Beruflich Dokumente
Kultur Dokumente
ATM Networks
(CSE-884)
Submitted to:
Mr. Shivam
Submitted By:
Khushbu
B.Tech
(HONS)-CSE
PART A:
PART B:
Q4. Discuss the meanings of IDI and of the DSP if AFI = (39, 47 or 45).
Ans4. AESA format is based on the generic Network Service Access Point format.
An NSAP address is divided into two parts
a) Initial Domain Part (IDP): It identifies a particular network-addressing domain that is a
part of global network-addressing domain.
It is divided into two parts:
i) Authority and Format Identifier (AFI): It specifies the authority controlling the
IDI and the format of IDI.
ii) Initial Domain Identifier (IDI): It specifies the controlling the assignment of the
domain specific part.
b) Domain Specific Part (DSP): The meaning and format of DSP is controlled by the
authority that is specified by the IDI field.
In ATM, the generic NSAP format is of 20 octets in length. Four different AESA formats are
specified by the ATM forum:
i) The Data Country Code (DCC) AESA format: The DCC format has AFI=0*39
ii) The International Code Designator (ICD) AESA format: The ICD format has
AFI=0*47
iii) The E.164 AESA format: The E.164 format has AFI=0*45
iv) The Local AESA format: The Local AESA format has AFI=0*49.
Thus, AFI-45 implies that the IDI is based on the E.164 address format.
ASI=47 implies that the IDI is based on the ICD format.
ASI=39 implies that the IDI is based on the ACC format.
Q5. What are the three functions with the help of which Routing is accomplished? Discuss
Address summarization.
Ans6. The three functions to accomplish routing are:
1) Initialization
2) Database synchronization
3) Address Summarization
Address Summarization:
Address summarization is the process of using a single reachable address prefix to represent a
collection of end system systems and/or node address that begin with the same prefix.
For example: If M.N.1 and M.N.2 are two address prefixes reachable via a given node, the
summarized address is M.N.
This example implies that in order to achieve address summarization, the higher order bits of the
summarized address must be the same. To ensure this, there must exist an order in which the
address are distributed i.e. the distribution must not be random.
Q6. What are various Security management functions done in OSI Management
framework?
Ans6. The security management functions in OSI management framework
1. Fault: The goal of fault management is to recognize, isolate, correct and log faults that
occur in the network. Fault management is concerned with detecting network faults,
logging this information, contacting the appropriate person, and ultimately fixing a
problem. Errors primarily occur in the areas of fault management and configuration
management. A common fault management technique is to implement an SNMP based
network management system.
2. Configuration: The goals of configuration management are to gather/set/track
configurations of the devices. Configuration management is concerned with monitoring
system configuration information, and any changes that take place. This area is especially
important, since many network issues arise as a direct result of changes made to
configuration files, updated software versions, or changes to system hardware. A proper
configuration management strategy involves tracking all changes made to network
hardware and software. Examples include altering the running configuration of a device,
updating the IOS version of a router or switch, or adding a new modular interface card.
3. Performance: The goal is to both prepare the network for the future, as well as to
determine the efficiency of the current network. Performance management is focused on
ensuring that network performance remains at acceptable levels. This area is concerned
with gathering regular network performance data such as network response times, packet
loss rates, link utilization, and so forth. This information is usually gathered through the
implementation of an SNMP management system, either actively monitored, or
configured to alert administrators when performance move above or below predefined
thresholds.
4. Security: The goal of security management is to control access to assets in the network.
It uses firewalls to monitor and control external access points to one's network. Security
management is not only concerned with ensuring that a network environment is secure,
but also that gathered security-related information is analyzed regularly. Security
management functions include managing network authentication, authorization, and
auditing, such that both internal and external users only have access to appropriate
network resources. Other common tasks include the configuration and management of
network firewalls, intrusion detection systems, and security policies such as access lists.
5. Accounting: The goal is to gather usage statistics for users. Accounting management is
concerned with tracking network utilization information, such that individual users,
departments, or business units can be appropriately billed or charged for accounting
purposes.