Ass2 , IT363 Network Management

User Generated

uronuZBUNZZNQ

Computer Science

IT363

SEU

Description

Q1-List and discuss the difference between traffic monitoring tools and commands.

-Discuss, in detail, the difference between ping and bing commands.

Q2 -Explain the usage of EntryStatus in RMON.

-Discuss the different types of EntryStatus states.

Q3 Discuss the fault management steps of network components.

Q4Discuss ATM Technology.

Unformatted Attachment Preview

College of Computing and Informatics Assignment 2 Deadline: Day 6/5/2024 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: ### ID: ### CRN: ### Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format. • It is your responsibility to check and make sure that you have uploaded both the correct files. • Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation). • Email submission will not be accepted. • You are advised to make your work clear and well-presented. This includes filling your information on the cover page. • You must use this template, failing which will result in zero mark. • You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question. • Late submission will result in ZERO mark. • The work should be your own, copying from students or other resources will result in ZERO mark. • Use Times New Roman font for all your answers. Restricted - ‫مقيد‬ Question One Pg. 01 Learning Outcome(s): Question One 2 Marks CLO1: Describe • List and discuss the difference between traffic monitoring tools and commands. network • Discuss, in detail, the difference between ping and bing commands. management issues, standards and architecture. Restricted - ‫مقيد‬ Question Two Pg. 02 Learning Outcome(s): CLO1: Describe network management issues, standards and architecture. Restricted - ‫مقيد‬ Question Two • Explain the usage of EntryStatus in RMON. • Discuss the different types of EntryStatus states. 2 Marks Question Three Pg. 03 Learning Outcome(s): Question Three Discuss the fault management steps of network components. CLO1: Describe network management issues, standards and architecture. Restricted - ‫مقيد‬ 2 Marks Question Four Pg. 04 Learning Outcome(s): Question Four Discuss ATM Technology. CLO5: Demonstrate broadband networking services and technologies. Restricted - ‫مقيد‬ 2 Marks
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

College of Computing and Informatics

Assignment 2
Deadline: Day 6/5/2024 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###

ID: ###

CRN: ###
Instructions:

• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.

• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).

• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the
cover page.

• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.

• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Restricted - ‫مقيد‬

Network Management

Student Name

University

Date

Restricted - ‫مقيد‬

Question One
Learning Outcome(s):

Question One

2 Marks

CLO1: Describe
network management



List and discuss the difference between traffic monitoring tools and commands.

issues, standards and
architecture.

Traffic monitoring tools:

Wireshark: Wireshark is a widely-used network protocol analyzer that captures
and displays network packets in real-time. Solar Winds NetFlow Traffic Analyzer:
SolarWinds NetFlow Traffic Analyzer is a powerful tool that uses NetFlow data to
monitor network traffic and analyze bandwidth usage. PRTG Network Monitor: PRTG
Network Monitor is a comprehensive network monitoring tool that allows users to
monitor network traffic, bandwidth usage, and network performance (Olimov et al., 2024,
p. 94).

Traffic monitoring commands:

Traffic commands are used in networking to manage and control network traffic flow.
Some common traffic commands include:

Ping: The ping command is used to test network connectivity by sending ICMP
echo requests to a specific IP address or hostname. Traceroute: The traceroute command
is used to trace the route that packets take from the source to the destination.
Ipconfig/ifconfig: The ipconfig command in Windows and ifconfig command in Linux are

Restricted - ‫مقيد‬

Question One
used to display network interface information, such as IP address, subnet mask, and default gateways. Netstat: The
Netstat command is used to display network statistics and active network connections on a system (Weqar et al., 2023,
p. 89).

Traffic monitoring tools and commands difference

Traffic Monitoring Tools are software applications that provide a graphical interface for monitoring and analyzing
network traffic. These tools often offer a wide range of features, such as real-time monitoring, historical data analysis,
and the ability to generate reports and alerts. These tools are typically more user-friendly and easier to use for nontechnical users. On the other hand, traffic monitoring commands are specific commands that are used in the command
line interface (CLI) of a network device or operating system to monitor network traffic. These commands are typically
more low-level and require a deeper understanding of networking conce...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags