Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
NETWORK MANAGEMENT & SECURITY
1. Describe a basic communication model.
2. State the following terms:a. Configuration Managementb. Fault Managementc. Security Management
3. Who initiates ‘Trap' message? When is this message generated?
4. Describe four major components that build up the SNMP model? Explain each of them.
5. Write down the operation of an SNMP Manager.
6. Elucidate the TMN conceptual model.
7. In the context of Structure of Management Information, what do you understand by the Information module?
8. What do you mean by Demilitarized Zone (DMZ)?
9. Write a descriptive note on RMONv2.
What is the basic difference between latches and flip flops? Ans) flip flops have clock signal whereas latches dont require anyclock pulse..
Determine the term- Cyberspace The conceptual or virtual area where pages, data, images, and all the rest are stored. It is the area from where requests are accepted and ful
Q. Fiber-Optic Cable as transmission media? - Made of glass signals are transmit like light pulses from an LED or laser - Light is as well a form of electromagnetic energy
The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)
Determine about the Tree Topology A generalization of the bus topology. The transmission medium is a branching cable with no closed loops. The tree layout begins at a point kno
Q. Explain about Mesh Topology? - Dedicated point-to-point links to each other device - n (n-1)/2 links an every device will have n-1 I/O ports - Advantages - Dedic
Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric. The maximum hop count is 15, 16 hops are considered unreachable. RIP upd
Large data packets result in fewer load because a smaller part of the packet is used for header information. Optimum networks use 4kB data packets or larger. Large data packets
Q. Explain the Communication Channel Threats? Secrecy Threat - Secrecy is the avoidance of unauthorized information disclosure - Privacy is the guard of individua
implementing cnet sliding window protocol with 6 nodes
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd