Computer Networks Answers

Questions: 294

Free Answers by our Experts: 276

Ask Your question

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

1. Objectives

The main objective of this project is to let you know in more detail the design and description process of a Management Information Base (MIB). A simple case will be studied and treated with the formalism dictated by SMI-v2 described by RFC 1213.

2. Introduction

SMI-v2 uses only a very small subset of ASN.1 and has few templates to formally describe an information base.

RFC 1213 gives the formalism to use a description of a MIB that will be handled with the SNMP protocol. This project will therefore ask you to familiarize yourself with this RFC.

3. Presentation of the context and design of the MIB

You should design a private Management Information Base to supervise a host. The goal is to use SNMP to communicate the information to a network management application and to be able to automatically control the state, generate useful reports and possibly detect performance or security issues.

- What information would be required to manage a host?

- Distinguish between the simple variables and their types, and the tables necessary for this information base.

 

4. Formal description of the MIB

For this part, we will offer you a simplified MIB in the Appendix. According to an informal description, you must format this MIB in accordance with the SMI-v2 standard. Pay particular attention to how a table should be described, and to the DESCRIPTION field of each object.

- Name the module containing the MIB using the following format: studentName-StudentID-MIB,

- Choose the OID (Object Identifier) ​​of each element,

- Define a coherent tree structure,

- Use the ASN.1 syntax for the types of the elements.

-Write the complete MIB in text format using the SMI-v2 standard (refer to the tutorial of SMI)

 5. Appendix

The elements to consider for the design of the MIB are:


1- Percentage of free CPU "freeCPULoad"

2- Percentage of unallocated memory "freeMemoryLoad"

3- If the workstation is an "isWebServer" web server

4- The operating system version "version"

5- The old start date of the "lastHostReboot" system

6- The number of current users that are logged into the "usersNumber" workstation

7- A table of these users: "usersTable"

8- The user's login name, "userId"

9- The date of the opening of the session, "userLoginDate"

 


Provide a sentence or two explaining the different between data and information provide a geographical examples to aid you explanation


Design a communication model that will be used to deploy a wan for your firm.., using ABCD as the branches


Design a communication model that will be used to deploy a wan for your firm.., using ABCD as the branches


As a system analyst, Design a communication model that will be used to deploy a wan for your firm.., using ABCD as the branches


1. Objectives

The main objective of this project is to let you know in more detail the design and description process of a Management Information Base (MIB). A simple case will be studied and treated with the formalism dictated by SMI-v2 described by RFC 1213.

2. Introduction

SMI-v2 uses only a very small subset of ASN.1 and has few templates to formally describe an information base.

RFC 1213 gives the formalism to use a description of a MIB that will be handled with the SNMP protocol. This project will therefore ask you to familiarize yourself with this RFC.

3. Presentation of the context and design of the MIB

You should design a private Management Information Base to supervise a host. The goal is to use SNMP to communicate the information to a network management application and to be able to automatically control the state, generate useful reports and possibly detect performance or security issues.

- What information would be required to manage a host?

- Distinguish between the simple variables and their types, and the tables necessary for this information base.

 

4. Formal description of the MIB

For this part, we will offer you a simplified MIB in the Appendix. According to an informal description, you must format this MIB in accordance with the SMI-v2 standard. Pay particular attention to how a table should be described, and to the DESCRIPTION field of each object.

- Name the module containing the MIB using the following format: studentName-StudentID-MIB,

- Choose the OID (Object Identifier) ​​of each element,

- Define a coherent tree structure,

- Use the ASN.1 syntax for the types of the elements.

-Write the complete MIB in text format using the SMI-v2 standard (refer to the tutorial of SMI)

 5. Appendix

The elements to consider for the design of the MIB are:


1- Percentage of free CPU "freeCPULoad"

2- Percentage of unallocated memory "freeMemoryLoad"

3- If the workstation is an "isWebServer" web server

4- The operating system version "version"

5- The old start date of the "lastHostReboot" system

6- The number of current users that are logged into the "usersNumber" workstation

7- A table of these users: "usersTable"

8- The user's login name, "userId"

9- The date of the opening of the session, "userLoginDate"

 



Scenario:

AETMAD Bank is a modern and well reputed bank having 200 branches in various cities of a country. The branches are connected with each other through a grand computer network comprising of more than 1000 computers, 200 routers and a number of other related nodes such as switches, printers and scanners etc. The employees of the bank are often rotated among different branches causing change in the number of nodes per branch. In case of employee rotation, some hosts may be added in a branch and some may be removed resulting in change in the overall network topology. The bank is progressing day by day and having goal to expand its services by opening further branches in different cities of the country. The network executive of the bank has been asked to implement most suitable type of routing which would be easy to handle for the well trained networking staff to deal with scalability, any possible complexity and to maintain the overall efficacy of the network.

Question:

After carefully analyzing the above mentioned scenario and requirements of the bank, suggest the most suitable type of routing from the following with two proper reasons:

  1. Distance Vector
  2. Link State




1. Explain the term Computer Virus.

2. Give five (5) examples of antivirus applications.

3. Mention four (4) instances of how Computer Viruses are spread.

4. State three symptoms of Computer Viruses.


a)     Why the business organization choose computer network for its employee computers? List down the different topologies which are used for computer networks. Is MAC address responsible for communication among computers within same LAN.

b)    If a computer manufacturer called Apex created a home page for the Web, what would its URL likely be? Also, provide appropriate e-mail address for yourself, assuming that you are employed by that company.

c)     What factors made Pakistan Telecommunication Company Limited (PTCL) to convert its network from circuit switching to packet switching?

d)    The ubiquitous nature of mobile phones today brings tremendous convenience to our lives, but misuse of new improvements to this technology result in the loss of that convenience and other problems? Justify this statement.



1. Explain the term Computer Virus.

2. Give five (5) examples of antivirus applications.

3. Mention four (4) instances of how Computer Viruses are spread.

4. State three symptoms of Computer Viruses.


LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS