1/1 .. Telecommunication Network Model: 1.physical Layer - Transfers To & Gathers From The
1/1 .. Telecommunication Network Model: 1.physical Layer - Transfers To & Gathers From The
value.
2/2…NETWORK MANAGEMENT STANDARDS AND PROTOCOL OR SALIENT FEATURES
1.OSI/CMIP:•International standard (ISO/OSI)•Management of data communications networks--LAN &
WAN•Deals with all 7 layers•Object oriented•Well structured & layered•Consumes large resource in
implementation•The OSI management protocol standard is CMIP (Common Management Information
Protocol) , & has built-in services ,CMIS (Common Management Information Service) that specify the basic
services needed to perform the various functions 2.SNMP/Internet•Industry standard (IETF)•Originally
intended for management of Internet components, currently adopted for WAN &telecommunication
systems•Easy to implement•Most widely implemented 3.TMN•International standard (ITU-T)
•Management of telecommunications network•Based on OSI network management framework
•Addresses both network & administrative aspects of management•IEEE standards adopted internationally
•Addresses management of LANs & MANs•Adopts OSI standards significantly•Deals with first 2 layers of
the OSI reference model 4.Web Based Management •This is based on using Web technology, a web server
for the management system and web browsers for network management stations•Web Based Enterprise
Management (WBEM)•Java Management Extensions (JMX)•DMTF (Desktop Management Task Force) is
developing specifications for WBEM.•JMX is based on a special subset of Java applets developed by Sun
microsystems that runs in the network components.
2/3… TWO TIER AND 3 TIRE ORGANIZATION MODEL {REFERRR… 3/1}
2/4..SNMP BASED ASN.1 DATA TYPES STRUCTURES.
Simple Type•A simple type one for which the values are specified directly. For example, we can define a
page of a book as PageNumber of simple type. i.e. PageNumber::=INTEGER}}
ChapterNumber::=INTEGER }} Structured Type }}•A data type is a structured type when it contains other
type.•Types that are within a structured type are called component types. For example ,we can define all
the pages of the book as a collection of individual pages.}} i.e. BookPages::=SEQUENCE OF {SEQUENCE
{ChapterNumber , Separator ,PageNumber} }•SET is distinguished from SEQUENCE in 2 respects:
1)The data types should all be distinct and 2)The order of values in SET is of no consequence whereas it is
critical in the SEQUENCE construct.Tagged Type•Tagged type is a type derived from another type that is
given a new tag id.•A
tagged type is defined
to distinguish types
within an application.
Other Type•
Other type is a data
type that is not
predefined.•This is
chosen from CHOICE
and ANY types, which
are contained in other
types.•Type CHOICE
defines the selection of
one value from a
specified list of distinct
types.
DATA PLANE:The data plane (also referred to as the forwarding plane) is responsible for forwarding data
packets between devices in the network.Since it operates at a lower level of abstraction than the control plane,
it forwards packets according to the routing information provided by the control plane.The data plane is critical
for the network’s performance because it’s responsible for the efficient transfer of data between
devices. It uses protocols such as Ethernet and Internet Protocol (IP) to perform its functions. So, the data plane
processes data packets and forwards them to their intended destination by effectively executing previously defined
routes. CONTROL PLANE: The control plane is responsible for managing network routing protocols, which
enable communication between devices.It controls the exchange of routing information between devices
in the network and determines the best path for data to take. This plane can use protocols such as
the Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP) to do that.
4/10…BROADBAND LAN ARCHITECTURE A local area network (LAN) is a group of computers and
peripheral devices that share a common communications line or wireless link to a server within a distinct
geographic area. A local area network may serve as few as two or three users in a home office or thousands
of users in a corporation's central office.
Broadband Remote Access Servers (BRASes) play a crucial role in today's networks, handling all traffic
coming from access networks (e.g., DSL traffic), applying operator policies and providing the first IP point in
the network. It is perhaps unsurprising then, that these are expensive, proprietary, difficult-to-upgrade
boxes.
4/1.. ADSL ….(ASYMMETRIC DIGITAL SUBSCRIBER LINE)
Among all the xDSLs, the asymmetric digital subscriber line (ADSL) is the technology that is being deployed now in
most of the world. and consists of an ADSL transmission unit (ATU) and splitter at each end of the ADSL line. The ATU
acronym has also been expanded in print asthe ADSL transceiver unit as well as the ADSL terminating unit, although
ADSL TR-001 defines it as the ADSL transmission unit. The ATU at the central office is ATU-C and the one at the
customerresidence is ATU-R. The ATUis also called the ADSL modem.
ADSL ACCESS NETWORK ADSL SPECTRUM ALLOCATION
•CRITTER is CBR-based trouble resolution system •Integrated with Cabletron Spectrum NMS
5/9…SECURITY BREACHES AND RESOURCE NEEDED AND PREVENT & EXPLAIN SECRET KEY
AND PUBLIC-KEY.
when a website unintentionally reveals sensitive information to its users. Depending on the context,
websites may leak all kinds of information to a potential attacker, including: Data about other users, such as
usernames or financial information, Sensitive commercial or business data Technical details about the
website and its infrastructure Secure communication requires:•Integrity protection: ensuring that the
message is not tampered with •Authentication validation: ensures the originator identification
• Security threats•Modification of information•Masquerade•Message stream modification•Disclosure
• Hardware and software solutions• Most secure communication is software based
Secret key cryptography• Each letter is replaced by another letter n letters later in the alphabet (i.e., key of
n). Of course, the sender and
the receiver have to agree
ahead on the secret key for
successful communication. It
is the same key that is used
for encryption and decryption
and is called secret key
cryptography.•The
encryption and decryption
modules can be implemented in either hardware or software. It is not hard to decode the above ciphertext
by an intruder. It would only take a maximum of 26 attempts to decipher since there are 26 letters in the
alphabet.• In this cryptography method (also known as symmetric-key cryptography), the single key needed
to encrypt and decrypt messages is a shared secret between the communicating parties.
Public Key Cryptography• Public key cryptography uses a pair of keys to encrypt and decrypt data to
protect it against unauthorized access or use......This key is used to encrypt the message, and to
send it to the recipient. When the message arrives, the recipient decrypts it using a private key, to which no
one else has access. }} Example: Public keys of every user are present in the Public key Register. If B wants
to send a confidential message to C, then B encrypt the message using C Public key. No other recipient
other than C can decrypt the message because only C know C's private.
5/10…POLICY MANAGEMENT ARCHITECTURE
he objects in the
domain space are events such as alarms in fault management, packet loss in performance, and
authentication failure in security management.The objects have attributes.{{For example, attributes of
alarms are severity, type of device, location of device, etc. Attributes of packet loss can be the layer at
which packets are lost, the percentage loss, etc. Rules in the rule space define the possible actions that
could be taken under various object conditions. It is the same as in RBR, with if–then, condition–action.
•Domain space consists of objects (alarms with attributes)•Rule space consists of rules (if-then)•
Policy Driver controls action to be taken•Distinction between policy and rule; policy assigns responsibility
and accountability•Action Space implements actions
5/11..AUTHENTICATION SERVER SYSTEM.
•An authentication server system, shown in Fig,is somewhat similar to the ticket- granting system except
that there is no ticket granted.•No login identification and password pair is sent out of the client
workstation. The user authenticates to a central authentication server, which has jurisdiction over a domain
of servers.•The central authentication server, after validation of the user, acts as a proxy agent to the client
and authenticates the user to the application server. This is transparent to the user, and the client proceeds
to communicate with the application server. This is the architecture of Novell LAN.