.
2] Defend the SNMP Interoperability
or
Illustrate how the compatibility issue will be solved when migrating from SNMPv1 to SNMPv2.
3] Justify and explain the SNMP community-profile and access policy.
4] Construct the Internet MIB II group.
5] Draw and explain the get/set type PDU in SNMP.
6] Draw and Explain the SNMP trap PDU.
7] Explain SNMP V3 security model.
8] What do you mean by remote monitoring?
9] What are the advantages of RMON?
10] What are the RMON standards?
Module 4: Telecommunication Management Networks (TMN)
1] Sketch the TMN functional architecture.
2] What is the need for TMN?
3] What is the relationship between data and telecommunication networks?
4] What is TMN conceptual model?
5] Explain TMN physical architecture.
Module 5: Network Management Tools and Applications
1] What do you mean by network provisioning?
2] What are the steps of fault management?
3] Explain how performance management is performed.
4] What do you mean by Service Level Management?
5] Explain Inventory Management.
6] Explain Security Management.
7] Explain Accounting Management
8] Describe about codebook correlation model
9] What is the process involved in SLM?
10] List and contrast the tools available to discover the network components.
Module 6: Broad Band Network management
1] What do you mean by ATM Lan Emulation.
2] Explain the class I and class II requirement of a carrier management system in ATM
3] What is meant by the dual view of the M4 INTERFACE?
4] Explain ATM Digital Exchange Interface management
5] Explain the ATM relationship to TNM layered Architecture.
6] Draw and explain ATM Forum Management Interface Reference Architecture.
7] What are the roles of SNMP and ILMI in ATM Management? (Refer M2 Interface)
10 Marks question of NMT
Module 1
1] Explain goal of Network management ( Ans expected with functional grouping and flow
diagram)
2] Explain different perspective of network management.
3] Cite some case histories on network, system and service management.
4] Explain about the network management architecture and organization.
Module 2
1] Compare various Network Management Standards.
2] Explain OSI Organization model
or
Construct OSI Organizational model for two tier, three tier and MoM network management
3] A network administrator wishes to monitor 5000 workstations to see whether they are
switched on or not. In order to do this each machine is periodically pinged. The message size in
both directions is 180 bytes. Also includes 20 bytes of IP overhead. The administrator’s NMS
(network management station) is on a 10 Mbps 802.3 switched LAN operating in half-duplex. If
each machine is pinged every 50 seconds determine the maximum percentage of the capacity of
the LAN connection that is being used in monitoring the workstations.
4] Explain OSI Functional Model in details and show how it addresses user oriented
applications.
5] The following is the informal record structure of my home address:
Name Pradeep S. Gupta
Address 1234 Arthur Road City Mumbai
State Maharastra
Zip Code 400070
Write for your record
A] The informal record structure
B] ASN.1 description of the record structure
C] The record value for your home address
[Note: practice similar solved eg. From book of Main]
6] Discuss in details about the goals and functions of network management.
7] You are administering the 20000 workstation in an organization. You are required to ping
each station periodically. The message size is 150 bytes long. The NMS you are using is on a
10Mbps LAN, which functions with 60 % efficiency. What would be the frequency of your ping
if you were not to exceed 10% overhead? Consider the time of the inter frame gap in 10Mbps
Ethernet. [Similar examples]
8] Explain CMIP/ CMISE.
OR
Classify the services provided by Common Management Information Service Elements
(CMISEs) and also explain the communication protocol used for intersystem communication
(CMIP).
9] Define TLV encoding Structure with an example.
10] Explain the various OSI Network Management models in brief.
11] Practice problems on TLV encoding and ASN.1 coding from Network Management
Principles and Practice by Mani Subramanian, Publication: Pearson and TCP/IP Protocol
Suite by B. Fourozan, Publication MGH
12] Draw and explain OSI management System Architecture. . (Refer appendix of Book by Mani)
13] Draw and explain the Functions of OSI Management Model (Refer appendix of Book by Mani
Module 3
1] Justify how proactive management of LAN traffic is performed using RMON.
OR
Justify how RMON provides open, comprehensive network fault diagnosis, planning and
performance tuning features for network management.
2] Compare and contrast SNMPv1, SNMPv2 and SNMPv3
3] Explain the SNMP Access Policy with proper illustrations
4] Explain the security features on SNMP V3
5] Draw and Explain in details the get set PDUs
6] Draw and explain in details the trap PDUs and also various types of traps.
7] Explain the SNMP operations
[Hint: Your answer should comprise of SNMP operations comprise get and set messages from
the manager to the agent, and get and trap messages from the agent to the manager using flow
diagram for any one group]
8] Explain SNMP V2 architecture or Short note on SNMP v2
9] Explain SNMP v1 and how security is handled in version 1.
10] Explain RMON standards.
Module 4
1] Sketch and explain the TMN functional architecture.
2] Justify how TMN framework not only addresses the management of quality of network and
network elements, but also service management and business management.
OR
Explain TMN Relationship to Data and Telecommunication Networks
3] Explain TMN Standards.
4] Explain in details TMN functional architecture.
5] Explain TMN architecture. {list all and explain a bit about all of them}
Module 5
1] Explain fault Management
2] Explain Security Management
3] Explain Report management
4] Explain Event correlation technique
5] Explain Rule based reasoning
6] Explain Model based reasoning
7] Explain Network Management Systems and FCAPS
8] Explain Policy based management
9] Explain FCAPS
10] What is secure communication network? Explain security breaches and the resource needed
to prevent it.
11] Explain the System Utilities for network management.
12] Short note on Network statistics and measurements.
13] Explain NMS Design, NMS components, NMS Server Architecture.
14] What are different Event Correlation Techniques? Explain any one in details. (list all six and
explain any one in detail)
15] Example of Codebook correlation technique.
Module 6
1] Explain broadband network and services
or
Explain the influence of Broadband networks and services and its importance
2] Explain ATM Network Management
3] Explain M1 interface in ATM Network Management
4] Explain M2 interface in ATM Network Management
5] Explain M3 interface in ATM Network Management
6] Explain M4 interface in ATM Network Management
Note: These are guidelines for preparing for the end semester exam of MU. The main aim
is that students don’t skip an important topic.

More Related Content

What's hot

Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
 Design and Develop SQL DDL statements which demonstrate the use of SQL objec... Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
bhavesh lande
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
Ritu Ranjan Shrivastwa
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
Jan Aldrich Dorado
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
Gouasmia Zakaria
 
Sequence diagrams
Sequence diagramsSequence diagrams
Sequence diagrams
Preeti Mishra
 
Computer Network - Chapter 2
Computer Network - Chapter 2Computer Network - Chapter 2
Computer Network - Chapter 2
BON SECOURS COLLEGE FOR WOMEN
 
Computer Communication Networks-Network Layer
Computer Communication Networks-Network LayerComputer Communication Networks-Network Layer
Computer Communication Networks-Network Layer
Krishna Nanda
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
Manusha Dilan
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
Nitish Awasthi (anitish_225)
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
vtunotesbysree
 
database application using SQL DML statements: all types of Join, Sub-Query ...
 database application using SQL DML statements: all types of Join, Sub-Query ... database application using SQL DML statements: all types of Join, Sub-Query ...
database application using SQL DML statements: all types of Join, Sub-Query ...
bhavesh lande
 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methods
nizam143
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
Dr Neelesh Jain
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
Joe Shestak
 
Network devices ppt
Network devices   pptNetwork devices   ppt
REVIEW PAPER on Scheduling in Cloud Computing
REVIEW PAPER on Scheduling in Cloud ComputingREVIEW PAPER on Scheduling in Cloud Computing
REVIEW PAPER on Scheduling in Cloud Computing
Jaya Gautam
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
vaidheeswari
 
Unit iv dbms
Unit   iv dbmsUnit   iv dbms
Unit iv dbms
Arnav Chowdhury
 
Enterprise Java (November – 2018) [Choice Based | Question Paper]
Enterprise Java (November – 2018) [Choice Based | Question Paper]Enterprise Java (November – 2018) [Choice Based | Question Paper]
Enterprise Java (November – 2018) [Choice Based | Question Paper]
Mumbai B.Sc.IT Study
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
Rutwik Jadhav
 

What's hot (20)

Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
 Design and Develop SQL DDL statements which demonstrate the use of SQL objec... Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
 
Sequence diagrams
Sequence diagramsSequence diagrams
Sequence diagrams
 
Computer Network - Chapter 2
Computer Network - Chapter 2Computer Network - Chapter 2
Computer Network - Chapter 2
 
Computer Communication Networks-Network Layer
Computer Communication Networks-Network LayerComputer Communication Networks-Network Layer
Computer Communication Networks-Network Layer
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON NETWORK MANAGEMENT SYSTEMS
 
database application using SQL DML statements: all types of Join, Sub-Query ...
 database application using SQL DML statements: all types of Join, Sub-Query ... database application using SQL DML statements: all types of Join, Sub-Query ...
database application using SQL DML statements: all types of Join, Sub-Query ...
 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methods
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
 
Network devices ppt
Network devices   pptNetwork devices   ppt
Network devices ppt
 
REVIEW PAPER on Scheduling in Cloud Computing
REVIEW PAPER on Scheduling in Cloud ComputingREVIEW PAPER on Scheduling in Cloud Computing
REVIEW PAPER on Scheduling in Cloud Computing
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
Unit iv dbms
Unit   iv dbmsUnit   iv dbms
Unit iv dbms
 
Enterprise Java (November – 2018) [Choice Based | Question Paper]
Enterprise Java (November – 2018) [Choice Based | Question Paper]Enterprise Java (November – 2018) [Choice Based | Question Paper]
Enterprise Java (November – 2018) [Choice Based | Question Paper]
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 

Similar to Question Bank: Network Management in Telecommunication

343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx
bilalazam34
 
SMU MSC IT FALL/ SUMMER - 2013 SOLVED ASSIGNMENTS
SMU MSC IT FALL/ SUMMER - 2013 SOLVED ASSIGNMENTSSMU MSC IT FALL/ SUMMER - 2013 SOLVED ASSIGNMENTS
SMU MSC IT FALL/ SUMMER - 2013 SOLVED ASSIGNMENTS
smumbahelp
 
SMU MSCIT sem 3 fall 2014 assignments
SMU MSCIT sem 3 fall 2014 assignmentsSMU MSCIT sem 3 fall 2014 assignments
SMU MSCIT sem 3 fall 2014 assignments
solved_assignments
 
Smu msc it spring 2014 solved assignments
Smu msc it spring 2014 solved assignmentsSmu msc it spring 2014 solved assignments
Smu msc it spring 2014 solved assignments
smumbahelp
 
Mscit spring assignments
Mscit spring assignmentsMscit spring assignments
Mscit spring assignments
solved_assignments
 
CCNA D1 Revision
CCNA D1 RevisionCCNA D1 Revision
CCNA D1 Revision
Toby Adams
 
SMU MCA FALL / SUMMER - 2013 SOLVED ASSIGNMENTS
SMU MCA FALL / SUMMER - 2013 SOLVED ASSIGNMENTSSMU MCA FALL / SUMMER - 2013 SOLVED ASSIGNMENTS
SMU MCA FALL / SUMMER - 2013 SOLVED ASSIGNMENTS
smumbahelp
 
Smu bscit sem 5 summer 2016 assignments
Smu bscit sem 5 summer 2016 assignmentsSmu bscit sem 5 summer 2016 assignments
Smu bscit sem 5 summer 2016 assignments
Pradeep Sharma
 
Be 2008-it
Be 2008-itBe 2008-it
Be 2008-it
prashant9664291524
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
Engr. Md. Jamal Uddin Rayhan
 
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYSELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
IJNSA Journal
 
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTSSEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
solved_assignments
 
Virtualisation
VirtualisationVirtualisation
Virtualisation
jsk1950
 
Smu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignmentsSmu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignments
smumbahelp
 
Smu bscit sem 5 spring 2015 assignments
Smu bscit sem 5 spring 2015 assignmentsSmu bscit sem 5 spring 2015 assignments
Smu bscit sem 5 spring 2015 assignments
solved_assignments
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd sem
smumbahelp
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
Editor IJCATR
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
Editor IJCATR
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
Editor IJCATR
 
Smu mca winter 2013
Smu mca winter 2013Smu mca winter 2013
Smu mca winter 2013
smumbahelp
 

Similar to Question Bank: Network Management in Telecommunication (20)

343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx
 
SMU MSC IT FALL/ SUMMER - 2013 SOLVED ASSIGNMENTS
SMU MSC IT FALL/ SUMMER - 2013 SOLVED ASSIGNMENTSSMU MSC IT FALL/ SUMMER - 2013 SOLVED ASSIGNMENTS
SMU MSC IT FALL/ SUMMER - 2013 SOLVED ASSIGNMENTS
 
SMU MSCIT sem 3 fall 2014 assignments
SMU MSCIT sem 3 fall 2014 assignmentsSMU MSCIT sem 3 fall 2014 assignments
SMU MSCIT sem 3 fall 2014 assignments
 
Smu msc it spring 2014 solved assignments
Smu msc it spring 2014 solved assignmentsSmu msc it spring 2014 solved assignments
Smu msc it spring 2014 solved assignments
 
Mscit spring assignments
Mscit spring assignmentsMscit spring assignments
Mscit spring assignments
 
CCNA D1 Revision
CCNA D1 RevisionCCNA D1 Revision
CCNA D1 Revision
 
SMU MCA FALL / SUMMER - 2013 SOLVED ASSIGNMENTS
SMU MCA FALL / SUMMER - 2013 SOLVED ASSIGNMENTSSMU MCA FALL / SUMMER - 2013 SOLVED ASSIGNMENTS
SMU MCA FALL / SUMMER - 2013 SOLVED ASSIGNMENTS
 
Smu bscit sem 5 summer 2016 assignments
Smu bscit sem 5 summer 2016 assignmentsSmu bscit sem 5 summer 2016 assignments
Smu bscit sem 5 summer 2016 assignments
 
Be 2008-it
Be 2008-itBe 2008-it
Be 2008-it
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
 
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEYSELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
SELF-ORGANIZATION AND AUTONOMOUS NETWORK SURVEY
 
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTSSEM 3 MIS SUMMER 2014 ASSIGNMENTS
SEM 3 MIS SUMMER 2014 ASSIGNMENTS
 
Virtualisation
VirtualisationVirtualisation
Virtualisation
 
Smu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignmentsSmu mscit sem 3 fall 2014 assignments
Smu mscit sem 3 fall 2014 assignments
 
Smu bscit sem 5 spring 2015 assignments
Smu bscit sem 5 spring 2015 assignmentsSmu bscit sem 5 spring 2015 assignments
Smu bscit sem 5 spring 2015 assignments
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd sem
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 
Model-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A surveyModel-Driven Architecture for Cloud Applications Development, A survey
Model-Driven Architecture for Cloud Applications Development, A survey
 
Smu mca winter 2013
Smu mca winter 2013Smu mca winter 2013
Smu mca winter 2013
 

More from Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai

Artificial Intelligence (AI) application in Agriculture Area
Artificial Intelligence (AI) application in Agriculture Area Artificial Intelligence (AI) application in Agriculture Area
Artificial Intelligence (AI) application in Agriculture Area
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
VLSI Design Book CMOS_Circuit_Design__Layout__and_Simulation
VLSI Design Book CMOS_Circuit_Design__Layout__and_SimulationVLSI Design Book CMOS_Circuit_Design__Layout__and_Simulation
VLSI Design Book CMOS_Circuit_Design__Layout__and_Simulation
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdfINTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
LRU_Replacement-Policy.pdf
LRU_Replacement-Policy.pdfLRU_Replacement-Policy.pdf
Network Management Principles and Practice - 2nd Edition (2010)_2.pdf
Network Management Principles and Practice - 2nd Edition (2010)_2.pdfNetwork Management Principles and Practice - 2nd Edition (2010)_2.pdf
Network Management Principles and Practice - 2nd Edition (2010)_2.pdf
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Euler Method Details
Euler Method Details Euler Method Details
Mini Project fo BE Engineering students
Mini Project fo BE Engineering  students  Mini Project fo BE Engineering  students
Mini Project fo BE Engineering students
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Mini Project for Engineering Students BE or Btech Engineering students
Mini Project for Engineering Students BE or Btech Engineering students Mini Project for Engineering Students BE or Btech Engineering students
Mini Project for Engineering Students BE or Btech Engineering students
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Ballistics Detsils
Ballistics Detsils Ballistics Detsils
VLSI Design_LAB MANUAL By Umakant Gohatre
VLSI Design_LAB MANUAL By Umakant GohatreVLSI Design_LAB MANUAL By Umakant Gohatre
VLSI Design_LAB MANUAL By Umakant Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Image Compression, Introduction Data Compression/ Data compression, modelling...
Image Compression, Introduction Data Compression/ Data compression, modelling...Image Compression, Introduction Data Compression/ Data compression, modelling...
Image Compression, Introduction Data Compression/ Data compression, modelling...
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Python overview
Python overviewPython overview
Python numbers
Python numbersPython numbers
Python networking
Python networkingPython networking
Python multithreading
Python multithreadingPython multithreading
Python modules
Python modulesPython modules
Python loops
Python loopsPython loops

More from Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai (20)

Artificial Intelligence (AI) application in Agriculture Area
Artificial Intelligence (AI) application in Agriculture Area Artificial Intelligence (AI) application in Agriculture Area
Artificial Intelligence (AI) application in Agriculture Area
 
VLSI Design Book CMOS_Circuit_Design__Layout__and_Simulation
VLSI Design Book CMOS_Circuit_Design__Layout__and_SimulationVLSI Design Book CMOS_Circuit_Design__Layout__and_Simulation
VLSI Design Book CMOS_Circuit_Design__Layout__and_Simulation
 
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdfINTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
INTRODUCTION TO CYBER LAW The Concept of Cyberspace Cyber law Cyber crime.pdf
 
LRU_Replacement-Policy.pdf
LRU_Replacement-Policy.pdfLRU_Replacement-Policy.pdf
LRU_Replacement-Policy.pdf
 
Network Management Principles and Practice - 2nd Edition (2010)_2.pdf
Network Management Principles and Practice - 2nd Edition (2010)_2.pdfNetwork Management Principles and Practice - 2nd Edition (2010)_2.pdf
Network Management Principles and Practice - 2nd Edition (2010)_2.pdf
 
Euler Method Details
Euler Method Details Euler Method Details
Euler Method Details
 
Mini Project fo BE Engineering students
Mini Project fo BE Engineering  students  Mini Project fo BE Engineering  students
Mini Project fo BE Engineering students
 
Mini Project for Engineering Students BE or Btech Engineering students
Mini Project for Engineering Students BE or Btech Engineering students Mini Project for Engineering Students BE or Btech Engineering students
Mini Project for Engineering Students BE or Btech Engineering students
 
Ballistics Detsils
Ballistics Detsils Ballistics Detsils
Ballistics Detsils
 
VLSI Design_LAB MANUAL By Umakant Gohatre
VLSI Design_LAB MANUAL By Umakant GohatreVLSI Design_LAB MANUAL By Umakant Gohatre
VLSI Design_LAB MANUAL By Umakant Gohatre
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Image Compression, Introduction Data Compression/ Data compression, modelling...
Image Compression, Introduction Data Compression/ Data compression, modelling...Image Compression, Introduction Data Compression/ Data compression, modelling...
Image Compression, Introduction Data Compression/ Data compression, modelling...
 
Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...Introduction Data Compression/ Data compression, modelling and coding,Image C...
Introduction Data Compression/ Data compression, modelling and coding,Image C...
 
Python overview
Python overviewPython overview
Python overview
 
Python numbers
Python numbersPython numbers
Python numbers
 
Python networking
Python networkingPython networking
Python networking
 
Python multithreading
Python multithreadingPython multithreading
Python multithreading
 
Python modules
Python modulesPython modules
Python modules
 
Python loops
Python loopsPython loops
Python loops
 

Recently uploaded

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

Question Bank: Network Management in Telecommunication

  • 1. SEM VIII EXTC Question Bank: Network Management in Telecommunication [ECCDLO 8044] 2 marks question Module 1: Introduction of Network Management 1] What problem would you expect the NMS to resolve, and how? 2] What are the Challenges of IT Manager? 3] Explain trouble ticket administration? 4] Draw Network Management Dumb bell architecture. 5] In absence of a sophisticated NMS, explain the methods used for Management in an organization. 6] List some common network problems. 7] Why NMS is required? 8] Draw the Dumbbell architecture for Network management. 9] What is the goal of Network Management? 10] What is self healing in network management? Module 2: OSI Network Management 1] Draw the OSI Management information Tree. 2] What is CMISE? List the services of CMISE. 3] Sketch the functional groupings of Network Management. 4] Encode the INTEGER 1456 using TLV encoding 5] Encode ObjectIdentifier 1.3.6.1 (iso.org.dod.internet) using TLV encoding. 6] In a ballroom dance, the conductor asks the guests to group themselves into couples made up of a male and a female (order does not matter) for a dance. Write an ASN.1 module for the dance Group with data type DanceGroup that is composed of data type Couple; couple is constructed using male and female. Note:[ Refer to problems from Mani : solved and Unsolved. Solutions are available online]
  • 2. 7] Show the encoding for the OCTET STRING “Hello World.” 8] Show the TLV encoding of IPAddress 131.21.14.8. 9] Sketch two-tier network management organization model. 10] Sketch three-tier network management organization model. 11] Differentiate between MIB and MDB 12] Identify difference between list and ordered list in abstract syntax notation one (ASN.1) 13] What are managed and unmanaged objects? How are they different from each other? 14] Explain the structure of MACRO in ASN.1 15] What SMI composed of? 16] Explain NMS behaving as manager and agent both. 17] Give the scenario when trap notification is generated by agent. 18] What is the purpose of RMON? How does it help manager? 19] How a network element added to the network a discovery process? Module 3: Internet Management 1] Draw SNMPv1 PDU and label it. 2] What do you mean by SNMP bilingual manager? 3] Enlist features of SNMPv3 security model 4] Draw and label the Get and Set type PDU. 5] Draw architecture of SNMPv3 6] What do you mean by MIB? 7] What do you mean by SMI? 8] Draw SNMP message format. 9] Draw the PDU format of get/set in SNMP. 10] What is the primary goal of SNMP v 3. 11] Compare Internet management and OSI Management.
  • 3. 12] Give the scenario when trap notification is generated by SNMPv1 agent. 13] Draw architecture of SNMPv2. Module 4: Telecommunication Management Networks (TMN) 1] Why there is need for TNM? 2] What are the basic objectives of TNM? 3] Draw the TMN Relationship to Data and Telecommunication Networks 4] Draw the TMN Conceptual Model. 5] What are TMN standards? (Draw) 6] Draw TMN Functional Architecture. 7] Explain the significance of TMN reference point. 8] What do you mean by eToM Module 5: Network Management Tools and Applications 1] What is data monitoring? 2] What are the parameters that define the network management? 3] Draw generic architecture of event correlation system. 4] Mention the guides to setup policies and procedures. 5] What is performance management? 6] What is secure communication network? Explain security breaches and the resource needed to prevent it. 7] What is the role of network management in accounting management? 8] List the process involved in fault management. 9] What are the parameters that define the network management? 10] What are the types of firewalls?
  • 4. Module 6: Broad Band Network Management 1] What is the purpose of M2 interface? 2] Define VPC. 3] What is the role of SNMP and ILMI in ATM management? 4] Where M2 interface is employed? 5] What is ATM LANE? 6] What is ATM digital exchange interface management? 5 Marks Questions OF NMT Module 1: Introduction of Network Management 1] What is the Perspective of Network Management? 2] Describe the goal of Network Management 3] List the network management standards and write two salient points about each. 4] What are the challenges/ Perspective of IT Manager? 5] Discuss about the goals and functions of network management. 6] Explain about the network management architecture and organization. 7] List the problems that can be resolved by NMS? 8] Give a top-down view of network management function? Module 2: OSI network Management 1] Compare managed object from Internet and OSI perspective. 2] Write the ASN.1 structure for the following informal structure. Name John P. Smith Address 1234 Global Mills Road City Jersey State LA Zipcode 31134
  • 5. 3] a) Encode Octet string '0C1B'H using TLV encoding b) Encode INTEGER 16 using TLV encoding using binary and Hex notation [Note: practice on similar examples only] 4] Define MACROS with respect to ASN.1 encoding. 5] Define and Draw the ASN.1 Data type Structure and Tag. 6] Explain the OSI communication model 7] Explain the conceptual view of managed object. 8] Illustrate the management information model 9] Describe the OSI functional model. 10] Describe the encoding structure and macros of ASN.1. 11] Explain about the terminology, Symbols and conventions of ASN.1 12] Explain the Communication Model of OSI that deals with the application entity layer and the intersystem message protocol. (Refer appendix of Book by Mani) 13] What is Aggregate Object? Discuss the representation of Aggregate Object as Columnar object. 14] Explain Web-Based Enterprise Management (WBEM) . 15] Explain Java Management Extension (JMX)) . 16] Explain XML – based Network Management. 17] Explain CORBA- based Network Management. Module 3: Internet Management 1] Analyze the major changes in SNMP version 2. 2] Defend the SNMP Interoperability or Illustrate how the compatibility issue will be solved when migrating from SNMPv1 to SNMPv2. 3] Justify and explain the SNMP community-profile and access policy. 4] Construct the Internet MIB II group.
  • 6. 5] Draw and explain the get/set type PDU in SNMP. 6] Draw and Explain the SNMP trap PDU. 7] Explain SNMP V3 security model. 8] What do you mean by remote monitoring? 9] What are the advantages of RMON? 10] What are the RMON standards? Module 4: Telecommunication Management Networks (TMN) 1] Sketch the TMN functional architecture. 2] What is the need for TMN? 3] What is the relationship between data and telecommunication networks? 4] What is TMN conceptual model? 5] Explain TMN physical architecture. Module 5: Network Management Tools and Applications 1] What do you mean by network provisioning? 2] What are the steps of fault management? 3] Explain how performance management is performed. 4] What do you mean by Service Level Management? 5] Explain Inventory Management. 6] Explain Security Management. 7] Explain Accounting Management 8] Describe about codebook correlation model 9] What is the process involved in SLM? 10] List and contrast the tools available to discover the network components.
  • 7. Module 6: Broad Band Network management 1] What do you mean by ATM Lan Emulation. 2] Explain the class I and class II requirement of a carrier management system in ATM 3] What is meant by the dual view of the M4 INTERFACE? 4] Explain ATM Digital Exchange Interface management 5] Explain the ATM relationship to TNM layered Architecture. 6] Draw and explain ATM Forum Management Interface Reference Architecture. 7] What are the roles of SNMP and ILMI in ATM Management? (Refer M2 Interface) 10 Marks question of NMT Module 1 1] Explain goal of Network management ( Ans expected with functional grouping and flow diagram) 2] Explain different perspective of network management. 3] Cite some case histories on network, system and service management. 4] Explain about the network management architecture and organization. Module 2 1] Compare various Network Management Standards. 2] Explain OSI Organization model or Construct OSI Organizational model for two tier, three tier and MoM network management 3] A network administrator wishes to monitor 5000 workstations to see whether they are switched on or not. In order to do this each machine is periodically pinged. The message size in
  • 8. both directions is 180 bytes. Also includes 20 bytes of IP overhead. The administrator’s NMS (network management station) is on a 10 Mbps 802.3 switched LAN operating in half-duplex. If each machine is pinged every 50 seconds determine the maximum percentage of the capacity of the LAN connection that is being used in monitoring the workstations. 4] Explain OSI Functional Model in details and show how it addresses user oriented applications. 5] The following is the informal record structure of my home address: Name Pradeep S. Gupta Address 1234 Arthur Road City Mumbai State Maharastra Zip Code 400070 Write for your record A] The informal record structure B] ASN.1 description of the record structure C] The record value for your home address [Note: practice similar solved eg. From book of Main] 6] Discuss in details about the goals and functions of network management. 7] You are administering the 20000 workstation in an organization. You are required to ping each station periodically. The message size is 150 bytes long. The NMS you are using is on a 10Mbps LAN, which functions with 60 % efficiency. What would be the frequency of your ping if you were not to exceed 10% overhead? Consider the time of the inter frame gap in 10Mbps Ethernet. [Similar examples] 8] Explain CMIP/ CMISE. OR Classify the services provided by Common Management Information Service Elements (CMISEs) and also explain the communication protocol used for intersystem communication (CMIP). 9] Define TLV encoding Structure with an example. 10] Explain the various OSI Network Management models in brief.
  • 9. 11] Practice problems on TLV encoding and ASN.1 coding from Network Management Principles and Practice by Mani Subramanian, Publication: Pearson and TCP/IP Protocol Suite by B. Fourozan, Publication MGH 12] Draw and explain OSI management System Architecture. . (Refer appendix of Book by Mani) 13] Draw and explain the Functions of OSI Management Model (Refer appendix of Book by Mani Module 3 1] Justify how proactive management of LAN traffic is performed using RMON. OR Justify how RMON provides open, comprehensive network fault diagnosis, planning and performance tuning features for network management. 2] Compare and contrast SNMPv1, SNMPv2 and SNMPv3 3] Explain the SNMP Access Policy with proper illustrations 4] Explain the security features on SNMP V3 5] Draw and Explain in details the get set PDUs 6] Draw and explain in details the trap PDUs and also various types of traps. 7] Explain the SNMP operations [Hint: Your answer should comprise of SNMP operations comprise get and set messages from the manager to the agent, and get and trap messages from the agent to the manager using flow diagram for any one group] 8] Explain SNMP V2 architecture or Short note on SNMP v2 9] Explain SNMP v1 and how security is handled in version 1. 10] Explain RMON standards. Module 4 1] Sketch and explain the TMN functional architecture.
  • 10. 2] Justify how TMN framework not only addresses the management of quality of network and network elements, but also service management and business management. OR Explain TMN Relationship to Data and Telecommunication Networks 3] Explain TMN Standards. 4] Explain in details TMN functional architecture. 5] Explain TMN architecture. {list all and explain a bit about all of them} Module 5 1] Explain fault Management 2] Explain Security Management 3] Explain Report management 4] Explain Event correlation technique 5] Explain Rule based reasoning 6] Explain Model based reasoning 7] Explain Network Management Systems and FCAPS 8] Explain Policy based management 9] Explain FCAPS 10] What is secure communication network? Explain security breaches and the resource needed to prevent it. 11] Explain the System Utilities for network management. 12] Short note on Network statistics and measurements. 13] Explain NMS Design, NMS components, NMS Server Architecture. 14] What are different Event Correlation Techniques? Explain any one in details. (list all six and explain any one in detail) 15] Example of Codebook correlation technique.
  • 11. Module 6 1] Explain broadband network and services or Explain the influence of Broadband networks and services and its importance 2] Explain ATM Network Management 3] Explain M1 interface in ATM Network Management 4] Explain M2 interface in ATM Network Management 5] Explain M3 interface in ATM Network Management 6] Explain M4 interface in ATM Network Management Note: These are guidelines for preparing for the end semester exam of MU. The main aim is that students don’t skip an important topic.