COMP 3271 LESSON 12

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which activity is NOT considered a core function of network management?

  • Monitoring network performance.
  • Troubleshooting network issues.
  • Developing new network hardware. (correct)
  • Configuring network components.

In the context of network management, what does 'fault management' primarily address?

  • Identifying, correcting, and preventing network faults. (correct)
  • Maintaining and updating network device configurations.
  • Controlling user access to network resources.
  • Optimizing network performance to meet user demands.

Which of the following is a key element monitored by performance management systems to maintain network efficiency?

  • Frequency of hardware upgrades.
  • Network capacity and throughput. (correct)
  • Number of connected devices.
  • Physical security of network hardware.

How does 'accounting management' control access to network resources?

<p>By tracking resource usage for billing or budgeting purposes. (B)</p> Signup and view all the answers

What is the primary function of 'configuration management' in a network?

<p>Tracking and managing changes to network entities. (A)</p> Signup and view all the answers

Which statement best describes the role of Simple Network Management Protocol (SNMP) in network management?

<p>It is a protocol suite for managing network devices. (A)</p> Signup and view all the answers

What are the two primary components that interact within the SNMP framework?

<p>Managers and agents. (D)</p> Signup and view all the answers

Which protocols are essential to the operation of management on the Internet, alongside SNMP?

<p>SMI and MIB. (D)</p> Signup and view all the answers

In SNMP, what is the role of the Structure of Management Information (SMI)?

<p>To establish rules for naming the objects. (A)</p> Signup and view all the answers

What is the primary function of the Management Information Base (MIB) in SNMP?

<p>To define the structure and format of management data. (C)</p> Signup and view all the answers

What is the role of SNMP in network management?

<p>To transfer and manage information between managers and agents. (B)</p> Signup and view all the answers

Which statement best describes the relationship between SMI and ASN.1?

<p>SMI uses ASN.1 to define data types for managed objects. (B)</p> Signup and view all the answers

Which SNMP component is responsible for defining the number of objects for each entity to be managed?

<p>MIB. (B)</p> Signup and view all the answers

In the context of SNMP, if a manager wants to retrieve the current number of UDP datagrams received by an agent, which SNMP operation would be most appropriate?

<p>Initiating a GetRequest. (D)</p> Signup and view all the answers

Which of the following is NOT a function of Structure of Management Information (SMI)?

<p>To execute commands on network devices. (A)</p> Signup and view all the answers

According to SMI, what is required for each managed object such as a router?

<p>A unique name. (A)</p> Signup and view all the answers

What standard does SMI use to encode data for network transmission, specifying a triplet format of tag, length, and value (TLV)?

<p>BER (Basic Encoding Rules). (A)</p> Signup and view all the answers

What is the purpose of the 'tag' in the Basic Encoding Rules (BER) format used by SMI?

<p>To identify the data type. (C)</p> Signup and view all the answers

What is the role of the well-known port 161 in SNMP communications?

<p>It's used by the server (agent). (D)</p> Signup and view all the answers

What security features were added in SNMPv3?

<p>Security and remote administration. (D)</p> Signup and view all the answers

What does ASN.1 do in data communication?

<p>Defines the definition of data types from sequence of bits transmitted through the network. (C)</p> Signup and view all the answers

In ASN.1, what does the symbol ::= mean?

<p>Defined as or assignment (A)</p> Signup and view all the answers

According to ASN.1, which of the following keywords is for defining new objects?

<p>OBJECT. (D)</p> Signup and view all the answers

What is the purpose of defining new data types in ASN.1?

<p>They help in creating more complex data structures tailored to specific needs. (D)</p> Signup and view all the answers

In ASN.1, what contraint might be specified for an Integer subtype, representing student count?

<p>An integer with the range 15 to 40 (B)</p> Signup and view all the answers

What casing requirements must be met when specifying variables in ASN.1?

<p>Variables should start with a lower case letter (D)</p> Signup and view all the answers

Which ASN.1 keyword is used to define a structured data type similar to 'struct' in C or C++?

<p>SEQUENCE (A)</p> Signup and view all the answers

What happens after data has been defined and values are associated with variables in ASN.1?

<p>ASN.1 uses encoding to encode the message to be sent. (C)</p> Signup and view all the answers

A network administrator notices that the response time for applications has significantly increased. Which area of network management should they investigate first?

<p>Performance Management (C)</p> Signup and view all the answers

A company wants to track the usage of network resources by different departments for budgeting. Which area of network management is most relevant?

<p>Accounting Management (C)</p> Signup and view all the answers

A network engineer needs to identify and document all hardware and software components in a newly established network. Which of the following falls under Configuration Management?

<p>Both documenting the initial build and reconfiguring the network. (B)</p> Signup and view all the answers

A manufacturer specifies a lifetime for component parts in the network. Which type of fault management is performed if the parts are replaced before reaching their end of life?

<p>Proactive Fault Management (A)</p> Signup and view all the answers

What is the purpose of Reactive Fault Management?

<p>To fix problems as they happen (A)</p> Signup and view all the answers

If you detect many users unable to connect to the network and response time is severely impacted, what would be appropriate to examine?

<p>Network Capacity (C)</p> Signup and view all the answers

SNMP uses which transport layer protocol?

<p>UDP (C)</p> Signup and view all the answers

In ASN.1, which of the following data types defines the size of the value?

<p>Length (A)</p> Signup and view all the answers

Which of the following shows the ASN.1 encoding format for the IPAddress 131.21.14.8?

<p>0x40 0x04 0x83 0x15 0x0E 0x08 (A)</p> Signup and view all the answers

A GetRequest PDU is sent, what tag (Hex) would be associated with the SNMP message PDU Type?

<p>0xA0 (B)</p> Signup and view all the answers

Which of the following is a type of error associated with Table 12.4 PDU type?

<p>toBig (B)</p> Signup and view all the answers

How does a network management system ensure the predefined quality of service for users?

<p>By monitoring, testing, configuring, and troubleshooting network components. (D)</p> Signup and view all the answers

Why is documentation crucial in configuration management?

<p>It ensures all changes are recorded meticulously. (C)</p> Signup and view all the answers

In a large network with frequent changes, what is the main goal of a Configuration Management system?

<p>To keep track of the status and relationships of all entities. (B)</p> Signup and view all the answers

What is the primary focus of reactive fault management?

<p>To detect, isolate, correct, and record faults after they occur. (D)</p> Signup and view all the answers

A network administrator notices a recurring network fault at a specific location. How would proactive fault management address this issue?

<p>By reconfiguring the network to prevent the fault from reoccurring. (A)</p> Signup and view all the answers

Why is it important for a performance management system to monitor network capacity?

<p>To prevent the network from being used above its designed capacity. (C)</p> Signup and view all the answers

How does monitoring internal and external traffic contribute to effective performance management?

<p>By identifying potential bottlenecks and points of congestion. (B)</p> Signup and view all the answers

What does throughput monitoring help a network administrator achieve?

<p>Ensuring that data transmission rates do not fall below acceptable levels. (D)</p> Signup and view all the answers

What is indicated by a significant increase in response time in a network?

<p>The network is likely operating above its designed capacity. (A)</p> Signup and view all the answers

What are the two key functions of security management?

<p>Authentication and encryption. (D)</p> Signup and view all the answers

What is the main purpose of accounting management?

<p>To control users' access to network resources through charges. (D)</p> Signup and view all the answers

In the context of network management, how does SNMP operate within the TCP/IP protocol suite?

<p>As a framework for managing devices over an internet network. (A)</p> Signup and view all the answers

What is the role of an agent in the SNMP framework?

<p>To store management information and respond to manager requests. (C)</p> Signup and view all the answers

Besides SNMP, which protocols are essential for management on the Internet?

<p>SMI and MIB. (C)</p> Signup and view all the answers

What is the role of SNMP in network device management?

<p>It defines packet formats and enables reading/changing variable values. (C)</p> Signup and view all the answers

In SNMP, what is SMI primarily responsible for?

<p>Defining the rules for naming and typing managed objects. (B)</p> Signup and view all the answers

In the context of SNMP, what does the MIB do?

<p>It defines the number of objects and associates types to named objects for each entity to be managed. (B)</p> Signup and view all the answers

How do SMI and a programming language's syntax relate in the context of network management?

<p>They both define the rules and structure for communication, similar to language syntax. (A)</p> Signup and view all the answers

Considering a scenario where a manager wants to update the maximum transmission unit (MTU) size on a router, which SNMP operation is most suited?

<p>SetRequest (D)</p> Signup and view all the answers

Which aspect of a managed object, such as a router, is NOT handled by the Structure of Management Information (SMI)?

<p>Storing the object's current value. (D)</p> Signup and view all the answers

What best describes how SMI enables global naming of managed objects?

<p>By using a hierarchical identifier based on a tree structure. (C)</p> Signup and view all the answers

How is the type of data for managed objects defined within SMI?

<p>Using Abstract Syntax Notation One (ASN.1) definitions. (A)</p> Signup and view all the answers

According to Basic Encoding Rules (BER), what does the 'length' component specify in the TLV format?

<p>The number of bytes in the 'value' component. (D)</p> Signup and view all the answers

In BER encoding, what is the purpose of the 'tag' field?

<p>To indicate the data type of the value. (D)</p> Signup and view all the answers

What is the default port used by the SNMP agent to listen for requests from the manager?

<p>161 (C)</p> Signup and view all the answers

How does SNMPv3 enhance security compared to its predecessors?

<p>By implementing secure remote administration and configurable security levels for authentication, confidentiality, and integrity. (B)</p> Signup and view all the answers

What role does ASN.1 play in data communication?

<p>It defines the format of data types independently of how they are transmitted. (B)</p> Signup and view all the answers

In ASN.1, what is the purpose of the double colon followed by an equals sign (::= )?

<p>Defines or assigns a data type or value. (D)</p> Signup and view all the answers

Which ASN.1 keyword is used to create new or derived data types?

<p>DEFINITIONS (D)</p> Signup and view all the answers

What is the main advantage of defining new data types in ASN.1?

<p>To create customized structures suitable for specific data. (A)</p> Signup and view all the answers

If you want to specify that an integer subtype can only be between 10 and 20, how would you define this range in ASN.1?

<p>Integer(10..20) (B)</p> Signup and view all the answers

How should variables be specified in ASN.1 to differentiate them from types?

<p>Starting with a lowercase letter. (B)</p> Signup and view all the answers

Which ASN.1 keyword is used to define a structured data type, similar to a struct in C?

<p>SEQUENCE (A)</p> Signup and view all the answers

In ASN.1, what happens after data has been defined and values are associated with variables?

<p>The data is encoded using encoding rules. (D)</p> Signup and view all the answers

A network engineer is tasked with ensuring only authorized devices are accessing a highly secure part of the network. Which area of network management is most pertinent?

<p>Security Management (D)</p> Signup and view all the answers

What is the primary purpose of proactive fault management?

<p>To prevent faults from happening in the first place. (D)</p> Signup and view all the answers

In the process of accessing MIB variables, what group is often used as an example to demonstrate access to simple variables and tables?

<p>udp (C)</p> Signup and view all the answers

A network operator is using SNMP to monitor network devices. What is the name given to the software used by the operator to initiate requests?

<p>Manager (B)</p> Signup and view all the answers

During network troubleshooting, a network administrator identifies a noSuchName error. According to Table 12.4, what does this error indicate?

<p>The specified variable does not exist. (A)</p> Signup and view all the answers

A technician sends a GetRequest PDU to identify the system description of an SNMP agent. According to Figure 12.18, where is such detail stored for the agent to respond to?

<p>The client sends a GetRequest to the variable bindings. (D)</p> Signup and view all the answers

In the context of network management, which of the following actions is most aligned with ensuring the 'smooth, efficient operation of the network'?

<p>Troubleshooting and resolving network component issues. (C)</p> Signup and view all the answers

Which of the following scenarios represents the application of 'reconfiguration' within configuration management?

<p>Modifying user account permissions to align with changing roles. (B)</p> Signup and view all the answers

What is the fundamental difference between reactive and proactive fault management?

<p>Proactive fault management aims to prevent faults before they occur, while reactive fault management addresses faults after they've been detected. (C)</p> Signup and view all the answers

Why is it essential to consider both internal and external traffic when conducting performance management?

<p>To accurately assess overall network load and potential congestion points. (D)</p> Signup and view all the answers

Which of the following scenarios explains how 'throughput' monitoring contributes to network management?

<p>By identifying whether individual devices or network segments are performing at acceptable levels. (D)</p> Signup and view all the answers

What is the relationship between 'encryption' and 'authentication' within the context of security management?

<p>Encryption ensures data privacy, while authentication verifies user identity. (C)</p> Signup and view all the answers

How does accounting management aid in the effective allocation of network resources within an organization?

<p>By assigning charges to different departments based on their network resource consumption. (B)</p> Signup and view all the answers

In the context of SNMP, how would a network administrator use the protocol to monitor the status of a specific network device?

<p>By communicating with an agent on the device that provides status information to a manager. (D)</p> Signup and view all the answers

If a network administrator wants to retrieve multiple, related pieces of information about a network device with a single request, which SNMP PDU would be the most efficient choice?

<p>GetBulkRequest (B)</p> Signup and view all the answers

How can SNMP facilitate proactive network management, beyond simply reacting to network issues?

<p>By providing real-time data for capacity planning and trend analysis. (D)</p> Signup and view all the answers

Which of the following is a crucial requirement for naming managed objects in SNMP, according to SMI?

<p>The name must be globally unique and follow a hierarchical structure. (A)</p> Signup and view all the answers

How do SMI's data type definitions contribute to the interoperability of network management systems?

<p>By establishing a common language for describing the data of managed objects. (D)</p> Signup and view all the answers

Why is the 'tag' field important in the Basic Encoding Rules (BER) used by SMI?

<p>It identifies the data type of the encoded data. (B)</p> Signup and view all the answers

In ASN.1, which of the following describes the role of keywords such as INTEGER, SEQUENCE, and ENUMERATED?

<p>They are used to define the structure and type of data. (B)</p> Signup and view all the answers

How does using ASN.1 to define data types and structures impact network management?

<p>It provides a standardized way to represent complex data, ensuring consistency across diverse systems. (A)</p> Signup and view all the answers

When defining a new data type in ASN.1 using the Backus-Naur Form (BNF) syntax, what is a key requirement?

<p>The new type must start with a capital letter. (D)</p> Signup and view all the answers

What is the primary purpose of defining subtypes in ASN.1, as opposed to defining entirely new data types?

<p>Subtypes allow you to place constraints on existing data types, such as a range for an integer. (C)</p> Signup and view all the answers

How is a 'variable' distinguished from a 'type' when specifying values in ASN.1?

<p>Variables must start with a lowercase letter, while types must start with an uppercase letter. (C)</p> Signup and view all the answers

What is the correct order of operations when encoding data with ASN.1?

<p>Define the data, associate values with variables, then encode the message. (D)</p> Signup and view all the answers

In ASN.1, what role does the keyword SEQUENCE play in defining data structures, and why is it used?

<p>It defines a structure similar to 'struct' in C, maintaining order. (C)</p> Signup and view all the answers

Flashcards

Network Management

Monitoring, testing, configuring, and troubleshooting network components to meet requirements defined by an organization.

Configuration Management

Managing changes such as hardware upgrades, software updates, and user account modifications.

Reconfiguration Types

Hardware, software, and user account adjustments fall under this.

Documentation (Network)

Meticulously recording initial network setups and all subsequent modifications.

Signup and view all the flashcards

Fault Management

Managing problems, involving reactive and proactive approaches.

Signup and view all the flashcards

Reactive Fault Management

Detecting, isolating, correcting, and recording faults.

Signup and view all the flashcards

Proactive Fault Management

Preventing faults by predicting and addressing failure points.

Signup and view all the flashcards

Performance Management

Ensuring the network operates efficiently, within capacity, and maintains acceptable response times.

Signup and view all the flashcards

Network Capacity

Maximum amount of data a network can handle.

Signup and view all the flashcards

Network Traffic

Measured internally (inside) and externally (outside).

Signup and view all the flashcards

Throughput

The rate of successful message delivery over a communication channel.

Signup and view all the flashcards

Response Time

Time taken for a service request to be fulfilled

Signup and view all the flashcards

Security Management

Controlling network access based on predefined policies.

Signup and view all the flashcards

Accounting Management

Managing user access to network resources through charges.

Signup and view all the flashcards

SNMP

Protocol used for managing devices on the Internet.

Signup and view all the flashcards

Manager (SNMP)

Host running the SNMP client program.

Signup and view all the flashcards

Agent (SNMP)

Router or host running the SNMP server program.

Signup and view all the flashcards

SMI and MIB

Two protocols used by SNMP to perform management tasks.

Signup and view all the flashcards

Role of SNMP

Defines packet format between manager and agent; reads/changes values.

Signup and view all the flashcards

Role of SMI

Provides rules for naming objects and defining their types.

Signup and view all the flashcards

Role of MIB

Defines objects, names them and associates a type to each.

Signup and view all the flashcards

SMI Attributes

Name, data type, and encoding method for network management.

Signup and view all the flashcards

Object Identifier

Unique identifier for each managed object.

Signup and view all the flashcards

Data Type

The type of data stored in an object.

Signup and view all the flashcards

Encoding Method (SMI)

Uses BER to encode data for network transmission.

Signup and view all the flashcards

MIB

Collection of objects managed by an agent.

Signup and view all the flashcards

Accessing MIB variables

Access information in the UDP group.

Signup and view all the flashcards

SNMP

Retrieving values and sending alarms.

Signup and view all the flashcards

SNMP PDUs (v3)

GetRequest, GetNextRequest, SetRequest, Response, Trap, InformRequest, and Report

Signup and view all the flashcards

SNMP ports

UDP (ports 161 and 162)

Signup and view all the flashcards

SNMPv3

Message authentication, confidentiality, and integrity.

Signup and view all the flashcards

ASN.1

Standard for defining data format.

Signup and view all the flashcards

ASN.1 language basics

Symbols, keywords, and primitive data types

Signup and view all the flashcards

BEGIN (ASN.1 keyword)

Start of a module

Signup and view all the flashcards

CHOICE (ASN.1 keyword)

List of alternatives

Signup and view all the flashcards

DEFINITIONS (ASN.1 keyword)

Definition of a data type or object

Signup and view all the flashcards

END (ASN.1 keyword)

End of a module

Signup and view all the flashcards

EXPORTS (ASN.1 keyword)

Data type can be exported to other modules

Signup and view all the flashcards

IDENTIFIER (ASN.1 keyword)

A sequence of non-negative numbers that identifies an object

Signup and view all the flashcards

IMPORTS (ASN.1 keyword)

Data type defined in an external module and imported

Signup and view all the flashcards

INTEGER (ASN.1 keyword)

Any positive, zero, or negative integer

Signup and view all the flashcards

NULL (ASN.1 keyword)

A null value

Signup and view all the flashcards

OBJECT (ASN.1 keyword)

Used with IDENTIFIER to uniquely define an object

Signup and view all the flashcards

ОСТЕТ (ASN.1 keyword)

Eight-bit binary data

Signup and view all the flashcards

OF (ASN.1 keyword)

Used with SEQUENCE or SET

Signup and view all the flashcards

SEQUENCE (ASN.1 keyword)

An ordered list

Signup and view all the flashcards

SEQUENCE OF (ASN.1 keyword)

An ordered array of data of the same type

Signup and view all the flashcards

SET (ASN.1 keyword)

An unordered list

Signup and view all the flashcards

SET OF (ASN.1 keyword)

An array of unordered lists

Signup and view all the flashcards

STRING (ASN.1 keyword)

A string of data

Signup and view all the flashcards

ASN.1 Simple Data Types

BOOLEAN, INTEGER, BIT STRING, OCTET STRING, etc.

Signup and view all the flashcards

ASN.1 BOOLEAN Type

BOOLEAN ::= TRUE or FALSE

Signup and view all the flashcards

ASN.1 INTEGER Type

INTEGER ::= Integers (positive, 0, or negative)

Signup and view all the flashcards

ASN.1 New Data Types

Defines a new data type from built-in/defined data type.

Signup and view all the flashcards

ASN.1 Subtype Example

Number Of Students ::= INTEGER (15..40)

Signup and view all the flashcards

Example of a Structure Variable

johnNewton StudentAccount

Signup and view all the flashcards

Study Notes

Network Management

  • Network management involves monitoring, testing, configuring, and troubleshooting network components
  • It meets requirements set by an organization and ensures smooth, efficient network operation
  • Network management systems use hardware, software, and human resources

Areas of Network Management

  • Configuration management: Tracks and manages the status of network entities and their relationships
  • Fault management: Addresses network faults with reactive and proactive strategies
  • Performance management: Monitors network capacity, traffic, throughput, and response time
  • Security management: Controls network access based on predefined policies using encryption and authentication
  • Accounting management: Controls user access to network resources through charges or debits for budgeting, not necessarily cash transfers

Configuration Management

  • Large networks comprise multiple interconnected entities with evolving configurations
  • A configuration management system must track the status of each entity and its relation to others
  • Two subsystems of configuration management are reconfiguration and documentation

Reconfiguration Types

  • Hardware reconfiguration
  • Software reconfiguration
  • User-account reconfiguration

Documentation

  • The original network setup and subsequent changes need meticulous recording, covering hardware, software, and user accounts

Fault Management

  • Fault Management is vital in complex networks to ensure component operate correctly in relation to each other
  • Effective fault management systems uses reactive and proactive subsystems

Reactive Fault Management

  • Reactive fault management detects, isolates, corrects, and records faults, providing short-term solutions

Proactive Fault Management

  • Proactive fault management aims to prevent faults, by predicting failures and prevent reoccurence

Performance Management

  • Performance Management monitors the capacity of the network so it's not used above a certain capacity.

Capacity

  • Network capacity that must be monitored
  • There will be data rate issues if threshold is exceeded

Traffic

  • Traffic can be measured internally (packets inside the network) or externally (packets exchanging with outside of the network)
  • Blocking may occur if traffic is excessive

Throughput

  • Measure throughput of a router or part of the network and ensure it does not fall to unacceptable levels

Response Time

  • The time a service is requested until the service is granted
  • Capacity and traffic will affect response time, which must be monitored
  • An increase of response time indicates that the network is working above capacity

Security Management

  • Security management controls access to a network based on predefined policy.
  • Tools such as encryption, to allow privacy, and authentication are used

Accounting Management

  • Accounting management controls user access through charges, or debits for network resources for budgeting

SNMP

  • Simple Network Management Protocol (SNMP) is a network management standard
  • It's used by the Internet and allows it to manage devices using TCP/IP protocol suite

Managers and Agents

  • A manager is a host running the SNMP client program
  • An agent is a router or host running the SNMP server program
  • Management is achieved through simple interaction

Management Components

  • Structure of Management Information (SMI)
  • Management Information Base (MIB)

Role of SNMP

  • Defines the packet format between manager and agent
  • Interprets results and creates statistics, exchanging object names, their values and their status
  • Responsible for reading and changing

Role of SMI

  • Establishes naming rules for objects, ensuring hierarchical structure
  • Defines object types and encoding rules

Role of MIB

  • For each entity to be managed, it defines protocol, object number, naming rules defined by SMI and a type for each named object
  • Creates a set of objects resembling a database with metadata

Overview of SNMP in Action

  • An overview of components involved in a simple scenario
  • A manager station wants to message the agent station, an SNMP client wants to send a message to an SNMP server
  • The SNMP client wants to find out the number of UDP user datagrams received by the agent

SMI

  • The Structure of Management Information version 2 (SMIv2) is a component for network management, and a guideline for SNMP
  • It emphasizes object name, data type and encoding method
  • This handles objects, defines data type, and shows how encode data

Name Attribute

  • Managed objects requires unique names
  • SMI uses object identifiers, a hierarchical identifier based on the tree structure, to name objects globally

Type Attribute

  • The data type is the second Attribute of an object
  • SMI uses Abstract Syntax Notation One (ASN.1) to define the data type and new definitions
  • SMI is a subset and a superset of ASN.1.
  • Two broad categories of data type: simple and structured

Encoding Method

  • SMI uses Basic Encoding Rules (BER) to encode data to be transmitted over the network
  • BER specifies each piece of data is encoded in triplet format: tag, length, and value (TLV)

MIB

  • The Management Information Base version 2 (MIB2) is the second component used in network management
  • Each agent has its own MIB2, which is the collection of all the objects that the manager can manage

Accessing MIB Variables

  • The udp group is an example to show accessing different variables.
  • This group includes four simple variables and one sequence of table of records

SNMP Use

  • SNMP uses SMI and MIB in Internet network management as an application program that allows:
  • A manager to retrieve the value of an object in an agent
  • An agent to send an alarm message

PDUs

  • SNMPv3 defines eight types of Protocol Data Units (PDUs): GetRequest, GetNextRequest, GetBulkRequest, SetRequest, Response, Trap, InformRequest, and Report

SNMP UDP Ports

  • SNMP uses UDP ports 161 and 162.
  • Port 161 is used by the server (agent)
  • Port 162 is used by the client (manager)

Security

  • SNMPv3 has added security and remote administration features.
  • It allows message authentication, confidentiality, and integrity

ASN.1

  • Abstract Syntax Notation One(ASN.1) defines the format of data when sending continuous bits
  • Separates the definition of data types from bits transmitted through the network

ASN.1 Language Basics

  • It defines objects and associated values
  • It uses: symbols, keywords, and primitive data types

ASN.1 Symbols

  • Defined As or assignment ::=
  • Or, alternative, or option |
  • Negative sign -
  • The following is a comment --
  • Range ..
  • Start and End of a list {}
  • Start and End of a Tag []
  • Start and end of a Subtype ()

ASN.1 Keywords

  • BEGIN = Start of a module
  • CHOICE = List of alternatives
  • DEFINITIONS = Definition of a data type or an object
  • END = End of a module
  • EXPORTS = Data type that can be exported to other modules
  • IDENTIFIER = A sequence of non-negative numbers that identifies an object
  • IMPORTS = Data type defined in an external module and imported
  • INTEGER = Any positive, zero, or negative integer
  • NULL = A null value
  • OBJECT = Used with IDENTIFIER to uniquely define an object
  • OCTET = Eight-bit binary data
  • OF = Used with SEQUENCE or SET
  • SEQUENCE = An ordered list
  • SEQUENCE OF = An ordered array of data of the same type
  • SET = An unordered list
  • SET OF = An array of unordered lists
  • STRING = A string of data

ASN.1 Data Types

  • The ASN.1 defines simple data types
  • Computer languages such as C, C++, or Java exist in ASN1
  • Simple data types can be combined to make new simple data types, structured data types

ASN.1 Simple Data Types

  • Boolean = TRUE or FALSE
  • INTEGER = Integers
  • BIT STRING = A string of binary digits (bits) or a null set
  • OCTET STRING = A String of octets or a null set
  • NULL = Null
  • OBJECT IDENTIFIER = A set of values that defines an object
  • ObjectDescriptor = Human readable text describing an object
  • EXTERNAL = A type that is not in the standard
  • REAL = Real numbers in scientific notation
  • ENUMERATED = A list of integers
  • SEQUENCE, SEQUENCE OF = Ordered list of types
  • SET, SET OF = Unordered list of types
  • NumericString = Digits 0–9 and space
  • PrintableString = Printable characters
  • VisibleString = ISO646String
  • GeneralString = General character string
  • CHARACTER STRING = Character set

ASN.1 New Data Types

  • For defining data types from a builtin or previously defined data type

ASN.1 New Subtypes

  • New Subtypes use the same method as new data types for defining

ASN.1 Simple Variables

  • Can create a variable of a particular type and assign (store) a value in it
  • Variables should start with a lower-case letter to distinguish it from the type

ASN.1 Structured Type

  • To define a structured data type similar to struct use the keyword SEQUENCE
  • It's an ordered list with userName, password, and account number

Encoding

  • Encoding is used after the data has been defined and values associated with variables
  • It uses the Basic Encoding Rule

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser