Network Management Scheme and Soln

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

RAJARAJESWARI COLLEGE OF ENGINEERING

Kumbalgodu, Bangalore-74
DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING

Q. No SCHEME AND SOLUTIONS MARKS


1 a) ADSL Technology: 10
ADSL (Asymmetric Digital Subscriber Line) is a technology that facilitates fast data
transmission at a high bandwidth on existing copper wire telephone lines to homes and
businesses. Unlike regular dial-up copper telephone line service, ADSL provides
continuously available, always-on broadband connections.

ADSL is asymmetric in that it uses most channels to transmit downstream to the user and
only a small part for uploading information from the user.

ADSL connections and other forms of high-speed DSL were available in urban areas. ADSL
simultaneously accommodates analog (voice) information and data on the same phone line.
It is generally offered at downstream internet connection data rates from 512 kilobits per
second (Kbps) to about 6 megabits per second (Mbps).

ADSL (Asymmetric Digital Subscriber Line) is the first technology of DSL technologies.
It is just like 56K modem that is able to provide a higher speed of data in the downstream
direction than in the upstream direction. That is the reason why its name is Asymmetric
DSL. It divides bandwidth unevenly to meet the need of residential customers. As we
know that business purposes require higher bandwidth so it is not suitable for them.

Bandwidth division in ADSL

Using Existing Local Loops :


It uses existing local loops. It is capable to reach data rate that is not possible by traditional
modem it is just because of the use of twisted pair local loop i.e. capable of handling
bandwidths up to 1.1 MHz, but there are the installations of filters at the end offices of the
telephone company where the bandwidth limits of each loop are up to 4KHz. Without the
filter, the 1.1 MHz is available for both data and voice communication.
Adaptive Technology :
Unfortunately, 1.1 MHz is just a theoretical bandwidth. The factors like distance between
residence and switching offices will affect the bandwidth due to reasons like the size of the
cable, signal used and so on. Before setting up the data rate, the developers of this
technology uses adaptive technology for this purpose. Thus, we can say that the data rate
of ADSL technology is not fixed, it changes according to the conditions and the type of
local loop used.
Discrete Multitone Technique :
The standard modulation technique for ADSL is Discrete Multitone Technique which
combines both QAM and FDM. There is the availability of 1.104 MHz bandwidth. It is
divided into 256 channels. The following is the distribution of bandwidth –

 IDLE –
1 to 5 channels are not used and these will provide a gap between voice and data
communication.

 Upstream Data and Control –


Channel 6 to 30 are used for upstream data transfer and control. One channel is used for
control and other 24 are used for data transfer.

 Downstream Data and Control –


Channels 31 to 255 are used for downstream data transfer and control. Like upstream in
this also one channel is used for control and other 224 are used for data transfer.

Customer Site : ADSL Modem


The ADSL Modem is installed at a customer’s site. In this local loop connects to a splitter
which is used to separate voice and data communication. Modulation and Demodulation
are done using DMT and it creates separate downstream and upstream channels.

ADSL Modem

The splitter must be installed at the customer premises, from the telephone company. The
voice line can be installed by the existing wiring in the house but the data line need to be
installed by the professional. Due to this, the ADSL line becomes expensive.
Telephone Company Site : DSLAM
The view is different from the telephone company site. Instead of using ADSL modem,
they are using DSLAM i.e. Digital Subscriber Line Multiplex. In addition to ADSL
features, it has an additional feature to packetizes the data to is be sent to the internet. The
following is the configuration of the DSLAM

DSLAM
Features Of ADSL :
 High speed internet access.
 Both internet and calling facilities.
 Fair prices.
 Real time access to information.

b) DSL and ADSL Encoding Schemas: 10


DSL (Digital Subscriber Line) denotes an internet that uses digital connections between a
modem and a phone line. ADSL means Asymmetrical Digital Subscriber Line where the speed
of data sent is known as upstream and data received is known as downstream.
Broadband internet is the most widely used form of Internet connection because of its
efficiency and high speed. DSL is the generic term for Digital Subscriber Line Services
while ADSL is just one of its types. DSL (Digital Subscriber Line) denotes an internet that
uses digital connections between a modem and a phone line. ADSL means Asymmetrical
Digital Subscriber Line where the speed of data sent is known as upstream and data received
is known as downstream. Both are internet high-speed connections that can work on your
existing telephone line. There is no need to upgrade your telephone connection for using
both these types of services. Apart from this, both DSL and ADSL do not interfere with your
telephone service and can be used simultaneously without any issues.

ADSL allows you to download data faster than upload and hence it is called ‘asymmetric.
Generally, while using the internet, you are likely to download more information than
uploading. DSL connection works by utilizing the unused wires in your telephone network
to transmit signals. The copper wires that are designed for voice signals can also carry a
significant amount of bandwidth. DSL and ADSL will not affect your telephone service
because some of the wires are used to transmit voice signals while others are used to
transmit digital signals. ADSL uses a special modem and a micro-filter in the subscriber’s
telephone line to transmit data.

When you are working on an ADSL connection, your computer will always be connected to
the internet as long as the power is on. Once you switch on the computer, it will get
connected to the internet automatically unless you manually disconnect it. The speed and
availability of your DSL service may depend on the distance from your home or business to
the nearby telephone office. Speed can be slow in outer urban, warm out copper lines and
neighbourhood traffic can also affect broadband speeds.

ADSL is primarily subscribed by residential customers who receive ample data but do not
send as much. Internet service providers also offer options of higher bandwidth for upload
and download or both. But a higher speed will come at higher rates.

2 a) ADSL Fault and Performance Management: 10

Fault management is a discipline of IT operations management focused on detecting,


isolating, and resolving problems. Faults occur any time a configuration item (CI)
malfunctions or whenever an event interferes or prevents proper operation or service
delivery.

Fault management involves a five-step process: (1) Fault detection, (2) Fault location, (3)
Restoration of service, (4) Identification of root cause of the problem, and (5) Problem
resolution

Fault in a network is normally associated with failure of a network component and


subsequent loss of connectivity. Fault management involves a five-step process:
i. The fault should be detected as quickly as possible by the centralized management system,
preferably before or at about the same time as when the users notice it.

iii. The reason for doing this is that it is important to restore service to the users as quickly as
possible, using alternative means.
iv. The restoration of service takes a higher priority over diagnosing the problem and fixing
it.
v. Identification of the root cause of the problem could be a complex process, which we will
go into greater depth soon.
vi. After identifying the source of the problem, a trouble ticket can be generated to resolve
the problem.
vii. In an automated network operations center, the trouble ticket could be generated
automatically by the NMS.

Fault Detection:
i. Fault detection is accomplished using either a polling scheme (the NMS polling
management agents periodically for status) or by the generation of traps (management
agents based on information from the network elements sending unsolicited alarms to the
NMS).
ii. An application program in NMS generates the ping command periodically and waits for
response. Connectivity is declared broken when a preset number of consecutive responses
are not received.
Performance Management: reporting operating conditions and history.

b) ADSL Configuration and Network Management Elements:

Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL)
technology, a data communications technology that enables faster data transmission over
copper telephone lines than a conventional voice band modem can provide.
• ADSL (Asymmetric Digital Subscriber Line) is a technology for transmitting digital
information at a high bandwidth on existing phone lines to homes and businesses.
• Unlike regular dialup phone service, ADSL provides continuously-available, "always on"
connection.
• ADSL differs from the less common symmetric digital subscriber line (SDSL)

ADSL is generally offered at downstream data rates from 512 Kbps to about 6 Mbps.
• Providers usually market ADSL as a service for consumers for Internet access for primarily
downloading content from the Internet, but not serving content accessed by others.
• ADSL works by using the frequency spectrum above the band used by voice telephone
calls.
• With a DSL filter, often called splitter, the frequency bands are isolated, permitting a single
telephone line to be used for both ADSL service and telephone calls at the same time.
• ADSL is generally only installed for short distances from the telephone exchange, typically
less than 4 kilometers.
• At the telephone exchange, the line generally terminates at a digital subscriber line access
multiplexer (DSLAM) where another frequency splitter separates the a frequency band that
might interact voice band signal for the conventional phone network.
• Data carried by the ADSL are typically routed over the telephone company's data network
and eventually reach a conventional Internet Protocol network.
• ADSL communication is full-duplex. Full-duplex ADSL communication is usually
achieved on a wire pair by either frequency-division duplex (FDD), echo-cancelling duplex
(ECD), or time-division duplex (TDD).
• ADSL initially existed in two versions (similar to VDSL), namely CAP and DMT.
• ADSL deployment on an existing plain old telephone service (POTS) telephone line
presents some problems because the DSL is within unfavorably with existing equipment
connected to the line. It is therefore necessary to install appropriate frequency filters at the
customer's premises to avoid interference between the DSL, voice services, and any other
connections to the line (for example intruder alarms). This is desirable for the voice service
and essential for a reliable ADSL connection.
• ADSL defines three "Transmission protocol-specific transmission convergence (TPS-TC)"
layers:
1. Synchronous Transport Module (STM), which allows the transmission of frames of
the Synchronous Digital Hierarchy (SDH)
2. Asynchronous Transfer Mode (ATM)
3. Packet Transfer Mode
• ADSL simultaneously accommodates analog (voice) information on the same line.
• A form of ADSL, known as Universal ADSL or G.lite, has been approved as a standard by
the ITU-TS.
• ADSL was specifically designed to exploit the one-way nature of most multimedia
communication in which large amounts of information flow toward the user and only a small
amount of interactive control information is returned.

3 a) Fault Management: 10
Fault management is a discipline of IT operations management focused on detecting,
isolating, and resolving problems. Faults occur any time a configuration item (CI)
malfunctions or whenever an event interferes or prevents proper operation or service
delivery.

Fault management involves a five-step process: (1) Fault detection, (2) Fault location, (3)
Restoration of service, (4) Identification of root cause of the problem, and (5) Problem
resolution

Fault in a network is normally associated with failure of a network component and


subsequent loss of connectivity. Fault management involves a five-step process:
i. The fault should be detected as quickly as possible by the centralized management system,
preferably before or at about the same time as when the users notice it.

iii. The reason for doing this is that it is important to restore service to the users as quickly as
possible, using alternative means.
iv. The restoration of service takes a higher priority over diagnosing the problem and fixing
it.
v. Identification of the root cause of the problem could be a complex process, which we will
go into greater depth soon.
vi. After identifying the source of the problem, a trouble ticket can be generated to resolve
the problem.
vii. In an automated network operations center, the trouble ticket could be generated
automatically by the NMS.

Fault Detection:
i. Fault detection is accomplished using either a polling scheme (the NMS polling
management agents periodically for status) or by the generation of traps (management
agents based on information from the network elements sending unsolicited alarms to the
NMS).
ii. An application program in NMS generates the ping command periodically and waits for
response. Connectivity is declared broken when a preset number of consecutive responses
are not received.
Performance Management: reporting operating conditions and history.

b) Policy Management Architecture: 10


The network management is accomplished based on policy. The policy is the combination of
rules and services where rules define the criteria for resource access and usage. A policy is
formally defined as an aggregation of policy rules. Each policy rule is comprised of a set of
conditions and a corresponding set of actions. The condition defines when the policy rule is
applicable. Once, a policy rule is so activated, one or more actions contained by that policy
rule may then be excuted. These actions are associated with either meetig or not meeting the
set of conditions specified in the policy rule.

Architecture of Policy-based Network Management

a) Network Topology:
4 The arrangement of a network that comprises nodes and connecting lines via sender and
receiver is referred to as network topology. The various network topologies are:
Mesh Topology:
In a mesh topology, every device is connected to another device via a particular channel.
In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols),
DHCP (Dynamic Host Configuration Protocol), etc.
Figure 1: Every device is connected to another via dedicated channels. These channels are
known as links.

 Suppose, the N number of devices are connected with each other in a mesh topology,
the total number of ports that are required by each device is N-1. In Figure 1, there are 5
devices connected to each other, hence the total number of ports required by each
device is 4. The total number of ports required=N*(N-1).
 Suppose, N number of devices are connected with each other in a mesh topology, then
the total number of dedicated links required to connect them is NC2 i.e. N(N-1)/2. In
Figure 1, there are 5 devices connected to each other, hence the total number of links
required is 5*4/2 = 10.
Advantages of this topology:
 Communication is very fast between the nodes.
 It is robust.
 The fault is diagnosed easily. Data is reliable because data is transferred among the
devices through dedicated channels or links.
 Provides security and privacy.
Problems with this topology:
 Installation and configuration are difficult.
 The cost of cables is high as bulk wiring is required, hence suitable for less number of
devices.
 The cost of maintenance is high.
Star Topology:
In star topology, all the devices are connected to a single hub through a cable. This hub is
the central node and all other nodes are connected to the central node. The hub can be
passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time
the hub can be intelligent known as an active hub. Active hubs have repeaters in them.
Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many
popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier
Sense Multiple Access), etc.

Figure 2: A star topology having four systems connected to a single point of connection
i.e. hub.
Advantages of this topology:
 If N devices are connected to each other in a star topology, then the number of cables
required to connect them is N. So, it is easy to set up.
 Each device requires only 1 port i.e. to connect to the hub, therefore the total number of
ports required is N.
 It is Robust. If one link fails only that link will affect and not other than that.
 Easy to fault identification and fault isolation.
 Star topology is cost-effective as it uses inexpensive coaxial cable.
Problems with this topology:
 If the concentrator (hub) on which the whole topology relies fails, the whole system will
crash down.
 The cost of installation is high.
 Performance is based on the single concentrator i.e. hub.
Bus Topology:
Bus topology is a network type in which every computer and network device is connected
to a single cable. It is bi-directional. It is a multi-point connection and a non-robust
topology because if the backbone fails the topology crashes. In Bus Topology, various
MAC (Media Access Control) protocols are followed by LAN ethernet connections like
TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.

Figure 3: A bus topology with shared backbone cable. The nodes are connected to the
channel via drop lines.
Advantages of this topology:
 If N devices are connected to each other in a bus topology, then the number of cables
required to connect them is 1, known as backbone cable, and N drop lines are required.
 Coaxial or twisted pair cables are mainly used in bus-based networks that support up to
10 Mbps.
 The cost of the cable is less compared to other topologies, but it is used to build small
networks.
 Bus topology is familiar technology as installation and troubleshooting techniques are
well known.
 Problems with this topology: A bus topology is quite simpler, but still, it requires a lot
of cabling.
 If the common cable fails, then the whole system will crash down.
 If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.
 Adding new devices to the network would slow down networks.
 Security is very low.
Ring Topology:
In this topology, it forms a ring connecting devices with exactly two neighboring devices.
A number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent
data loss repeaters are used in the network.
The data flows in one direction, i.e.., it is unidirectional, but it can be made bidirectional
by having 2 connections between each Network Node, it is called Dual Ring Topology. In-
Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit
the data.
Figure 4: A ring topology comprises 4 stations connected with each forming a ring.
The most common access method of ring topology is token passing.
 Token passing: It is a network access method in which a token is passed from one node
to another node.
 Token: It is a frame that circulates around the network.
The following operations take place in ring topology are :
1. One station is known as a monitor station which takes all the responsibility for
performing the operations.
2. To transmit the data, the station has to hold the token. After the transmission is done,
the token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the ring.
4. There are two types of token release techniques: Early token release releases the token
just after transmitting the data and Delayed token release releases the token after the
acknowledgment is received from the receiver.
Advantages of this topology:
 The data transmission is high-speed.
 The possibility of collision is minimum in this type of topology.
 Cheap to install and expand.
 It is less costly than a star topology.
Problems with this topology:
 The failure of a single node in the network can cause the entire network to fail.
 Troubleshooting is difficult in this topology.
 The addition of stations in between or the removal of stations can disturb the whole
topology.
 Less secure.
Tree Topology :
This topology is the variation of the Star topology. This topology has a hierarchical flow
of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic
Configuration ) are used.

Figure 5: In this, the various secondary hubs are connected to the central hub which
contains the repeater. This data flow from top to bottom i.e. from the central hub to the
secondary and then to the devices or from bottom to top i.e. devices to the secondary hub
and then to the central hub. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.
Advantages of this topology :
 It allows more devices to be attached to a single central hub thus it decreases the
distance that is traveled by the signal to come to the devices.
 It allows the network to get isolated and also prioritize from different computers.
 We can add new devices to the existing network.
 Error detection and error correction are very easy in a tree topology.
Problems with this topology :
 If the central hub gets fails the entire system fails.
 The cost is high because of the cabling.
 If new devices are added, it becomes difficult to reconfigure.
Hybrid Topology :
This topological technology is the combination of all the various types of topologies we
have studied above. It is used when the nodes are free to take any form. It means these can
be individuals such as Ring or Star topology or can be a combination of various types of
topologies seen above. Each individual topology uses the protocol that has been discussed
earlier.

Hybrid Topology

Figure 6: The above figure shows the structure of the Hybrid topology. As seen it contains
a combination of all different types of networks.
Advantages of this topology :
 This topology is very flexible.
 The size of the network can be easily expanded by adding new devices.
Problems with this topology :
 It is challenging to design the architecture of the Hybrid Network.
 Hubs used in this topology are very expensive.
 The infrastructure cost is very high as a hybrid network requires a lot of cabling and
network devices.

b) Classification of Report in report management: 10

Types of Managerial Accounting Reports


 Budget Reports. ...
 Account Receivable Aging Reports. ...
 Cost Managerial Accounting Reports. ...
 Performance Reports. ...
 Other Managerial Accounting Reports.

5 a) Generation of Firewall: 10
Generation of firewall is within the third generation of firewall technology, designed to
address advanced security threats at the application level through intelligent, context-
aware security features.
1. Packet filtering firewall ·
2. Circuit-level gateway ·
3. Application-level gateway ·
4. Stateful inspection firewall ·
5. Next-generation firewall.

b Client-Server Authentication System: 10

Client Authentication is the process by which users securely access a server or remote
computer by exchanging a Digital Certificate. The Digital Certificate is in part seen as
your 'Digital ID' and is used to cryptographically bind a customer, employee, or partner's
identity to a unique Digital Certificate (typically including the name, company name and
location of the Digital Certificate owner). The Digital Certificate can then be mapped to a
user account and used to provide access control to network resources, web services and
websites.

Just as organizations need to control which individual users have access to corporate
networks and resources, they also need to be able to identify and control which machines
and servers have access. Implementing device authentication means only machines with the
appropriate credentials can access, communicate, and operate on corporate networks.

Organizations can leverage the registry information stored in Active Directory to


automatically issue template-based and optionally configured certificates to all machines and
servers residing within a single domain, or multiple domains in a single or multiple forest
configuration.

The Digital Certificates used for client and device authentication may look the same as any
other Digital Certificate that you may already be using within your organization, such as
certificates for securing web services (SSL) or email/document signatures (digital
signatures), but Digital Certificates are likely to have a few different properties depending
on the use.

Client authentication can be used to prevent unauthorized access, or simply to add a second
layer of security to your current username and password combination. Client authentication
and access control also enables organizations to meet regulatory and privacy compliancy, as
well as fulfil internal security policies using PKI-based two-factor authentication –
'something you have' (a GlobalSign Digital Certificate) and 'something you know' (an
internally managed password).

The benefits of client authentication

Client authentication has multiple benefits as an authentication method especially when


compared to the basic username and password method:

 You can decide whether or not a user is required to enter a username and password
 Encrypts transactions over the network, identifies the server and validates any messages
sent
 Validates the user identity using a trusted party (the Certificate Authority) and allows for
centralized management of certificates which enables easy revocation
 Optional - you can configure the certificate so it cannot be exported to other devices,
making it unique to the device it is installed on
 Restrict access by user, group, roles, or device based on Active Directory (using
GlobalSign's Auto Enrolment Gateway (AEG) solution)
 Serves more purposes than authentication such as integrity and confidentiality
 Prevents malicious attacks/problems, including but not limited to phishing, keystroke
logging and man-in-the-middle (MITM) attacks

You might also like