a. Describe the two different contexts in which an elaborate GUI of a management application does very
Question:
a. Describe the two different contexts in which an elaborate GUI of a management application does very little to increase management effectiveness.
b Explain two or more reasons for network management applications to be approached as distributed systems.
c In your own words explain how does the perspective under which network management is approached often differ for an enterprise IT department compared to a service provider?
Question 2
a. Explain which of the following can be used as management tools?
A. alarm management system,
B. spreadsheet,
C. pencil and piece of paper,
D. all of them. AP,6
b. It is stated that a network element can contain more than one management agent and that a management agent can contain embedded management intelligence. Taking these statements literally can lead to the conclusion that the same management intelligence might have to be implemented redundantly in a network element, once for each management agent. Clearly, this would be a wasteful approach. What would be an appropriate refinement of the model of a management agent?
c. Would you expect a management system to provision services to be located at a NOC or at a Central Office? Why?
Question 3
a. Explain why is it important for interoperability that a manager understand the functions provided by an agent?
b. If an upgrade in a network is not carefully planned, service outages can occur. Describe three ways in which upgrade operations might impact network availability.
c. Explain three reasons why cookie-cutter procedures can be useful in network management
Question 4
a. Performance and accounting management are similar, in that both are interested in collecting usage data from the network. Describe an important way in which the use of this data and the requirements for its collection differ.
b. SNMP MIBs use a hierarchical naming structure very similar to the structure many operating systems use to name files and folders. In which way is the object identifier tree of SNMP MIBs different from a naming tree for a file system?
c. One technique that can be used to roll back management transactions involves reverting to an earlier configuration file. Discuss the advantages and drawbacks of this technique.
Question 5
a. Describe how can policy-based management help scale management?
b. Imagine that you are a service provider. An equipment vendor offers you an integrated management system. Which aspects of management integration will such a system be unlikely to address, even if the equipment vendor’s claims are, from his perspective, entirely correct?
c. Imagine that you have decided to invest in the development of custom rules for your event correlation system. The goal is to improve the automated diagnosis of failures in the network. The development can be carried out by one consultant who can incrementally introduce new rules into the system, which will make the system gradually more effective. You decide to give it a try, but you want to make the continuation of the project dependent on it indeed fulfilling your expectations as you go along. Describe the metrics to use to assess whether the system fulfills expectations?
Materials and process in manufacturing
ISBN: 978-0471656531
9th edition
Authors: E. Paul DeGarmo, J T. Black, Ronald A. Kohser