NMA Solved PP 14-17
NMA Solved PP 14-17
NMA Solved PP 14-17
Q1 Define the access list and its types? (20142, 20152, 20162)
Access control list:
Access control list is a set of rules that are used to filter network traffic. Access control
list is configured on a router. By using access control list we can protect our sensitive
data by allowing only authorized person to access the network.
Types of Access control list:
We have two types of access lists
1. Standard Access control List
2. Extended Access control List
I. Standard Access Control List:
• With standard access, you can filter only the source IP address of the packet.
• Standard access is not powerful as extended access list.
• Standard access list consume less processor time of the router.
• It easy to configure on router.
II. Extended Access Control List:
• With extended access control list you can filter both source and destination IP
addresses.
• It is more powerful than standard access list.
• It consume more processor time of the router.
• It is harder to configure on router.
Q2 Differentiate between SNMP2 and SNMP3? (20142,20172)
SNMP:
Simple Network Management Protocol is used to monitor a network and the devices
that are attached to that network.
Versions:
1. SNMP1
2. SNMP2
3. SNMP3
I. SNMP1:
It is the network management protocol that assures the message integrity by protecting
message packets with protection mechanism.
II. SNMP2:
It is a network management protocol that assures the message integrity by protecting
the message packets with party based security system. It adds several improvements in
performance along with advancement in security over SNMP1.You can retrieve large
amount of data with a single request called GetBulkRequest. It adds improvement in
manager to manager communication.
III. SNMP3:
It is a network management protocol that assures the message integrity by protecting
the message packets with Cryptographic security system. It adds several improvements
in performance along with advancement in security over SNMP2. SNMP3 introduce
many conventions that are not available in SNMP2.
Q3 Differentiate between Manager and Agent? (20142, 20172)
Manager:
In computer network, group of devices are attached together. Manager Key function is
to monitor and manage the entire network and the devices that are attached to it.
Manager gets the information from network agent and takes decisions about the
network on the bases of that information.
A manager is an application that manages SNMP agents on a network by issuing
requests, getting responses, and listening for and processing agent-issued traps.
Agent:
Agent is software that is installed in a network device. The key function of the agents is
to provide information about the network devices to manager through SNMP.
An agent is a software process that responds to SNMP queries to provide status and
statistics about a network node
Q4 Differentiate between MIB and SMI? (20142, 20172)
MIB: MIB stands for management information base. It is a database that is used to
manage the entities in the communication network. MIB contains the information of
different network segments and manager can use this information for the purpose of
troubleshooting and for improving the performance of the network.
SMI:
SMI stands for structure management information. SMI operates in SNMP to define the
set of modules of related managed objects in MIB. It is a framework that can be
manipulated by SNMP. It provides the building block that specifies the basic format of
management data.
Q5 Define SNMP Proxy server? (20142)
Proxy Server:
You need proxy server when there is no direct communication between manager and
agent is possible. This happens if hosts are located in a network with private RFC 1918
addresses behind a firewall. The management station can only communicate with one
proxy host in that network.
Q6 What is Firewall, what are the available firewalls in the market (any two)? (20142)
Firewall:
A firewall is a hardware or software system that prevents the unauthorized access to or
from a network. Firewall can be implemented in both hardware and software or a
combination of both.
Available Firewall:
• Packet Filtering Firewall
• Proxy
• State full inspection
Q7 what is RFC, mention any two RFCs? (20142)
RFC:
RFC stands for Request for Comment. RFC connections can always be used across the
entire system. This means that if you define RFC connection in client 000 than you can
access and use this connection in client 100 too.
Available RFCs:
RFC 20 – ASCII format for network interchange
RFC 868 – Time Protocol
RFC 863 – Discard Protocol
Q8 what function is performed by “Ping” monitoring tool? (20142)
Ping Monitoring Tool:
Ping monitoring tool is available on any operating system. It is a network connections
detecting tool. Ping monitoring tool acts as a test to see if a networked devices are
reachable or not. It displays the list of available network connections. It connects client
computer to the server computer.
Q9 what is RMON monitoring? (20142)
RMON:
RMON stands for remote monitoring. RMON facilitates in monitoring the operational
activities of the network. RMON use monitoring device called probe to monitor the
network. RMON assists the network administrator with efficient network infrastructure
control and management. Without leaving the office network administrator can manage
the whole network, troubleshoot the problem and increase the performance.
Q10 what is the different between public and private IPs? (20142,20152, 20162)
Public IP's:
Public IP is an external IP address that is used across the entire network to locate
computer systems and devices. Public IP is basically a server IP that is used by all client
devices on the network to access the server.
Private IP's:
Private IP is a local IP address that is used to locate the particular computer on a
network. The IP of each computer is called private IP.
Q1 what are the five functional areas of Network Management? (20152, 20172)
Functional Areas of Networking:
• Configuration Management
• Fault Management
• Performance Management
• Security Management
• Accounting Management
• Asset Management
• Planning Management
Q2 what is the process of detecting problems in fault management? (20152, 20162, 20175)
Fault Management:
Fault is a network normally associated with the failure of a network components and loss of
connectivity.
Process:
Fault management process is consists of 5 steps.
1- Fault Detection
The fault should be detected as quickly as possible by central management system.
2-Fault Location:
Fault location involves where the problem is located.
3-Restoration of Service:
Try to restore the service to the user by alternative means quickly as possible.
4-Identification of Real Cause of the problem:
It is very complex process. In this process we identify the real cause of the problem.
5- Problem Resolution:
After identifying a problem we try to resolve the problem.
Q3 what is the functionality of probe in RMON? (20152, 20162, 20172)
Functionality Of Probe In RMON:
Probe is a monitoring device that monitors the entire network and its traffic. Probe set
the alarm for certain condition and when that certain condition occurs it notifies the
network manager. Probes are always placed permanently into a network.
Q4 what are the versions/editions of windows server 2003? (20152, 20162, 20172)
Window Server 2003 Editions:
• Standard Edition
• Enterprise Edition
• Data Center Edition
• Web Edition
Standard Edition:
It is designed for every day’s needs of small and medium businesses. It provides file and
printer services, secure internet connectivity and centralized management of network
resources.
Enterprise Edition:
Generally used for medium to large businesses. It is designed for organizations that
require better performance, reliability and availability than standard edition provides.
Data Center Editions:
It is designed for data centers. It is used to store very large amount of data.
Web Editions:
It is a low cost edition. It is used for hosting and deploying web services and
applications. It is designed for all types of data businesses.
Q5 what are the three roles for a Windows Server 2003 system in a network? (20152, 20162,
20172)
File Server Role:
File servers enables the users to store file in central location and share the files with
another user.
Printing Server Role:
Printing server role provides printing service for the network.
Mail Server Role:
Mail server role provides mail service for the network.
Q6 How to add a folder to the favorites list in Windows XP? (20152, 20162)
Steps:
1. First launch window explorer and open the folder that you want to add into
favorite list.
2. Once the desire folder is open, navigate to the left pane and right click the
favorite menu.
3. The click on “ add current location to favorite” option.
Q7 what are the limitations of firewall? (20152, 20162)
Firewall limitations:
• Cannot protect from attacks bypassing it
• Cannot protect against internal threats
• Cannot Fix Administrator mistakes
Q9 what’s difference between Ad-hoc and Infrastructure mode Wireless network? (20152,
20162, 20172)
Ad-hoc Infrastructure
1. An Ad-hoc network allows each device to 1. An Infrastructure mode network requires
communicate directly with each other. the use of an Access Point.
2. There is no central Access Point 2. The Access Point controls Wireless
controlling device communication. communication and offers several
3. Ad-hoc networks are only able to important advantages over an Ad-hoc
communicate with other Ad-hoc devices, network.
they are not able to communicate with 3. An Infrastructure based network
any Infrastructure devices or any other supports increased levels of security,
devices connected to a wired network. In potentially faster data transmission
addition, Ad-hoc mode security is less speeds and integration with a wired
sophisticated. network.
Q1 what is the difference between share and security permissions? (20162, 20172, 20145)
Share Permission Vs Security Permission
Q5 What are the four differences between Workgroup and Domain in windows networking?
(20172, 20155, 20165)
Workgroup Vs Domain:
Workgroup Domain
Each user controls the settings One can make only limited
Computer's settings on their own computer. No changes to a computer's settings
central settings. because network administrators
often want to ensure consistency
among computers.
I
Long QUESTIONS
Q3.a) what is the role of DNS server in Network and what’s type of DNS, Briefly explain it
with example? (20145, 20175)
DNS:
The DNS translates Internet domain and host names to IP addresses. DNS automatically
converts the names we type in our Web browser address bar to the IP addresses of Web
servers hosting those sites.
We do so because it is easy to remember names than to remember long decimal numbers.
For example www.uta.edu maps to 129.107.56.31
DNS SERVER:
DNS Server store information about domain names and their corresponding DNS records. DNS
records hold information regarding the address, web host, domain registration.
Whenever the request for information is made the DNS server responds with relevant
information.
Types of DNS Server:
DNS server is classified on the basis of the function they perform.
Zone Master Server:
Zone master server is the authoritative server. It will have a database of all the data
associated with the particular zone. This data is available on two server namely the
primary master server and secondary slave server. Whenever particular information is
requested, the zone computer consults the master server.
Primary Master Server:
The primary master server contains the master copy of the domain data. This master
data loaded on the disk when its operations start. This is the main server which is
referred to when relevant information is needed.
Secondary Slave Server:
In the cases of master server failure the secondary slave server provides the relevant
information. It is also used as a backup server that contains the backup of the master
server.
Caching only server:
The caching only server stores results of the queries that are made. The next time this
information is needed the server fetches it immediately instead of waiting. These
servers are not authorized for any domain and they only perform queries.
Forwarding Server: These servers are known as proxy, client, or remote servers. These
Servers forward all requests to other DNS and cache the results.
Q3.b) what is the difference between share and security permission? (20145, 20175)
Q4) Write the procedure for client and server to Remote Disk access with NFS in Linux?
(201410)
Q5.a) what’s the purpose of Active directory, User Administration, Domain controller,
Additional Domain controller? (20145, 20165)
Active Directory:
Active Directory is a Directory Service which Contains Information of All User Accounts
and Shared Recourses on a Network. Active Directory is a Centralized Hierarchical
Directory Database. It Provide User Logon and Authentication Services. It is used to
organize and manage: User Accounts, Computers, Groups, and Network Resources
.Enables authorized Users to easily locate Network Resources.
User Administration:
User Administration (UADM) is an application used to manage ERA (Electronic Research
Administration) user accounts across all ERA applications.
Domain Controller:
A domain controller (DC) is a server that responds to security authentication requests
within a Windows Server domain. It is responsible for allowing host access to Windows
domain resources. A domain controller is the centerpiece of the Windows Active
Directory service. It authenticates users, stores user account information and enforces
security policy for a Windows domain.
Additional Domain Controller
Having one Domain Controller is not safe for the organization’s network because, it
would be a single point of failure in case of any technical breakdown. Entire network will
be down and would lead to big outage. For eliminating the risk of network breakdown
we need to have an Additional Domain Controller (ADC) in our environment.
Q5.b) Define the scope of DHCP server, configure a range 192.168.0.1 – 192.168.0.200, first 20
IPs are for servers, last 5 IPs are reserves. Write its configuration step by step. (20145, 20165)
Workgroup Domain
Each user controls the settings One can make only limited
Computer's settings on their own computer. No changes to a computer's settings
central settings. because network administrators
often want to ensure consistency
among computers.
I
RMON1 MIB:
• With the RMON1 MIB, network managers can collect information from re-mote
Network segments for the purposes of troubleshooting and performance.
• An RMON implementation typically operates in a client/server model.
• Monitoring devices (commonly called “probes” in this context) contain RMON
software agents that collect information and analyze packets. These probes act
as servers and the Network Management applications that communicate with
them act as clients.