BNT503-NETWORK MANAGEMENT AND SECURITY

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

 

Assignment

 

DRIVE FALL 2014
PROGRAM BSC(NT)
SEMESTER V
SEMESTER CODE & NAME BNT503-NETWORK MANAGEMENT AND SECURITY
BK ID B1486
CREDIT 4
MARKS 60

 

1 Discuss in detail the structure of management information.

Answer: Management information: Management information systems (MIS) is the study of people, technology, organizations and the relationships among them. MIS professionals help firms realize maximum benefit from investment in personnel, equipment, and business processes.

 

Structure of management information:

In computing, the Structure of Management Information (SMI), an adapted subset of ASN.1, operates in Simple Network Management Protocol (SNMP) to define sets (“modules”) of related managed objects in a Management information base (MIB).

 

2 Describe briefly SNMP operations?

Answer: SNMP: Simple Network Management Protocol (SNMP) is an “Internet-standard protocol for managing devices on IP networks”. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. SNMP is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP is a component of the Internet Protocol Suite as defined by the Internet Engineering Task Force (IETF). It consists of a set of standards for network management, including an application layer protocol, a database schema, and a set of data objects.

 

3 Write a descriptive note on RMONv1.

Answer: The Remote Network MONitoring (RMON) MIB was developed by the IETF to support monitoring and protocol analysis of LANs. The original version (sometimes referred to as RMON1) focused on OSI Layer 1 and Layer 2 information in Ethernet and Token Ring networks. It has been extended by RMON2 which adds support for

 

 

 

4 Discuss the following Non-router based monitoring technique

  1. Passive monitoring

Answer: Passive monitoring is a technique used to capture traffic from a network by generating a copy of that traffic, often from a span port or mirror port or via a network tap. This low risk implementation provides one of the highest values within Application Performance Management in terms of application visibility for the business. In general, this can be up and running providing details of the application performance in less than two days. It helps lay the foundation for performance trending and predictive analysis.

 

 

5 What are the tasks of a network monitor?

Answer: Network monitor: Network Monitor is a packet analyzer. It enables capturing, viewing, and analyzing network data and deciphering network protocols. It can be used to troubleshoot network problems and applications on the network. Microsoft Network Monitor 1.0 (codenamed Bloodhound) was originally designed and developed by Raymond Patch, a transport protocol and network adapter device driver engineer on the Microsoft LAN Manager Development team.

 

 

6 What are the main components of JMX SNMP manager? Explain each of them.

Answer: The JMX SNMP manager API is bundled in two packages furnished as part of the Java Management extensions:

  • management.snmp. Manager
  • management.snmp

The javax.management.snmp. Manager package contains the classes and interfaces which make up the main components and functions of the API. These

 

Dear students get fully solved assignments

Send your semester & Specialization name to our mail id :

“ help.mbaassignments@gmail.com ”

or

Call us at : 08263069601

 

Leave a Reply