1. In reference to Object Identifier tree, Figure 9.3 in the textbook a)What do you expect the subject of the standard 1.2.840.113549 to be? (Make a guess).
I would expect it to deal with ethical issues and how the internet is used safely. With the internet use increasing by the day, there is a need to ensure that the content that is being used and uploaded on the internet is ethical. b)Where in the tree would a new Microsoft file format for a new product be placed?
A Microsoft file would be placed under the ISO member body.Microsoft is a ISO member body number 840. The file format is under 1.2.840.113556.4 tree structure. Word processor is 1.2.840.113556.4.2. New files will take the format of 1.2.840.113556.4.x2.What is an important difference between a request-response message and a trap message in SNMP?
The trap message comes from the management agent sent to the management entity. There is no need for acknowledgement from the management entity. A request-response message is sent from the management entity and there is a requirement to have response from the management that they have received the message.
A request response has a lot of overhead because there is a need to measure the number of messages that need to be exchanged. There are several reasons for the response message being a must. The first reason is that there is a need to have two messages for each piece of information that the management receives. There is need to have the poll and the response.
On the other hand, the trapping message generates only a single message to the entity that is sending. If the manager must be notified when some condition occurs, then there is the generation of the message only when that condition is met.
3.Does the Internet have a presentation layer? If not, how are concerns about difference in machine architectures?��for example, the different representation of integers on different machines?��addressed?
The internet does not have a presentation layer. The issues that come with hardware compatibility and formats o information are handled by the application layer. The issues that are normally handled by the presentation layer in OSI layer are not an issue in this layer. This is because all nodes that connect to the internet will have some basic requirements in order to be online. These basic requirements are what help standardization to be realized. For a machine to connect to the internet, there are requirements that should be followed. They are the basic sets of information that will enable connectivity to the internet. The TCP/IP protocol suite does not deal with the various platforms of hardware but is concerned with the requirements for a node to connect to the internet. The connectivity to the internet will be based on the formats and the protocols that have been installed on the individual networks of the host computers. 4.Consider Figure 9.9 in the textbook. What would be the BER encoding of {weight, 277} {lastname, greg}
The BER encoding for {weight, 277), {lastname, greg}.
The BER encoding would be 4 3 'g' 'r' 'e' 'g' 2 2 1 15
Bibliography
Dhillon, G 2005, 'Interpreting the management of information systems security', Computer and Security, vol 54, no. 6, pp. 65-76.
Schneier, B 2010, Secrets and lies: Digital security in a networked world, John Wiley and Sons, New York.