0% found this document useful (0 votes)
30 views2 pages

CN Assgin

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views2 pages

CN Assgin

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

4-CN)Q) what are all functions of Network Management ?

Network management encompasses a broad range of tasks and processes designed to


ensure that a network operates efficiently and effectively. These functions are typically
grouped into several key areas, which include:

### 1. *Fault Management*

- *Detection and Diagnosis*: Identifying issues or faults in the network, such as


hardware failures, misconfigurations, or connectivity problems.

### 2. *Configuration Management*

- *Network Device Configuration*: Managing the settings and configurations of network


devices like routers, switches, and firewalls.

### 3. *Performance Management*

- *Traffic Analysis*: Analyzing the flow of data through the network to identify

### 4. *Security Management*

- *Threat Detection*: Identifying and mitigating network security risks, such as


unauthorized access, malware, or denial-of-service (DoS) attacks.

### 5. *Accounting/Usage Management*

- *Traffic Billing*: Monitoring and recording network usage for billing purposes,
especially in service provider environments.

### 6. *Network Provisioning and Automation*

- *Provisioning New Devices*: Setting up and configuring new network devices such as
routers, switches, and firewalls to be integrated into the network.

### 7. *Network Design and Architecture*

- *Topology Design*: Designing and implementing the physical and logical layout of the
network, ensuring optimal placement of devices for efficiency and redundancy.

### 8. *Policy and Compliance Management*

- *Policy Enforcement*: Ensuring that network operations adhere to organizational,


regulatory, and industry-specific standards and policies.

### 10. *Troubleshooting and Diagnostics*

- *Root Cause Analysis*: Identifying the underlying causes of network problems to


ensure proper resolution.

5-CN)Q) write a short note on http


*HTTP (Hypertext Transfer Protocol)* is the foundational protocol used for transferring
data on the World Wide Web. It defines the rules and conventions for how web browsers
(clients) and web servers communicate. HTTP enables the fetching of resources like web
pages, images, videos, and other content across the internet.

Key features of HTTP include:

1. *Request-Response Model*: HTTP follows a client-server architecture. The client sends


a request (e.g., for a webpage), and the server responds with the requested content.

2. *Stateless Protocol*: HTTP is stateless, meaning each request is independent, and the
server does not retain information about previous requests.

3. *Methods*: Common HTTP methods include:

- *GET*: Retrieve data from the server.

- *POST*: Send data to the server (e.g., form submissions).

- *PUT*: Update data on the server.

- *DELETE*: Remove data from the server.

4. *URLs (Uniform Resource Locators)*: HTTP requests are made using URLs that specify
the address of the resource on the server.

5. *Status Codes*: HTTP responses contain status codes indicating the result of the
request. For example, 200 OK means successful, and 404 Not Found means the
requested resource is unavailable.

HTTP operates over a connection typically established via TCP (Transmission Control
Protocol) and, in its secure form (HTTPS), can encrypt data using SSL/TLS to ensure
privacy and security.

You might also like