View
235
Download
0
Category
Preview:
Citation preview
VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur – 603 203
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
QUESTION BANK
VI SEMESTER
CS6002-NETWORK ANALYSIS AND MANAGEMENT
Regulation – 2013
Academic Year 2017 – 18
Prepared by
Dr.M.Senthil Kumar, Associate Professor/CSE
QUESTION BANK
SUBJECT : CS6002 NETWORK ANALYSIS AND MANAGEMENT
SEM/YEAR: VI/III
UNIT I A system Approach to N/W Design and Requirement Analysis
Introduction, network Service, Service based Networks – System Services, Characterizing the services,
Requirement Analysis. – User requirements, Application Requirements and Host Requirements, Network
Requirements – Guidelines for Networks, Requirements gathering and listing. – Developing Services
metrics to metrics performance – Developing performance threshold – Distinguish between service level
performances – Requirement analysis. Practice-Template – Table and maps-Simplifying the Requirement
analysis-Case Study
PART-A
Q.No Questions BT
Level
Competence
1 Express the Components of the analysis and design process. BTL 2 Understand
2 Analyze the traditional view of a system and draw it. BTL 4 Analyze
3 Define system and draw the generic components of system. BTL 1 Remember
4 List the generation of networking. BTL 1 Remember
5 Describe the network Services. BTL 2 Understand
6 Interpret services characteristics and service levels. BTL 2 Understand
7 Point out the system components and Network services. BTL 4 Analyze
8 Distinguish Service requests and offerings. BTL 2 Understand
9 What are the Service performance requirements? BTL 1 Remember
10 Demonstrate the types of applications. BTL 3 Apply
11 Draw the application delay types and network component interface. BTL 6 Create
12 Explain the four categories of network management tasks. BTL 5 Evaluate
13 Formulate how the Location information is helps to the system? BTL 6 Create
14 State the initial conditions of the design project. BTL 1 Remember
15 Show the IP packet loss as Measurements of reliability using Ping. BTL 3 Apply
16 Define Recoverability. BTL 1 Remember
17 What do you mean by Network propagation delay? BTL 1 Remember
18 Analyze the formula for System Responsiveness and Burstiness. BTL 4 Analyze
19 Illustrate the table for user and application requirements BTL 3 Apply
20
Assess the map for the applications that cover the entire design
environment (A), that cover one campus (B, C, and D), and those that
cover parts of each campus (E,F,G and H)..
BTL 5 Evaluate
PART B
1 i) Explain the goals of Network analysis.(7)
ii) Summarize the characterizing services in detail.(6) BTL 5
Evaluate
2 Describe in detail about User requirements with neat diagram. (13) BTL 1 Remember
3 i) Tabulate the Application Requirements.(7) BTL 1 Remember
ii) Describe the types of applications, Reliability, capacity, delay and
application groups in detail .(6)
4.
i)Describe the Host requirements in detail.(10)
ii) Label the location dependencies between applications and hosts and
illustrate it.(3)
BTL 1 Remember
5
i)Explain in detail about the Network Requirements with suitable
diagrams.(8)
ii)Summarize the guidelines in distinguishing services.(5)
BTL 2
Understand
6
Explain in detail about the specialized equipment includes equipment
that is location-dependent or specialized in function, or information that
is location -specific. Consider a network that connects a medical library
to hospitals and universities as shown in below figure. What types of
information will be specific to each medical library? What types of
information will be common to all medical libraries? List some possible
difficulties in transferring medical data across such a network. (13)
BTL 4 Analyze
7
i)Illustrate the gathering and listing requirements in detail.(7)
ii)Demonstrate the developing service metrics to Measure
performance.(6)
BTL 3 Apply
8 i)Describe the Characterizing behavior in detail.(4)
ii)Summarize the developing performance thresholds in detail.(9) BTL 2 Understand
9 i) Formulate Capacity Requirements. (8)
ii)Explain about the specified services in detail.(5) BTL 6 Create
10 Illustrate Templates in detail with neat diagram.(13) BTL 3 Apply
11
Describe the following in detail
i)Tables.(7)
ii) Maps. (6)
BTL 1 Remember
12
Analyze the network design for a small business using the following
information.
1. There are no known specific performance requirements for any of the
applications that the company plans on using.
2. The company has offices in Austin, Houston and Dallas/Fort Worth.
3. Applications include database transaction processing, currently based
out of Dallas/fort worth, and a bursty communications package used in
Austin.
4. The goal of this project is to connect these offices with a wide-area
service.
5. This project is expected to cost less than $250k.
Estimates of Capacities:
App A-100 kb/s
App B-70 kb/s
App C-400 kb/s
App D 1.5 Mb/s
No of Hosts at each site:
Austin-25 PCs
Houston-15 PCs
BTL 4 Analyze
Dallas-17 Pcs(13)
13
Consider the design of a network where you cannot talk to the end
users. What other resources can you use to gather requirements about
the users, applications, hosts, and existing networks? Briefly Explain
outline a method for gathering requirements in the absence of end user
involvement.(13)
BTL 4 Analyze
14
Discuss in detail about how can delay variation impact a traffic flow?
What characteristics of an application indicate that it is sensitive to
delay variation? How can delay variation be measured within the
network?(13)
BTL 2 Understand
PART-C
1 Design the layout for Test and development center of a single building
in Oakland, California which contains five testing centers. BTL6 Create
2.
Classify the Requirement analysis for MAN to allow this organization
to expand to san Francisco and San jose, and a LAN to expand within
the Oakland facility. Connect the LAN at the 1013 building, to their
existing Ethernet and FDDI Networks.
BTL4 analyze
3
Measure the service metrics are used to monitor measure and verify
services in the network and to determine if requirements are being met.
Therefore, service metrics must be meaningful to the network operator,
manager, and/or end users. For example, to verify a service level of 40-
ms round-trip delay, we could use the utility ping and monitor for the
threshold of 40 ms:
For each service level below, describe a service metric that could be
used for measuring the service level, and a corresponding tool or
variable for the metric.
A) Availability between two connected networks, A and B.
B) End –to-end delay between n/w A and a Computing resource on
n/w B.
C) Average traffic rate to/from server C, measured across all
BTL5 Evaluate
network interfaces on C over 5-minute intervals.
D) End-to-end Path(s) between host X on network A and resource
Y on n/w B.
4
Compose the delay estimates for human response time, interaction
delay and network propagation delay. Give an application example for
each delay estimate. Are there applications that can be bounded by two
of these delay estimates? List examples and explain.
BTL6 Create
UNIT II - Flow Analysis: Concepts, Guidelines and Practice
Background-Flows-Data sources and sinks – Flow Model-Flow Boundaries – Flow distributions-flow
Specifications – Applying the flow model-Establishing the flow boundaries – Developing flow
Specifications – Prioritizing flow dging – Flow analysis process – Examples-Case study.
PART-A
Q.No Questions BT
Level
Competence
1 Show the three common flows in the network design. BTL 3 Apply
2 Analyze about Data sources and sinks. BTL 4 Analyze
3 Examine what is Flows? BTL 3 Apply
4 Tell about types of flow models. BTL 1 Remember
5 Define flow boundaries. BTL 1 Remember
6 Discuss about Flow distribution. BTL 2 Understand
7 Illustrate the requirements for Flow specification. BTL 3 Apply
8 Classify the Performance modifiers. BTL 4 Analyze
9 Contrast the process model for flow analysis with chart. BTL 2 Understand
10 Generalize the data movement with example. BTL 6 Create
11 Tabulate the uses of flow distribution in the network. BTL 1 Remember
12 Formulate the Cooperative –computing flow model for data mining
environment. BTL 6 Create
13 What is Prioritizing flows? BTL 5 Evaluate
14 List out the different ways of simplifying the flow analysis process. BTL 1 Remember
15 Differentiate application service requirement and host service
requirement. BTL 2 Understand
16 What are the steps necessary to get the performance characteristics of
the composite flows? BTL 1 Remember
17 Summarize Guaranteed service. BTL 2 Understand
18 Point out the important feature of the multipart flowspec. BTL 4 Analyze
19 Define Capacity and service planning. BTL 1 Remember
20 Explain how we can identify data sources and sinks. BTL 5 Evaluate
PART-B
1
i)Discuss in detail about the flows and types of flows in detail?(7)
ii)Describe the Data sources and sinks with suitable applications in
detail.(6)
BTL 2 Understand
2 Illustrate the Flow models with suitable environments like scientific
visualization etc.(13)
BTL 3
Apply
3 i)Describe in detail about the Flow Boundaries?(6)
ii)Examine the flow distributions in detail?(7) BTL 1 Remember
4
i) Generalize on what is Flow specification? What is the algorithm used
for it?(10)
ii) How to modify performance? Explain in detail.(3)
BTL 6 Create
5
Examine the devices can act as both data sources and sinks, depending
on the application and flow. Which of the following would be data
sources and which would be data sinks? Why?
a) A storage device receiving streaming video from a camera.
b) A video editing unit, using video from the above storage
device.
c) A web server and its elements.
d)A storage disk farm.(13)
BTL 1 Remember
6 With suitable example describe the following.
(i)applying the flow models (6) (ii)Establishing flow boundaries.(7) BTL 2 Understand
7
i)Explain in detail about Guidelines for flow distributions.(9)
ii)Explain in detail about the situation when backbone flows are
indicated.(4)
BTL 4 Analyze
8 i)Examine the developing the flow specifications.(7)
ii)Tabulate the prioritizing flows .(6) BTL 1 Remember
9
Describe in detail about how would the data sources and sinks for each
application in the data mining environment(Four Campus W,X,Y,Z)
change if
a) There were no caches in the environment.
b) Data flows were directly between the storage/archival device and the
web servers for each data request, and the web servers updated the
caches after each request was completed.
c)There was only one web server for the environment, located at campus
Z.(13)
BTL 1 Remember
10
Predict the Place for flow boundaries in data mining environment (Four
Campus W, X, Y, Z).try both campus/campus and building/building
boundaries. What does each tell us about the client-server and/ or
cooperative –computing flows in this environment?(13)
BTL 2 Understand
11 Explain the Simplifying the flow analysis process in detail?(13) BTL 5 Evaluate
12 Explain with the examples of Applying Flowspecs.(13) BTL 4 Analyze
13 Summarize the concept of applying cost information to flows with
suitable examples.(13) BTL 4 Analyze
14 Demonstrate how the flowspec can be viewed as a multitiered network BTL 3 Apply
service hierarchy, where the capacity plan is the most basic service
level, and the service plan describes individual and combined service
requirements and guarantees. How does the flowspec relate to the
network services.(13)
PART-C
1
Design MAN environment for Valliammai Engineering College by
connecting New block, Admin Block and First year Block .show the
flow Analysis of information between them.
BTL6 Create
2
Develop the flow specification of our college, considering a list of the
application, application maps, potential users, flow models, boundaries
and distributions.
BTL4 analyze
3.
Assess the Flows of the given flow diagram.
BTL5 Evaluate
4
Create a network for an online transaction processing (OLTP)
environment. Their current environment is a mainframe that has several
terminals connected to it, either directly or through a terminal server.
They are moving to a cooperative computing environment, where there
will be multiple regional database servers acting in a client server
fashion and updating each other’s regions via a database manager as
shown in figure. show the probable data sources and sinks for both
environments. How does migrating from the mainframe environment to
the cooperative –computing environment modify the traffic flows in the
system? In what ways does the new environment improve the traffic
flows? What are some of the trade-offs between the two environments-
for example, in security, management, simplicity, ease of use,
performance cost?
BTL6 Create
UNIT III Logical Design
Background-Design goals – Developing criteria for technology evolution – Shared medium-switching and
routing – Hybrid routing/Switching mechanisms – Applying interconnection mechanism to design -
Integrating Network Management and Security to Design- Defining Network Management- Designing the
Manageable Resources- Network Management and Security plan-Case Study.
PART-A
Q.No Questions BT
Level
Competence
1 Express the process for design of the logical network. BTL 2 Understand
2 How to establishing design goals of the network? BTL 2 Understand
3 Tabulate the relationships between capacity and service plans. BTL 1 Remember
4 Define NBMA. BTL 1 Remember
5 Discuss the two important characteristics between NBMA and broadcast
technologies. BTL 2 Understand
6 Give the asymmetric flows in a network and draw it. BTL 2 Understand
7 What is Capacity upgrade path? List out the uses of it. BTL 1 Remember
8 Assess the problems in designing network size and segments. BTL 5 Evaluate
9 State the black box method. BTL 1 Remember
10 Compose the interconnection mechanisms in the network. BTL 6 Create
11 Classify switching and routing. BTL 4 Analyze
12 Illustrate the shared medium and planned hierarchy in network. BTL 3 Apply
13 Assess the four categories of Network management. BTL 5 Evaluate
14 Define Monitoring and metering. BTL 1 Remember
15 Show the parameters to monitor for instrumentation methods. BTL 3 Apply
16 Explain effective security. BTL 4 Analyze
17 What are the two common security philosophies? BTL 1 Remember
18 Show What are the effects of security risk analysis? BTL 3 Apply
19 Analyze Contingency plans. BTL 4 Analyze
20 Generalize the steps in developing management and security plans. BTL6 Create
PART-B
1 Discuss establishing design goals in detail. (13)
BTL 2 Understand
2 Describe in detail about the making technology choices for the
design.(13) BTL 1 Remember
3 Examine in detail about the developing criteria for technology
evaluation.(13) BTL 1 Remember
4
Create your answers for the following primary design goals; list at least
three secondary or derivative goals. Explain your answers.
a)Minimizing WAN costs
b)simplifying network troubleshooting
c) Scaling the network.
-From LAN to WAN.(13)
BTL 6
Create
5 i)Explain shared medium mechanism with suitable example.(7)
ii)Discuss the comparison and contrast of switching and routing.(6) BTL 1 Remember
6 i)Summarize on switching.(7)
ii) Discuss about ATM switching.(6) BTL 2 Understand
7
Explain briefly the following
i)routing (5)
ii)Hybrid switching/routing mechanisms.(8)
BTL 4 Analyze
8 Summarize the applying interconnection mechanisms to the
design.(13) BTL 5 Evaluate
9 Demonstrate briefly about the network elements and
characteristics.(13) BTL 3 Apply
10 Explain the architectural issues in network management with
diagrams.(13)
BTL 4
Analyze
11
Discuss the following.
i)security policies(6)
ii)Security risk analysis(7)
BTL 2 Understand
12 Analyze the various security mechanisms available today in detail.(13) BTL 4 Analyze
13
i)Describe in detail about different types of firewalls used in
Security. (7)
ii)Examine the distributed host security in detail.(6)
BTL 1 Remember
14 Illustrate the Network management and security plans in detail.(13) BTL 3 Apply
PART-C
1
Create a case study for maximize performance for the network,
particularly for those flows that contain the mission-critical and real
time applications.
BTL6 Create
2
Infer the case study to improve the reliability by using the redundant
paths between and within campuses and redundant network hardware at
each campus.
BTL4 analyze
3
Evaluate the case study to decide whether we will use in band or out-of-
band monitoring, as well as centralized of distributed monitoring. And
also determine the requirements and flows for our data.
BTL5 Evaluate
4
Plan the new capacities for the backbone flows. What Scaling factors
should you use on these backbone capacities by using two backbones
(BB1 and BB2) connect three regions of the network.
BTL6 Create
UNIT IV Network Design-Physical, Addressing and Routing
Introduction-Evaluating cable plant design options – Network Equipment Placements – Diagramming
Physical Design – Diagramming the worksheet-Case study – Introduction to addressing and Routing –
Establishing the Route flow in design – Manipulating the Route flow – Developing Address strategies –
Developing Routing strategies-Case study.
PART-A
Q.No Questions BT
Level
Competence
1 How the design of the physical network process. BTL 2 Understand
2 Illustrate the two wiring schemes of design. BTL 3 Apply
3 List how the level of redundancy wiring in a campus. BTL 1 Remember
4 Analyze the environmental components in a design. BTL 4 Analyze
5 Define the rules of thumb for placing network equipment. BTL 1 Remember
6 Define the hub placement and cruft. BTL 1 Remember
7 What is the placement strategy used in switches? BTL 2 Understand
8 State the role of circuit level equipment placement. BTL 1 Remember
9 Differentiate leaf sites and tail sites. BTL 2 Understand
10 Show the diagram for class 1,2 and 3 tail sites. BTL 3 Apply
11 Assess the common elements of a tag of coding scheme. BTL 5 Evaluate
12 What is Coding schemes and Demarcation points? BTL 1 Remember
13 Write the process for adding addressing and routing to the design. BTL 6 Create
14 Explain functional areas. BTL 5 Evaluate
15 What is Default route? BTL 1 Remember
16 Express Route filtering. BTL 2 Understand
17 Formulate the Route Aggregation and peering. BTL 6 Create
18 Categorize subnetting and subnet mask. BTL 4 Analyze
19 Compare RIP and OSPF. BTL 4 Analyze
20 Demonstrate the procedure for applying routing protocols. BTL 3 Apply
PART-B
1 What is Physical plant and describe how evaluating cable plant design
options in network? (13) BTL 1 Remember
2 Describe in detail about Network equipment placement.(13) BTL 2 Understand
3 Discuss on diagramming the physical design in detail with suitable
example.(13) BTL 2 Understand
4 Describe in detail about diagramming worksheets with suitable
examples.(13) BTL 1 Remember
5 Illustrate in detail about establishing routing flows in the design
environment.(13) BTL 3 Apply
6 i) Formulate the structure of Route flow manipulation .(7)
ii)Describe in detail about default route propagation.(6) BTL 6 Create
7 i) Analyze the route filtering in the networks.(8)
ii) Explain in detail about Route aggregation.(5) BTL 4
Analyze
8
Explain in detail about the following.
i) Peering(5)
ii)Policies and policy enforcement(8)
BTL 5 Evaluate
9
i)Analyze how the IP addressing provides a logical network counterpart
to the physical network addressing.(7)
ii)Classify the subnetting address masking in detail with example.(6)
BTL 4 Analyze
10 Describe in detail about Variable-length subnetting with suitable
example.(13)
BTL 1
Remember
11 i) Explain the supernetting in detail.(8)
ii)What are the difference between subnetting and supernetting.(5) BTL 4 Analyze
12 Describe how to apply addressing strategies in the network using
suitable examples.(13) BTL 1 Remember
13
i)List some of the routing algorithm configured in the network
design.(3)
ii)Illustrate in detail about RIP,OSPF.andBGP-4(10)
BTL 3 Apply
14 Discuss the procedure to choose, combine and applying routing
protocols.(13) BTL 2 Understand
PART-C
1
Create your justifications for given choice.
a)An expressway
b)An airport runway
c) A park, owned and operated by the company
In these options, which would you recommend when the area
between buildings A/B/C and D(Area 51).
BTL6 Create
2
Point out how should redundant connectivity be provided using the
single CO? Using Cos, at different locations?
Given:
The company desires redundancy to its service provider. They currently
connect to one central office (CO) of the service provider. Given that the
communication building(C) is the main point of entry for outside
communications (such as the service provider), and that the computing
building (A) is the termination point of all the high performance
communications and the focal point of the entire network.
BTL4 analyze
3
Decide what would be required to turn the backup connection from hot-
standby mode to a fully operational, load –sharing mode.
Given:
Many design environments are requiring redundant access to the
internet, with the backup connection either in a hot-standby mode or an
operational mode. using BGP-4,outline a strategy for providing a backup
connection to the internet, where the connection is in hot-standby mode.
Given Figure shows what the primary and standby connections would
look alike.
BTL5 Evaluate
4
Create the plan for separating the design into functional areas, develop
the list of routing protocols available for the design and recommend a
routing protocol as the candidate routing protocol for this network based
on the levels of hierarchy and redundancy in the MAN.
BTL6 Create
UNIT V Network Management and SNMP Protocol Model Network system management - Network system management platforms – Current SNMP broadband and
TMN Environment – Network management Standards Version 1 & 2.– Structure of Management
Information – SNMP V2-MIB-SNMP v2 protocol - SNMP v3 Arch, Application, MIB- Security based
security model- Access control RMON.
PART-A
Q.No Questions BT
Level
Competence
1 Formulate the goals of Network management and define OAMP. BTL 6 create
2 Predict the challenges of Network managers. BTL 2 Understand
3 State the network provisioning. BTL 1 Remember
4 Compare the any two network management standards. BTL 4 Analyze
5 Describe the salient features of TMN. BTL 1 Remember
6 What are the OSI network management models? BTL 1 Remember
7 What is the role of intermediate layer in three tier configuration. BTL 1 Remember
8 Summarize how the MIB is used by agent and management process. BTL 5 Evaluate
9 Give some examples of information that can be stored in MIB. BTL 2 Understand
10 Analyze How can we use Management Information tree. BTL 4 Analyze
11 Integrate the five parameters defined in managed object in the internet. BTL 6 Create
12 Define structure of management information. BTL 1 Remember
13 Demonstrate the SNMP version1. BTL 3 apply
14 What are data types used in SNMP? BTL 1 Remember
15 Point out the major changes in SNMP v2. BTL 4 Analyze
16 Show the key features of SNMPv3. BTL 3 Apply
17 Illustrate the security threats in network management. BTL 3 Apply
18 Assess RMON. BTL 5 Evaluate
19 Express how the RMON MIB framework works. BTL 2 Understand
20 Differentiate RMON2 from RMON. BTL 2 Understand
PART-B
1 i) What does the network management do, explain it? (7)
ii) List the network management functional groupings. (6) BTL 1 Remember
2 i)Describe the Network management functional flow chart?(7)
ii)Explain Network management Architecture.(6) BTL 1 Remember
3 Discuss in detail about SNMP current broadband.(13) BTL 2 Understand
4
i)How will the Network system management works in different
platforms?(6)
ii)Summarize in detail about Network management in TMN
environment.(7)
BTL 2 Understand
5 Classify the salient features of network management standards in
detail.(13) BTL 4 Analyze
6
Demonstrate the following in detail
i) OSI Network Management model.(7)
ii)Organization model.(6)
BTL 3 Apply
7 i)Discuss about Management information tree.(7)
ii)Describe in detail about managed object perspective.(6) BTL 1 Remember
8 Illustrate the structure of management information in detail .(13) BTL 3 Apply
9 Evaluate SNMP version 2 system architecture in detail with suitable
structures.(13) BTL 5 Evaluate
10 Formulate the SNMPv2 Management information base with suitable
example.(13) BTL 6 Create
11
Analyze the following in detail
i)SNMPv3 documentation architecture.(7)
ii)Abstract service interfaces.(6)
BTL 4 Analyze
12 i)Analyze the applications of SNMPv3.(7)
ii)Discuss about SNMPv3 MIB.(6) BTL 4
Analyze
13
i)Describe in detail about the security model .(7)
ii)Examine the Authentication protocols in detail.(6)
BTL 1 Remember
14 i) Discuss in detail about Access Control in Network management. (7)
ii)Express in detail about RMON with network configuration.(6) BTL 2 Understand
PART-C
1
You are establishing a small company with your network managed by a
network management system. Compose an example of each of the five
functional applications with that you would implement.
BTL6 Create
2
Analyze which MIB group contains this information for the technician
to find out the physical location of the component, when a network
manager discovers that a network component is performing poorly and
issues as order to the technician to replace it. Justify your answer.
BTL4 analyze
3 Rank the factors required to implement SNMP to manage the network
in your institution. Justify your answer with suitable example. BTL5 Evaluate
4
Create a Case study on internet traffic using RMON in your institution
based on growth rate, traffic pattern and develop the plan to find out the
top five domain of users and top most sites used.
BTL6 Create
Recommended