UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING SEMESTER TWO EXAMINATION 2014/2015 NETWORK MANAGEMENT MODULE NO: CPU6009

Similar documents
R07. IV B.Tech. II Semester Regular Examinations, April, NETWORK MANAGEMENT SYSTEMS (Information Technology)

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004

Simple Network Management Protocol

VegaStream Information Note Considerations for a VoIP installation

QoS (Quality of Service)

How To. Achieve Quality of Service over a low-speed WAN that has a non-qos capable gateway device. Introduction

MANAGING NETWORK COMPONENTS USING SNMP

10CS64: COMPUTER NETWORKS - II

Customer Guide. BT Business - BT SIP Trunks. BT SIP Trunks: Firewall and LAN Guide. Issued by: BT Business Date Issue: v1.

SNMP Basics BUPT/QMUL

SNMP and Network Management

Enabling NAT and Routing in DGW v2.0 June 6, 2012

System and Network Management

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Presented by Aurang Zeb 14CS-03. Network Management System

Chapter 18. Network Management Basics

Leased Line + Remote Dial-in connectivity

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

TTM 4128 Network and Service Management ( Learning Objectives Specification

Internetworking and IP Address

Network Management Functions RMON1, RMON2. Network Management

Chapter 2 - The TCP/IP and OSI Networking Models

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Voice Over IP Performance Assurance

UPPER LAYER SWITCHING

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

How To Set Up Foglight Nms For A Proof Of Concept

Magnet Voice Windows PC Softphone Installation

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

Layer 3 Network + Dedicated Internet Connectivity

ICTNPL5071A Develop planning strategies for core network design

CSE 3461 / 5461: Computer Networking & Internet Technologies

Intercommunication between two MyPBX (via VoIP Trunking)

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

IP Telephony v1.0 Scope and Sequence. Cisco Networking Academy Program

IOS NAT Load Balancing for Two ISP Connections

Test Equipment Depot Washington Street Melrose, MA TestEquipmentDepot.com. Application Advisor

Netgear TA612VMNF & TA612VLD Netgear WGR613VAL. Quality of Service (QOS) function

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Selecting a Firewall Gilbert Held

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

CompTIA Convergence Examination Objectives

TOTAL RECALL MAX Potential Connection Diagrams CALL RECORDING. Product Specifications YOU NEED TOTAL RECALL MAX

WAN Technology. Heng Sovannarith

Understanding the SCSI MIB

Network Layer: Network Layer and IP Protocol

White paper. Reliable and Scalable TETRA networks

Network Management 2. Learning Objectives. Centralized network management? School of Business Eastern Illinois University

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

AlliedWare Plus OS How To Use sflow in a Network

SNMP Network Management Concepts

Transport and Network Layer

1 Introduction to mobile telecommunications

VoIP 110R/200R/422R/404R/440R. User s Guide

ITEC310 Computer Networks II

Network Expansion Devices, Switches & Routers

Network Management (NETW-1001)

Interconnecting Cisco Network Devices 1 Course, Class Outline

Introduction to Simple Network Management Protocol (SNMP)

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

com.sat IP Basic ISDN

IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)

IT4405 Computer Networks (Compulsory)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

ITL Lab 5 - Performance Measurements and SNMP Monitoring 1. Purpose

Inter-Tel IP Phone Quick Reference Guide

WAN Data Link Protocols

and reporting Slavko Gajin

Simple Network Management Protocol

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

"Charting the Course to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary

Ethernet. Ethernet. Network Devices

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

ehealth and VoIP Overview

Exam 1 Review Questions

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

INTRODUCTION TO VOICE OVER IP

Voice Over IP Per Call Bandwidth Consumption

Combining Voice over IP with Policy-Based Quality of Service

SNMP. Simple Network Management Protocol

Voice over IP. Presentation Outline. Objectives

A Guide to Understanding SNMP

Convergence Technologies Professional (CTP) Course 1: Data Networking

ETM System SIP Trunk Support Technical Discussion

Using SNMP to Obtain Port Counter Statistics During Live Migration of a Virtual Machine. Ronny L. Bull Project Writeup For: CS644 Clarkson University

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

IP - The Internet Protocol

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

Transcription:

UNIVERSITY OF BOLTON [CRT09] CREATIVE TECHNOLOGIES COMPUTING SEMESTER TWO EXAMINATION 2014/2015 NETWORK MANAGEMENT MODULE NO: CPU6009 Date: Friday 29 th May 2015 Time: 14:00 16:00 Instructions to Candidates: There are SIX questions. Answer ANY FOUR questions. All questions carry equal marks. Marks for parts of questions are shown in brackets. Electronic calculators may be used provided that data and program storage memory is cleared prior to the examination.

Page 2 of 6 Question 1 1a) Discuss the concept of Flow Management used in data networks. Include a brief review of the different standards currently being used. Define the unique keys used in this technology. Describe how flow management can assist network managers to identify problems encountered in the network. [13 Marks] 1b) With regard to IPv4 traffic flows: explain the process of fragmentation. Use as an example a 4464 Byte (Token Ring) packet traversing a router link with MTU=508. Indicate how things would differ in an IPv6 environment. [8 Marks] 1c) How would you accommodate non-snmp and various versions of SNMP in a managed communications network. [4 Marks] Question 2 2a) Discuss the interaction of Structure of Management Information (SMI), Abstract Syntax Notation One (ASN.1) and Basic Encoding Rules (BER) used in a managed network managed scenario. [9 Marks] 2b) Using SNMP commands explain in detail how you would retrieve statistics from a managed device such as a Router or Ethernet Switch. If you wanted to traverse a group of OID s what command would you use? If you wanted to analyse utlisation of an Ethernet Switch port, how would you do it? [9 Marks] 2c) The Management Information Base (MIB) is one of the fundamental elements of systems. Give an descriptive account of the MIB structure, it s role and details about interface and RMON areas. Include the interaction of a MIB with a typical RDBMS residing in a System. [7 Marks] PLEASE TURN THE PAGE.

Page 3 of 6 Question 3 3a) Critically appraise how Systems have evolved, to incorporate standards based features such as the Telecommunications Management Network (TMN) and de facto SNMP elements. Include practical examples of management systems used at various TMN levels. [12 Marks] 3b) Given the command line shown below, explain what each of the components is used for: snmpwalk v1 u monitor c public 192.168.244.233.1.3.6.1.2.1.16.1.1.1.4 [6 Marks] 3c) List the primitive commands used in SNMP versions 1 and 2 and explain what the following commands are used for: snmpdelta and snmptable [7 Marks] Question 4 4a) Critically appraise the major advantages a modern central core network based on IP-MPLS, such as BT s 21CN has, over traditional vertical based separate networks. What disadvantages do pure IP or ATM core networks have? Access to these modern networks may use GFP over SDH. Appraise the fundamental aspects of these two systems, essentially describing what they do. 4b) Using a combination of SNMP commands and Open Source networking analysis tools, give a detailed account of how would you manage point to point link performance in an network. The scope of this analysis covers both the link and end points. Include details of parameters measured and any Open Source tools, which are useful in achieving these measurements. 4c) Outline what is meant by the term PMTU Black Hole Router and hence describe the impact on managing such network connections. [5 Marks]

Page 4 of 6 PLEASE TURN THE PAGE. Question 5 5a) Critically appraise the latency factors involved when downloading a file across a network of interconnected LANs and WANs. Assess this scenario for both TCP and UDP transmissions. 5b) Show using BGP examples how a network manager can at least hint to external neighbours about the preferred path into an Autonomous System. It will be useful to include a diagram showing various traffic flows and choices. [7 Marks] 5c) Explain what issues and challenges a network manager has to address to implement a multi-vendor management system. [8 Marks] Question 6 6a) Discuss the issues surrounding the carrying of voice over IP. Include in your discussion how VoIP can effectively be carried across an IP core network. [9 Marks] 6b) i) Evaluate what is meant by 1 Erlang of traffic and hence define what an Erlang is. You must include in your discussion the term CCS Centrum Call Second. ii) Using Erlang to Packet conversion, what is the equivalent throughput in bytes of 8 Erlangs, based on 64kbps channels? iii) Using the table below, which is an extract from an Erlang B table, calculate the following: Scenario 1: If 4 Erlangs of VoIP traffic are required and the grade of service needed to overcome interference is to be P.015, how many trunks are required for this transmission?

Page 5 of 6 Question 6 continues over the page. Question 6 continued. PLEASE TURN THE PAGE. Scenario 2: Given 3 trunks and a probability of blocking GOS = 0.05, how many Erlangs of traffic can be carried by this network? Scenario 3: Given 4 Erlangs of traffic that utilise 7 trunks, what is the probability of blocking? No. of Traffic (A) in erlangs for P = Trunks (N) 0.1% 0.2% 0.5% 1% 1.2% 1.3% 1.5% 2% 3% 5% 7% 10% 1 0.001 0.002 0.005 0.010 0.012 0.013 0.02 0.020 0.031 0.053 0.075 0.111 2 0.046 0.065 0.105 0.153 0.168 0.176 0.19 0.223 0.282 0.381 0.470 0.595 3 0.194 0.249 0.349 0.455 0.489 0.505 0.53 0.602 0.715 0.899 1.06 1.27 4 0.439 0.535 0.701 0.869 0.922 0.946 0.99 1.09 1.26 1.52 1.75 2.05 5 0.762 0.900 1.13 1.36 1.43 1.46 1.52 1.66 1.88 2.22 2.50 2.88 6 1.15 1.33 1.62 1.91 2.00 2.04 2.11 2.28 2.54 2.96 3.30 3.76 7 1.58 1.80 2.16 2.50 2.60 2.65 2.73 2.94 3.25 3.74 4.14 4.67 8 2.05 2.31 2.73 3.13 3.25 3.30 3.40 3.63 3.99 4.54 5.00 5.60 9 2.56 2.85 3.33 3.78 3.92 3.98 4.08 4.34 4.75 5.37 5.88 6.55 10 3.09 3.43 3.96 4.46 4.61 4.68 4.80 5.08 5.53 6.22 6.78 7.51 6c) In a VoIP based network scenario, justify the rationale for using different traffic tables for different situations. You must specify the type of traffic and which tables are appropriate for that particular scenario. [6 Marks]

Page 6 of 6 END OF PAPER