What is snmp and what are its major parts

Assignment Help Computer Networking
Reference no: EM13526989

1 What are the five areas of network management defined by the ISO?

2 Define the following terms; managing entity, managed device, management agent, MIB, network management protocol.

3 What is SNMP and what are its major parts?

4 In this chapter we saw that it was preferable to transport SNMP messages in unreliable UDP datagrams. Why do you think the designers of SNMP chose UDP rather than TCP as the transport protocol of choice for SNMP?

Practical assignment

This assignment consists of programming a Pinger client. Please submit the following items in a ZIP file.

1) Java or Python source code;
2) Instructions on how to install and run your program;
3) A brief design document explaining your solution.

Option 1: UDP Pinger Lab Using Java

In this assignment, you will study a simple Internet ping server written in the Java language, and implement a corresponding client. The functionality provided by these programs is similar to the standard ping programs available in modern operating systems, except that they use UDP rather than Internet Control Message Protocol (ICMP) to communicate with each other. (Java does not provide a straightforward means to interact with ICMP.)

The ping protocol allows a client machine to send a packet of data to a remote machine, and have the remote machine return the data back to the client unchanged (an action referred to as echoing). Among other uses, the ping protocol allows hosts to determine round-trip times to other machines.

You should write the client so that it sends 10 ping requests to the server, separated by approximately one second. Each message contains a payload of data that includes the keyword PING, a sequence number, and a timestamp. After sending each packet, the client waits up to one second to receive a reply. If one second goes by without a reply from the server, then the client assumes that its packet or the server's reply packet has been lost in the network.

Hint: Cut and paste PingServer, rename the code PingClient, and then modify the code.

You should write the client so that it starts with the following command:

java PingClient host port

where host is the name of the computer the server is running on and port is the port number it is listening to. Note that you can run the client and server either on different machines or on the same machine.

The client should send 10 pings to the server. Because UDP is an unreliable protocol, some of the packets sent to the server may be lost, or some of the packets sent from server to client may be lost. For this reason, the client can not wait indefinitely for a reply to a ping message. You should have the client wait up to one second for a reply; if no reply is received, then the client should assume that the packet was lost during transmission across the network. You will need to research the API for DatagramSocket to find out how to set the timeout value on a datagram socket.

When developing your code, you should run the ping server on your machine, and test your client by sending packets to localhost (or, 127.0.0.1). After you have fully debugged your code, you should see how your application communicates across the network with a ping server run by another member of the class.

Message Format

The ping messages in this lab are formatted in a simple way. Each message contains a sequence of characters terminated by a carriage return character (r) and a line feed character (n). The message contains the following string:

PING sequence_number time CRLF

where sequence_number starts at 0 and progresses to 9 for each successive ping message sent by the client, time is the time when the client sent the message, and CRLF represent the carriage return and line feed characters that terminate the line.

Option 2: UDP Pinger Lab Using Python

You can implement your ping client using Python. You should write a simple Python program that follow a step-by-step process to establish a UDP connection with a server through sockets, and send out ping requests. The other requirements are very similar to those by choosing Java. One interesting point to mention is that, that you can use one programming to write your server program, and use a different language to write your client program.

Reference no: EM13526989

Questions Cloud

Find how high is the apartment house : You and your friend throw balloons ?lled with water from the roof of a several story apartment house. You simply drop a balloon from rest. How high is the apartment house
What is cvp analysis : What is CVP analysis? How is it useful to managers?
When the concentration in water state partial pressure of n2 : On a clear day at sea level, with a temperature of 25 degrees Celsius, the partial pressure of N2 in air is 0.78 atm and the concentration of nitrogen in water is 5.3 x 10^-4 M. When the concentration in water is 1.1 x 10^-3 M what is the partial ..
What is the new charge density on the outside of the sphere : A hollow, conducting sphere with an outer radius of 0.243 m and an inner radius of 0.203 m has a uniform surface charge density of +6.45*10^(-6) C/m^2. What is the new charge density on the outside of the sphere
What is snmp and what are its major parts : What are the five areas of network management defined by the ISO - define the terms; managing entity, managed device, management agent, MIB, network management protocol.
Determine what frequency is heard by the moth : A bat moving with a speed of 4.10 m/s and emitting sound of 31.0 kHz approaches a moth at rest on a tree trunk. What frequency is heard by the moth
What amount of interest income can beth exclude in 2011 : What amount of interest income can Beth exclude in 2011
Difference between symmetric key and public key system : What is the most important difference between a symmetric key system and a public key system and In what way does a hash function provide a better message integrity check than a checksum (such as Internet Checksum)?
Obtain how fast is the car moving : A person with perfect pitch sits on a bus bench listening to the 438 Hz horn of an approaching car. If the person detects a frequency of 475 Hz, how fast is the car moving

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd