questions for chapter 6,9 ying zhang. question 1 consider the two ways in which communication occurs...

21
Questions for Chapter 6,9 Ying Zhang

Upload: bruno-warren

Post on 24-Dec-2015

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

Questions for Chapter 6,9

Ying Zhang

Page 2: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

Question 1

• Consider the two ways in which communication occurs between a managing entity and a managed device: request-response mode and trapping. What are the pros and cons of these two approaches, in terms of (1) overhead, (2) notification time when exceptional events occur, and (3) robustness with respect to lost messages between the managing entity and the device?

Page 3: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• request-response

Page 4: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• Request response mode will generally have more overhead (measured in terms of the number of messages exchanged) for several reasons. – First, each piece of information received by the manager

requires two messages: the poll and the response. – Trapping generates only a single message to the sender.

• If the manager really only wants to be notified when a condition occurs, – polling has more overhead, since many of the polling

messages may indicate that the waited-for condition has not yet occurred.

– Trapping generates a message only when the condition occurs.

Page 5: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• Trapping will also immediately notify the manager when an event occurs.

• With polling, the manager needs will need to wait for half a polling cycle (on average) between when the event occurs and the manager discovers (via its poll message) that the event has occurred.

Page 6: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• If a trap message is lost, the managed device will not send another copy.

• If a poll message, or its response, is lost the manager would know there has been a lost message (since the reply never arrives). Hence the manager could repoll, if needed.

Page 7: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

Question 2

• In the book, we saw that it was preferable to transport SNMP messages in unreliable UDP datagrams. Why do you think the designers of SNMP choose UDP rather than TCP as the transport protocol of choice for SNMP?

Page 8: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• Often, the time when network management is most needed is in times of stress, when the network may be severely congested and packets are being lost. With SNMP running over TCP, TCP's congestion control would cause SNMP to back-off and stop sending messages at precisely the time when the network manager needs to send SNMP messages.

Page 9: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

Question 3

• Consider Figure 9.9,in the text book, what would be the BER encoding of {weight,271} {lastname, ‘Jackson’}

Page 10: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• BER: Basic Encoding Rules– specify how ASN.1-defined data objects to be

transmitted– each transmitted object has Type, Length, Value

(TLV) encoding

Page 11: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

TLV EncodingIdea: transmitted data is self-identifying

– T: data type, one of ASN.1-defined types– L: length of data in bytes– V: value of data, encoded according to ASN.1

standard

1234569

BooleanIntegerBitstringOctet stringNullObject IdentifierReal

Tag Value Type

Page 12: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

TLV encoding: example

Value, 5 octets (chars)Length, 5 bytes

Type=4, octet string

Value, 259Length, 2 bytesType=2, integer

Page 13: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• 4 7 'J' 'a' 'c' 'k' 's' 'o' 'n' 2 2 1 15

Page 14: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

Question 4

• Consider the single-sender CDMA example in Figure 6.4 in the book. What could be the sender’s output ( for the 2 data bits shown) if the sender’s CDMA code were (1,-1,1,-1,1,-1,1,-1)?

Page 15: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

CDMA Encode/Decode

slot 1 slot 0

d1 = -1

1 1 1 1

1- 1- 1- 1-

Zi,m= di.cmd0 = 1

1 1 1 1

1- 1- 1- 1-

1 1 1 1

1- 1- 1- 1-

1 1 11

1-1- 1- 1-

slot 0channeloutput

slot 1channeloutput

channel output Zi,m

sendercode

databits

slot 1 slot 0

d1 = -1d0 = 1

1 1 1 1

1- 1- 1- 1-

1 1 1 1

1- 1- 1- 1-

1 1 1 1

1- 1- 1- 1-

1 1 11

1-1- 1- 1-

slot 0channeloutput

slot 1channeloutputreceiver

code

receivedinput

Di = Zi,m.cmm=1

M

M

Page 16: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

– Output corresponding to bit • d1 = [-1,1,-1,1,-1,1,-1,1]

– Output corresponding to bit • d0 = [1,-1,1,-1,1,-1,1,-1]

Page 17: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• Consider sender 2 in Figure 6.5, what is the sender’s output to the channel ( before it is added to the signal from sender 1), Z^2_{ I,m}

Page 18: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

CDMA: two-sender interference

Page 19: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• Sender 2 output = [1,-1,1,1,1,-1,1,1]; [ 1,-1,1,1,1,-1,1,1]

Page 20: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

• Suppose that the receiver in Figure 6.5 wanted to receive the data being sent by sender 2. Show that the receiver is indeed able to recover sender 2’s data from the aggregate channel signal by using sender 2’s code

Page 21: Questions for Chapter 6,9 Ying Zhang. Question 1 Consider the two ways in which communication occurs between a managing entity and a managed device: request-

CDMA: two-sender interference