Materia redes de computadores

Materia redes de computadores


DisciplinaRedes de Computadores20.892 materiais264.068 seguidores
Pré-visualização35 páginas
managing entity). A request-response message is sent by the 
managing entity, with the response coming back from the management agent. 
 
Question 7. 
GetRequest, GetNextRequest, GetBulkRequest, SetRequest, InformRequest, Response, 
Trap 
 
Question 8. 
The SNMP engine is the part of an SNMP implementation that handles the dispatching, 
processing, authentication, access control, and timeliness of he SNMP messages. See 
Figure 8.5. 
 
Question 9. 
The ASN.1 object identifier tree provides a standard way to name objects. 
 
Question 10. 
The role of the presentation layer is to allow the sending and receiving of data in a 
machine-independent format (i.e., without regard to the particular storage and 
architectural conventions of the sender and receiver). 
 
Question 11. 
The Internet does not have presentation layer. It is up to the implementers of protocols to 
make sure that data is sent and received in the desired format. 
 
Question 12. 
In TLV encoding, each piece of data is tagged with its type, length, and value. 
 
Chapter 9 Problems 
 
Problem 1. 
Request response mode will generally have more overhead (measured in terms of the 
number of messages exchanged) for several reasons. First, each piece of information 
received by the manager requires two messages: the poll and the response. Trapping 
generates only a single message to the sender. If the manager really only wants to be 
notified when a condition occurs, polling has more overhead, since many of the polling 
messages may indicate that the waited-for condition has not yet occurred. Trapping 
generates a message only when the condition occurs. 
 
Trapping will also immediately notify the manager when an event occurs. With polling, 
the manager needs will need to wait for half a polling cycle (on average) between when 
the event occurs and the manager discovers (via its poll message) that the event has 
occurred. 
 
If a trap message is lost, the managed device will not send another copy. If a poll 
message, or its response, is lost the manager would know there has been a lost message 
(since the reply never arrives). Hence the manager could repoll, if needed. 
 
Problem 2. 
Often, the time when network management is most needed is in times of stress, when the 
network may be severely congested and packets are being lost. With SNMP running over 
TCP, TCP's congestion control would cause SNMP to back-off and stop sending 
messages at precisely the time when the network manager needs to send SNMP 
messages. 
 
Problem 3. 
1.3.6.1.2.1.5 
 
Problem 4. 
Microsoft file formats are under 1.2.840.113556.4 (see section 8.3.2) 
 
Problem 6. 
 
45Julia22 \u201800000001\u2019 \u201800010100\u2019 
 
Problem 7 
 
45Child 21 \u201810100000\u2019 
 
 
 
		Problem 1
		Problem 2 
		Problem 3
		Problem 4
		Problem 5
		Problem 6
		Problem 7
		Problem 8
		Problem 9
		Problem 10
		Problem 11
		Problem 12
		Problem 13
		Problem 14
		Problem 15
		Problem 16
		Problem 17
		Problem 18
		Problem 19
		Problem 20
		Problem 21
		Problem 22 
		Problem 23
		Problem 24
		Problem 25
		Problem 26
		Problem 27
		Problem 28
		Problem 29
		Problem 30
		Problem 31
		Problem 32
		Problem 1
		Problem 2
		Problem 3
		Problem 4
		Problem 5 
		Problem 6
		Problem 7
		Problem 8 
		Problem 9 
		Problem 10
		Problem 11 
		Problem 12 
		Problem 13
		Problem 14
		Problem 15
		Problem 16
		Problem 17
		Problem 18
		Problem 19 
		Problem 20
		Problem 21 
		Problem 22
		Problem 23
		Problem 24
		Problem 25
		Problem 26 
		Problem 27 
		Problem 32 
		Problem 33 
		Problem 34
		Problem 35
		Problem 1 
		Problem 2
		Problem 3
		Problem 4
		Problem 5
		Problem 6
		Problem 7
		Problem 8
		Problem 9
		Problem 10
		Problem 11
		Problem 12
		Problem 13
		Problem 14
		Problem 15 
		Problem 16
		Problem 17
		Problem 18
		Problem 19
		Problem 20
		Problem 21
		Problem 22
		Problem 23
		Problem 24
		Problem 25
		Problem 26
		Problem 27
		Problem 28
		Problem 29
		Problem 30
		Problem 31
		Problem 32
		Problem 33
		Problem 34
		Problem 35
		Problem 36
		Problem 37
		Problem 38
		Problem 39
		Problem 40
		Problem 41
		Problem 42
		Problem 43
		Problem 44
		Problem 45
		Problem 46
		Problem 47
		Problem 48 
		Problem 49
		Problem 50
		Problem 51
		Problem 52
		Problem 53
		Problem 1
		Problem 2
		Problem 3
		Problem 4 
		Problem 5
		Problem 6 
		Problem 7 
		Problem 8 
		Problem 9
		Problem 10
		Problem 11
		Problem 12
		Problem 13
		Problem 14
		Problem 15
		Problem 16
		Problem 17
		Problem 18
		Problem 19
		Problem 20
		Problem 21
		Problem 22
		Problem 23
		Problem 24
		Problem 25
		Problem 26
		Problem 27
		Problem 28
		Problem 29
		Problem 30
		Problem 31
		Problem 32
		Problem 33
		Problem 34
		Problem 35
		Problem 36
		Problem 37 
		Problem 38 
		Problem 39
		Problem 40 
		Problem 41 
		Problem 42
		Problem 43
		Problem 44 
		Problem 45
		Problem 46 
		Problem 47
		Problem 48 
		Problem 49 
		Problem 50 
		Problem 51 
		Problem 52 
		Problem 1 
		Problem 2
		Problem 3 
		Problem 4
		Problem 5
		Problem 6
		Problem 7 
		Problem 8
		Problem 9
		Problem 11 
		Problem 12 
		Problem 14 
		Problem 15 
		Problem 16 
		Problem 17
		Problem 18
		Problem 19
		Problem 20 
		Problem 21
		Problem 22
		Problem 23
		Problem 24
		Problem 25
		Problem 26
		Problem 27
		Problem 28
		Problem 29 
		Problem 30
		Problem 31
		Problem 32
		Problem 33 
		Problem 34
		Problem 35
		Problem 37
Gabarito Traduzido.docx
Capitulo 2
1.O Web : HTTP ; transferência de arquivos: FTP ; login remoto : Telnet ; News Network: NNTP; e- mail: SMTP.
2. Arquitetura de rede refere-se à organização do processo de comunicação em
camadas ( por exemplo , a arquitetura Internet de cinco camadas ). Arquitetura de aplicações, no Por outro lado , é projetado por um desenvolvedor de aplicativos e dita o amplo
estrutura da aplicação (por exemplo, cliente-servidor ou P2P)
. 3 O processo que inicia a comunicação é o cliente ; o processo que espera
para ser contactado é o servidor .
4 . Não. Como foi dito no texto, todas as sessões de comunicação têm um lado cliente e um
lado do servidor. Em um aplicativo de compartilhamento de arquivos P2P , o peer que está recebendo um arquivo é
Normalmente o cliente e os pares que está enviando o arquivo é normalmente o servidor.
5 . O endereço IP do destino hostand o número da porta do destino
soquete.
6. Você usaria UDP. Com UDP , a transação pode ser concluída em um
tempo de ida e volta (RTT) - o cliente envia o pedido de transação em um soquete UDP,
eo servidor envia a resposta de volta para socket UDP do cliente. Com o TCP , um
mínimo de dois RTTs são necessários - um set-up a conexão TCP, e
outro para o cliente para enviar o pedido, e para o servidor para enviar de volta a resposta.
7. Não há bons exemplos de uma aplicação que não requer nenhuma perda de dados e
sincronismo . Se você souber de uma , envie um e -mail com os autores.
8. A) transferência de dados confiável
TCP fornece um byte -stream confiável entre o cliente eo servidor, mas UDP faz
não .
 b) A garantia de que um determinado valor para a taxa de transferência será mantida
nem
 c) A garantia de que os dados serão entregues dentro de um determinado período de tempo
 nem
d ) Segurança
 nem
9. SSL opera na camada de aplicação. O soquete SSL leva de dados não