Simple Network Management Protocol (SNMP)

  Home  Protocols  Simple Network Management Protocol (SNMP)


“Simple Network Management Protocol (SNMP) frequently Asked Questions by expert members with experience in SNMP. These interview questions and answers on Simple Network Management Protocol (SNMP) will help you strengthen your technical skills, prepare for the interviews and quickly revise the concepts. So get preparation for the Simple Network Management Protocol (SNMP) job interview”



22 Simple Network Management Protocol (SNMP) Questions And Answers

1⟩ How to configure RAID?

first we should RAID card ....which is easly avaivlable in

market conect it on ur mother board . then connect it with

u r hard disk

then before starting the os in a syatem configure ur RAID

first

just select whatever instruction come in your way...it is

very simple to follow

and finally select ur type of RAID...

 165 views

4⟩ What does the MIB do?

Management information is viewed as a collection of managed objects information store in a Base is called MIB

 174 views

5⟩ How does any network vendor decide to go for NMS or EMS?

An element management system (EMS) manages one or more of a

specific type of network elements (NEs).

Using an EMS a user can manage all the features of each NE

individually, but not the communication between NEs.

Communication between NEs is managed by the network

management system (NMS).

A network management system is a combination of hardware and

software used to monitor and administer a network.

Network management refers to the maintenance and

administration of large scale computer networks at the top

level.

In brief,If network vendor wants to manage multiple

EMS,vendor can go to NMS.

If network vendor wants to manage multiple EMS,vendor can

decide to go for NMS.

If network vendor want to manage one or more of a specific

type of network elements (NEs),vendor can decide to go for EMS.

 179 views

6⟩ How to set a local net?

IIS used for Browsing Intranet

Net (all websites):through CCPROXY software

Or

Install windows 2003 server run Domain controller promotions

--> Install DNS server default setting(not Manually)

In LAN system --> Local Area Connetion Status-->In

properties--> Gateway is server IP address and DNS are ISP

dNS(That system added to the windows 2003 server domain)

ccproxy software is easy

 153 views

7⟩ Why it is important to defragment disks in computer?

Defragmentation is smiple says bring the data at once place

in the drive....when we copied or save a file it save on

different sectors on the drive when u browse for the file

it will search every sector id (for every sector we have an

id).when defragmentation done all the data bring upto one

part and it will take less time to reterive the data...

 158 views

13⟩ The protocols found in network layer areIPTCPSPXPIICMP?

Protocols TCP/IP is used to configure windows Operating

System which is abrreviated as Transmission Control

Protocol for transmitting data from one system to another.

Protocols IPX/SPX are used in Unix operating system for

transmitting data.

Protocols ICMP are used as Internet Protocols.

 165 views

14⟩ What is the broadcast address of the subnet address172.16.8.15925?(choose from following) 172.16.99.255 172.16.127.255 172.16.255.255 172.16.64.127 172.16.64.260

172.16.8.159 25

172 16 8 159

10101100.00010000.00001000.10011111

8 +8 +8 +1 =25

11111111.11111111.11111111.10000000

Zeros mean, that you can change address bit, so

159=10011111 and last combination of 0011111 is changeable,

so max number in you network usually is broadcast address.

so last byte is 1(unchangeable)1111111(max sequence of

changeable bits).

11111111(bin) means 255(dec)

Whole address 10101100.00010000.00001000.11111111 =

172.16.8.255

 163 views

16⟩ What is data com? How it works, what is difference between datacom and telecom?

This the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data.

Data Communication is the process of transferring information from a sender to a receiver with the use of a medium in which the communicated information is understood by both sender and receiver. It is a process that allows organisms to exchange information by several methods.

Telecommunications is a general term for a vast array of technologies that send information over distances. Mobile phones, land lines, satellite phones and voice over Internet protocol (VoIP) are all telephony technologies -- just one field of telecommunications. Radio, television and networks are a few more examples of telecommunication.

 189 views

17⟩ What is the use of proxy in SNMP. Does it require only when the network has snmpv1 and snmpv2?

Proxy can be defined as an intermediately device,

which plays the role of an agent in the Context of SNMP.It

works as a Virtual LAN to the Devices Which are not having

an Ethernet Inerface,Like MODEMS and Multiplexers.

By using the SNMPPROXY we can Know the STATUS of

these(MODEMS etc) devices.

When an Agent performs PROXY role,it acs on the behalf of

one or more other nodes.A NETWORK MANAGER that wishes ti

obtain the information from or control the node

communicates with the proxy agent.The proxy agent then

translates the MANAGER's request to a form appropriate for

the arget sysem and uses an appropriate nework management

protocol to communicate with the target system.

 201 views

18⟩ How can i make my server a domain?

creating daemon is very simple in Linux. you just need to

create a child process from its parent process and kill the

parent process. also you should close all the I/O streams.

[as daemon is a background process which is not interactive

in nature].

latter on you can write a init script in /etc/init.d/ to

make it a service.

 181 views

19⟩ MEMORY THAT IS PAGED OUT TO THE HARDWARE IS KNOWN AS

its cache memory.

A CPU cache is a cache used by the central processing unit

of a computer to reduce the average time to access memory.

The cache is a smaller, faster memory which stores copies of

the data from the most frequently used main memory

locations. As long as most memory accesses are to cached

memory locations, the average latency of memory accesses

will be closer to the cache latency than to the latency of

main memory.

When the processor needs to read from or write to a location

in main memory, it first checks whether a copy of that data

is in the cache. If so, the processor immediately reads from

or writes to the cache, which is much faster than reading

from or writing to main memory.

 153 views