7.8 Exercises


7.8 Exercises

  1. What are the layers of network management? Give an example of management at each layer (what is managed, how is it managed).

  2. What are the differences between monitoring for events and monitoring for trend analysis and planning? Give an example of each type for the following:

    1. Monitoring the capacity of an OC-3c WAN link

    2. Monitoring the utilization of an IP router

  3. Which of the following are end-to-end characteristics? Per-link/per-network/per-element characteristics?

    1. Round-trip delay between a network management device and a computing server

    2. Percentage of utilization of the buffers in an IP router

    3. Maximum throughput between two devices (client and server) using a client-server application

    4. Bit error rate (BER) of a DS3 link

  4. For each of the SNMP commands get, get-next, and set, describe what each command does and give an example of how it is used.

  5. How much storage capacity is required for the network management configuration shown in Figure 7.19 (p. 328)?

    click to expand
    Figure 7.19: Devices for storage capacity problem.

    Exercises 6 through 10 refer to Figure 7.20 (p. 328).

    click to expand
    Figure 7.20: Diagram for Exercises 6 through 10.

  6. This enterprise network currently has a network management system at the corporate network operations center (NOC), located in Minneapolis, which monitors only the 13 corporate routers. Develop a network management architecture that will allow monitoring of the routers, all 190 user devices, and dialup routers, keeping the management traffic local to each area (Los Angeles, Minneapolis, and Washington, DC).

  7. How much management data would be generated in a centralized management approach, assuming data collection of nine SNMP counters on all routers and Internet Control Message Protocol ping polling of all devices (network and user), with a polling interval of 5 minutes? Each SNMP counter and ping generates 64 bytes of data.

  8. Add devices for managing each of the remote sites (outside of the Minneapolis area) out-of-band from the corporate NOC.

  9. How does the addition of out-of-band management between the corporate NOC and remote sites potentially affect the security of the network?

  10. Recommend two ways that the management data collected via SNMP counters from each of the routers could be verified.




Network Analysis, Architecture and Design
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net