. . . . "For example, a network management application enables a manager to interrogate devices such as host computers, routers, switches, and bridges to determine" .