<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8242280512173556289</id><updated>2024-11-06T03:53:36.070+01:00</updated><category term="Reti di Telecommunicazione"/><category term="Algoritmi e strutture dati"/><category term="Fisica"/><category term="rete"/><category term="rete telefonica"/><category term="Elettronica 1"/><category term="Teoria dei Circuiti"/><category term="campo magnetico"/><category term="rete di telecomunicazione"/><category term="IP"/><category term="IPsec"/><category term="Informatica Industriale"/><category term="albero binario"/><category term="dati"/><category term="divide e impera"/><category term="filo rettilineo"/><category term="indirizzi ip"/><category term="legge di Laplace"/><category term="management"/><category term="ordinamento"/><category term="potenza"/><category term="problema"/><category term="programmazione"/><category term="rete di commutazione"/><category term="reti"/><category term="sip"/><category term="spira"/><category term="strutture dati"/><category term="telefono ip"/><category term="voip"/><category term="ADA"/><category term="AH"/><category term="Biot Savart"/><category term="CSMA/CD"/><category term="Codec"/><category term="DQDB"/><category term="ESP"/><category term="ETL"/><category term="Ethernet"/><category term="FDM"/><category term="Formula di clos"/><category term="H.323"/><category term="IEEE 802.3"/><category term="IKE"/><category term="INMF"/><category term="IPsecurity"/><category term="LAN"/><category term="Laplace"/><category term="MAC"/><category term="MIB"/><category term="NAPTR"/><category term="NMS"/><category term="OLAP"/><category term="OLTP"/><category term="PCM"/><category term="Probabilita di non blocco"/><category term="RTP"/><category term="SDP"/><category term="SMI"/><category term="SNMP"/><category term="SRV"/><category term="Skype"/><category term="TDM"/><category term="Trasformatore ideale"/><category term="VPN"/><category term="algoritmo"/><category term="aloanet"/><category term="aloha"/><category term="ampere"/><category term="amplificatore operazionale"/><category term="amplificatore operazionale ideale"/><category term="amplificatore operazionale reale"/><category term="apparato di rete"/><category term="array"/><category term="banda di conduzione"/><category term="banda di valenza"/><category term="base di dati"/><category term="buffer"/><category term="bug"/><category term="campo magneticolinea chiusa"/><category term="cancella"/><category term="capacita diagnostica"/><category term="capire"/><category term="carica"/><category term="caso medio"/><category term="caso migliore"/><category term="caso peggiore"/><category term="code"/><category term="code-word"/><category term="codici aritmetici"/><category term="codici binari"/><category term="codici ciclici"/><category term="codici di parita"/><category term="codifica"/><category term="commutazione a circuito virtuale"/><category term="commutazione a datagram"/><category term="commutazione a messaggio"/><category term="commutazione a pacchetto"/><category term="complessita"/><category term="conduttore"/><category term="configurazione invertente ad operazionale"/><category term="conservativo"/><category term="controllo"/><category term="corrente"/><category term="corrente concatenata"/><category term="corretezza"/><category term="correzione errori"/><category term="data mart"/><category term="data warehouse"/><category term="database"/><category term="decodifica"/><category term="distanza di Hamming"/><category term="elettromagnetismo"/><category term="elettrone"/><category term="esame orale"/><category term="fault tollerance"/><category term="fisica 2"/><category term="fisica genrale"/><category term="flusso magnetico"/><category term="forza di lorentz"/><category term="gauss"/><category term="gestione di rete"/><category term="guasto"/><category term="heap"/><category term="heap binari"/><category term="heapify"/><category term="informazione"/><category term="inseguitore di tensione"/><category term="insert"/><category term="inssertion sort"/><category term="instradamento"/><category term="invariante di ciclo"/><category term="ipv4"/><category term="ipv6"/><category term="iso/osi"/><category term="isolante"/><category term="lacuna"/><category term="legge di Ampere"/><category term="linea di ingresso"/><category term="linea di uscita"/><category term="linee di campo"/><category term="magnetostatica nel vuoto"/><category term="massimo"/><category term="merge"/><category term="merge sort"/><category term="minmum"/><category term="modalità di commutazione"/><category term="modalità trasporto"/><category term="modalità tunnel"/><category term="momenti"/><category term="momento magnetico"/><category term="momento meccanico"/><category term="monopolo magnetico"/><category term="nat"/><category term="nat dinamico"/><category term="nat statico"/><category term="network adress translation"/><category term="network component"/><category term="ordinamento carte"/><category term="ordinamento per inserimento"/><category term="ordinamento sul posto"/><category term="partizione"/><category term="polo magnetico"/><category term="potenza attiva"/><category term="predecessore"/><category term="programmazione dinamica"/><category term="protocollo segnalazione"/><category term="pseudo code"/><category term="query"/><category term="quicksort"/><category term="recovery block"/><category term="resistenza"/><category term="rete a maglia"/><category term="rete a stella"/><category term="rete di connessione"/><category term="rete telefonica nazionale"/><category term="reti private"/><category term="ricorrenza"/><category term="ridondanza"/><category term="riflessione delle resistenze"/><category term="rilevamento errori"/><category term="routine"/><category term="routing"/><category term="search"/><category term="secinda"/><category term="semiconduttore"/><category term="separabilita"/><category term="server"/><category term="session initial protocol"/><category term="sip server"/><category term="sistemi affidabili"/><category term="solenoide"/><category term="struttura S-S"/><category term="struttura S-T"/><category term="struttura T-S"/><category term="struttura s-s-s"/><category term="struttura t-s-t"/><category term="sucessore"/><category term="tempo di esecuzione"/><category term="test di accetazione"/><category term="token ring"/><category term="topologia di rete"/><category term="trama"/><category term="traslazione di indirizzi ip"/><category term="trasmissione della voce"/><category term="trouble ticket"/><category term="velocita"/><category term="voce"/><category term="voce tramite internet"/><title type='text'>L&#39;università è facile</title><subtitle type='html'>Benvenuto sul mio blog che aiuta gli studenti di ingegneria informatica a prepararsi meglio per gli esami.Qui troverai articoli che spiegano in modo semplice argomenti visti a Lezione.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>44</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-6171437380512469910</id><published>2012-01-11T14:21:00.000+01:00</published><updated>2012-01-12T22:36:00.254+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NAPTR"/><category scheme="http://www.blogger.com/atom/ns#" term="protocollo segnalazione"/><category scheme="http://www.blogger.com/atom/ns#" term="rete di telecomunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="rete telefonica"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="SDP"/><category scheme="http://www.blogger.com/atom/ns#" term="session initial protocol"/><category scheme="http://www.blogger.com/atom/ns#" term="sip"/><category scheme="http://www.blogger.com/atom/ns#" term="sip server"/><category scheme="http://www.blogger.com/atom/ns#" term="SRV"/><category scheme="http://www.blogger.com/atom/ns#" term="telefono ip"/><category scheme="http://www.blogger.com/atom/ns#" term="voip"/><title type='text'>Tutto quello che vuoi sapere su SIP</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCI90OGK2ORJ-l8LLJWcSCA-eC8CIjPMtp5W8tl6rVHAt-SoctD2VuLcT41K6WwNZaMSAtLZk5ZhXn1YJ0EF4X2GnHHvUacXbln-GNYZu4wmgjyupl1mTjtKFknwSnXmwbs4ML_d6szvs/s1600/sip.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCI90OGK2ORJ-l8LLJWcSCA-eC8CIjPMtp5W8tl6rVHAt-SoctD2VuLcT41K6WwNZaMSAtLZk5ZhXn1YJ0EF4X2GnHHvUacXbln-GNYZu4wmgjyupl1mTjtKFknwSnXmwbs4ML_d6szvs/s320/sip.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Nell’artico riguardante il VoIP, ho introdotto SIP (Session
Initiation Protocol) come un protocollo di controllo che si occupa di segnalazione
durante una comunicazione VoIP.

&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
E’ un protocollo della IETF del livello applicazione descritto
nella &lt;a href=&quot;http://tools.ietf.org/html/rfc3261&quot;&gt;RFC 3261&lt;/a&gt; che si
occupa della creazione, gestione e chiusura di una comunicazione VoIP&amp;nbsp; (o di altre sessioni multimediali o
testuali).&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
In quest’articolo, vedremmo gli elementi principali di SIP,
analizzeremmo i suoi messaggi e il suo funzionamento. &lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Elementi&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-ySM1GESTjsKF3N0tzFRi5U4lfjriEUqXgqcJmfa1U5MqJ3-BOTGYRYz-VmBr9AmTZKm9F4oCnBwS3G3DUfoX5mlxJ7Zc0U3aLKErapDi7NuSAka_XkcmcsdND7LTsqvYfH9TFXYTEqw/s1600/elementiSIP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-ySM1GESTjsKF3N0tzFRi5U4lfjriEUqXgqcJmfa1U5MqJ3-BOTGYRYz-VmBr9AmTZKm9F4oCnBwS3G3DUfoX5mlxJ7Zc0U3aLKErapDi7NuSAka_XkcmcsdND7LTsqvYfH9TFXYTEqw/s320/elementiSIP.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Gli elementi principali di SIP sono:&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;i&gt;&lt;b&gt;SIP User Agent&lt;/b&gt;&lt;/i&gt;: &amp;nbsp;sono gli
attori della comunicazione. Possono essere usati sia in modalità server
(rispondere alle richieste) sia client (inviare delle richieste).&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;i&gt;Registrar Server&lt;/i&gt;&lt;/b&gt;: E’ un server che riceve da parte degli user agent iscritti a un dominio
il loro attuale indirizzo IP che servirà poi per localizzarli. Inoltre usa i servizi
di un server AAA per l’autenticazione.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;i&gt;Proxy Server&lt;/i&gt;&lt;/b&gt;: è un server intermedio serve a spedire i messaggi a domini esterni.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Può essere Outbound (Riceve tutte le chiamate uscenti di un User Agent
vicino) o Inbound (Instrada le chiamate entranti in un dominio destinato a un
User Agent vicino.)&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;i&gt;Redirect Server&lt;/i&gt;&lt;/b&gt;: Usato per re instradare le richieste SIP verso destinazioni alternative (per
esempio in assenza del destinatario)&lt;i&gt;.&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;i&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;b&gt;Location Server&lt;/b&gt;:&lt;/span&gt;&lt;/i&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp;&lt;/span&gt;&amp;nbsp;è un &lt;a href=&quot;http://it.wikipedia.org/wiki/Database&quot; title=&quot;Database&quot;&gt;database&lt;/a&gt; contenente informazioni sull&#39;utente, come il profilo, l&#39;indirizzo IP,
l&#39;URL.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
In generale tutti questi server sono riuniti in un unico server
chiamato SIP server.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Fin cui possiamo intuire che gli user agent comunicano fra loro mandandosi
dei messaggi e usano dei server per la localizzazione e l’instradamento di
questi messaggi.&amp;nbsp; Come sono fatti questi
messaggi?&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Messaggi&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;faqrisposta&quot;&gt;I &lt;b&gt;messaggi&lt;/b&gt; di SIP sono testuali
e simili a quelli usati da HTTP per lo scambio di pagine web. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;faqrisposta&quot;&gt;Ecco il formato dei messaggi SIP:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5kp4suSjhv5qWTnXHFZUynknSfapKcwI2CRvigTOCYWXORfFttDu6t9fLZM_nFaZtFU6Wh0Fv0Vqep-Sr_H1NamV7oz-tWc4HgwOEuR2kx9ZBUMpgYcyhrJZPi7NeFUZduVqNlzQIdb8/s1600/FormatoMsgSIP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5kp4suSjhv5qWTnXHFZUynknSfapKcwI2CRvigTOCYWXORfFttDu6t9fLZM_nFaZtFU6Wh0Fv0Vqep-Sr_H1NamV7oz-tWc4HgwOEuR2kx9ZBUMpgYcyhrJZPi7NeFUZduVqNlzQIdb8/s320/FormatoMsgSIP.png&quot; width=&quot;257&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;faqrisposta&quot;&gt;L’intestazione contiene informazioni sull’user
agent sorgente e l’user agent destinatario del messaggio.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;faqrisposta&quot;&gt;La linea vuota indica la fine
dell’intestazione.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;faqrisposta&quot;&gt;Il payload usa il protocollo SDP
(Session description protocol) e descrive i parametri della sessione nel caso
fosse multimediale (opzionale nel messaggio).&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span class=&quot;faqrisposta&quot;&gt;Ora vediamo i tipi di messaggi.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Tipi di messaggi SIP&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 18.0pt;&quot;&gt;
&lt;i&gt;INVITE: &lt;/i&gt;invitare un utente a partecipare a una comunicazione.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 18.0pt;&quot;&gt;
&lt;i&gt;ACK&lt;/i&gt;: Notificare la ricezione di una risposta. &lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 18.0pt;&quot;&gt;
&lt;i&gt;BYE&lt;/i&gt;: Terminare una comunicazione.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 18.0pt;&quot;&gt;
&lt;i&gt;CANCEL&lt;/i&gt;: Anulare una richiesta (INVITE) prima ancora di averne
ricevuta la risposta.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 18.0pt;&quot;&gt;
&lt;i&gt;OPTIONS&lt;/i&gt;: Chiedere informazioni sulle capacità di un user
agent.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 18.0pt;&quot;&gt;
&lt;i&gt;REGISTER&lt;/i&gt;: Registrare l’attuale indirizzo di un user agent &lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SUBSCRIBE&lt;/i&gt;&lt;b&gt;: &lt;/b&gt;Richiedere lo stato di un user agent.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NOTIFY&lt;/i&gt;&lt;b&gt;: &lt;/b&gt;informare
dello stato di un UA&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MESSAGE&lt;/i&gt;&lt;b&gt;: &lt;/b&gt;mandare
un messaggio (testo/XML) usato per l&#39;istant messaging.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Ora vediamo i tipi di risposte.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;Tipi di risposte&lt;/b&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Le risposte sono classificate con un codice di tre cifre, dove la
prima indica la categoria. Le categorie principali sono:&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;1xx Risposte
provvisorie:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;100 &lt;/b&gt;Ricerca
del destinatario in corso.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;180 &lt;/b&gt;Il Telefono
SIP del destinatario sta suonando.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;182 &lt;/b&gt;Richiesta
in coda.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;2xx Risposte
positive:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;200 &lt;/b&gt;OK.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;3xx Re direzione:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
300 Scelta multipla&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
305 Uso del Proxy&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;4xx Errori
nel client:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;404 &lt;/b&gt;destinatario
non trovato.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;407 &lt;/b&gt;errore
di autenticazione nel Proxy.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;5xx Errori
nel server:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
503 Servizio non disponibile&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
505 Versione di SIP non supportata&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;6xx Errori
generici:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&amp;nbsp;
600 &lt;/b&gt;destinatario occupato su tutti gli
indirizzi.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&amp;nbsp;
603 &lt;/b&gt;chiamata rifiutata.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Ora che sappiamo un po’ di più sui messaggi scambiati, come
funziona il SIP.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Funzionamento&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
La comunicazione in SIP è un insieme di dialoghi e transazioni.
Per transazione intendiamo l’insieme dei messaggi scambiati fra la prima richiesta e la risposta finale&amp;nbsp; mentre il dialogo è un flusso di messaggi richiesta-risposta fra&amp;nbsp; due user agent. &lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Per l’inizio di una comunicazione SIP usa una transazione
trapezoidale simile a un handshake a tre vie.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;img alt=&quot;&quot; src=&quot;data:image/png;base64,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&quot; /&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
SIP usa i sia TCP sia UDP per il trasporto dei messaggi. In
modalità TCP, si può anche aggiunge la cifratura usando TLS.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
SIP deve poter localizzare un user agent associando il suo nome
utente al suo indirizzo. &lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Come si svolge il Name Mapping?&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Per associare un nome utente a un indirizzo come fa SIP? Prendiamo
un esempio pratico.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Un nome utente è della forma&amp;nbsp;
&lt;a href=&quot;mailto:utente@dominio.ext&quot;&gt;utente@dominio.ext&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Dove dominio può essere il nome del server, l’indirizzo IP …&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Per risolvere il problema SIP fa l’uso di tre servizi del server
DNS (NAPTR, SRV, A/AAAA.)&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
NAPTR&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
È un record del server DNS che definisce quale protocollo di
trasporto, deve essere usato per un certo servizio. Per il nostro caso il
servizio è SIP e i protocolli di trasporto possibili sono: &lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
TLS/TCP, TCP, UDP&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;i&gt;Esempio&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;foo.com 43200 IN NAPTR 60 50 &quot;s&quot;
&quot;SIP+D2U&quot; &quot;&quot; _sip._udp.foo.com&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
SRV&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
È un record del server DNS che definisce i parametri con quali
accedere a un servizio. I parametri sono il server e la priorità.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;i&gt;Esempio&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;_sip._udp.foo.com 43200 IN SRV 10 10 5060
sipserver.foo.com.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
A/AAAA&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Questo è il record che si guarda per ultimo. Il record in
questione ci da l’indirizzo per accedere ad un server.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;i&gt;Esempio&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;ns.foo.com. 43200 IN A 10.0.0.20&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Per fare il name mapping SIP consulta questi tre record se sono
presenti in quest’ordine NAPTR, SRV, A/AAAA.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Possiamo finire l’artico dicendo che SIP è protocollo di segnalazione
semplice e leggero e fra l’altro è usato nel software Google Talk.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Segnaliamo anche che SIP usa lo standard Enum E.164 per
permettere a telefoni tradizionali (PSTN) o IP di comunicare con un utente SIP
ma questa è un’altra storia.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
Se hai qualche dubbio aspetto le tue domande o chiarimenti.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;i style=&quot;mso-bidi-font-style: normal;&quot;&gt;Riferimenti
e approfondimenti:&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
http://it.wikipedia.org/wiki/Session_Initiation_Protocol&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
http://www.voip-info.org/wiki/view/SIP&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
http://voip.html.it/articolo06.aspx&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
http://www.siptutorial.net/SIP/index.html&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
http://www.alma-web.net/index.php/faq/23-linux/27-il-protocollo-sip.html&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/6171437380512469910/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2012/01/tutto-quello-che-vuoi-sapere-su-sip.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6171437380512469910'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6171437380512469910'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2012/01/tutto-quello-che-vuoi-sapere-su-sip.html' title='Tutto quello che vuoi sapere su SIP'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCI90OGK2ORJ-l8LLJWcSCA-eC8CIjPMtp5W8tl6rVHAt-SoctD2VuLcT41K6WwNZaMSAtLZk5ZhXn1YJ0EF4X2GnHHvUacXbln-GNYZu4wmgjyupl1mTjtKFknwSnXmwbs4ML_d6szvs/s72-c/sip.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-4869563410482261297</id><published>2012-01-08T05:11:00.000+01:00</published><updated>2012-01-09T06:22:54.548+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="base di dati"/><category scheme="http://www.blogger.com/atom/ns#" term="data mart"/><category scheme="http://www.blogger.com/atom/ns#" term="data warehouse"/><category scheme="http://www.blogger.com/atom/ns#" term="database"/><category scheme="http://www.blogger.com/atom/ns#" term="ETL"/><category scheme="http://www.blogger.com/atom/ns#" term="OLAP"/><category scheme="http://www.blogger.com/atom/ns#" term="OLTP"/><category scheme="http://www.blogger.com/atom/ns#" term="query"/><category scheme="http://www.blogger.com/atom/ns#" term="server"/><title type='text'>Tutto quello che devi sapere sui Data warehouse.</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjawaj3D8IyhTAlVwmAp1QuXzSdU2ibNvEq_4ZtnrouSjWbB0-1jhfN6DCcpJZfMmNOJ2fd20-PfIlHuUY1Wg2SXQgFLkXUuJ8nXsLz10jkhO7lGtFK7HK2C_Uimr13UYiOx0GuBi6hXyI/s1600/63776eo7h5jxc7m.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjawaj3D8IyhTAlVwmAp1QuXzSdU2ibNvEq_4ZtnrouSjWbB0-1jhfN6DCcpJZfMmNOJ2fd20-PfIlHuUY1Wg2SXQgFLkXUuJ8nXsLz10jkhO7lGtFK7HK2C_Uimr13UYiOx0GuBi6hXyI/s320/63776eo7h5jxc7m.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;Possiamo definire un data warehouse come una base di dati di grande dimensione separata da quella operativa dell’azienda e usata per il supporto alle decisioni.&lt;br /&gt;
A cosa serve un secondo database di grande dimensione a una azienda? La risposta a questa domanda è importantissima. &lt;br /&gt;
Ogni azienda tiene delle informazioni sulle sue attività per offrire i suoi servizi in modo efficace.&amp;nbsp; Per usufruire al meglio di questa informazione, le aziende si creano un secondo database (il data warehouse) che poi usano per analisi, archivio, sicurezza e anche supporto alle decisioni.&lt;br /&gt;
Le informazioni tratti da un data warehouse sono poi usati dai manager delle aziende per fare per esempio delle valutazioni tecnico-economiche sull’andamento dell’azienda.&lt;br /&gt;
Al crescere del database transazionale, il data warehouse di un azienda è aggiornato.&lt;br /&gt;
In quest’articolo, analizzeremo gli elementi di un data warehouse, la sua architettura e in fine vedremmo qualche sua applicazione.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Elementi di un data warehouse&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-_RegITS4RaHSGrHyDtIvMcyPAppeFp2H4Onp47eqhmOX2bl0uweNXUfk7QfnTLB3ZUMTqIFWDlsCQu3NxuF6QaBymmg5atRpHt6nV7MDRqP-0uDvsVvCxwEbq3Ftq-kdTXRd6MK2Hts/s1600/architecture.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-_RegITS4RaHSGrHyDtIvMcyPAppeFp2H4Onp47eqhmOX2bl0uweNXUfk7QfnTLB3ZUMTqIFWDlsCQu3NxuF6QaBymmg5atRpHt6nV7MDRqP-0uDvsVvCxwEbq3Ftq-kdTXRd6MK2Hts/s320/architecture.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Dalla creazione all’uso di un data warehouse, i dati seguono un flusso ben determinato. Dati provenendo da fonti diverse sono estratti e trasformati secondo regole ben stabiliti e salvati nel data warehouse usando server dedicati.&amp;nbsp; Dopo di che ci sono applicazioni ad hoc che estraggono i dati dalla data warehouse usando dei query o altri metodi per analizzare i dati.&lt;br /&gt;
Gli elementi sono quindi in modo generale le fonti di dati, i data warehouse (con o senza data mart), i servers strumenti di analisi e i metadati.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Fonti&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Le fonti possono essere di diversi tipi dal file testo fino a un database vero e proprio. Possono essere interni (il database OLTP dell’azienda) o esterni (dati provenienti da un&#39;altra azienda.)&lt;br /&gt;
Per integrare questi dati, si usa il processo ETL (Extracting, Transformation, Loading) che deve estrarre i dati dalle fonti, ripulirli da errori o inconsistenze e finalmente trasformarli in un formato adatto per il data warehouse.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Data warehouse e data mart&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Un data mart può essere pensato come la restrizione della data warehouse a un solo dipartimento (Vendite ad esempio) dell’azienda. &lt;br /&gt;
A questo punto si può dire che un data warehouse è un insieme di data mart. Ci sono aziende che costruiscono il proprio data warehouse in modo graduale aggiungendo un data mart alla volta. Gli altri invece partono da tutti i data mart (prende più tempo).&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;Strumenti di analisi&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Gli strumenti di analisi sono degli strumenti destinati agli utenti che potranno per analizzare i dati. &lt;br /&gt;
Ce ne sono ad esempio quelli per fare delle relazioni su vari argomenti, quelli per eseguire delle query e avere i dati che servono a loro rappresentati in vari modi. Le applicazioni per le query sono fatti ad hoc nel senso che non si può sapere a priori quali informazioni servono agli utenti.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Servers &lt;/span&gt;&lt;br /&gt;
Due tipi di servers sono usati rispetto alla densità dei dati.&lt;br /&gt;
&lt;b&gt;Server Relational OLAP&lt;/b&gt;&lt;br /&gt;
Si usano i server dei DBMS tradizionali estesi per operazioni aggregati.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Server Multidimensional OLAP&lt;/b&gt;&lt;br /&gt;
Sono server rappresentati da matrici multidimensionali dove ogni dimensione è un elemento&lt;br /&gt;
del data warehouse.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;I meta dati&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I metadati sono dei dati che documentano ogni parte del processo. &lt;br /&gt;
Ci sono dei metadati per La fase ETL, ci sono dei metadati per il dati contenuti nel data warehouse e infine dei metadati per le query fate. &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Architettura&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Ci sono tre architetture di cui la prima è sconsigliata. &lt;br /&gt;
La prima è quella a un solo livello. Si usa lo stesso database per operazioni transazionali e quelli analitiche. Le operazioni analitiche appesantiranno la velocità delle operazioni transazionali che a loro volta sovrascriveranno dati importanti per l’analisi storica dell’azienda.&lt;br /&gt;
La seconda architettura è quella a due livelli in cui il database OLTP e il data warehouse sono separati.&lt;br /&gt;
Il primo strato è costituito dalle fonti di dati. Il problema maggiore con quest’architettura è che il processo di ETL non è fattibile in pratica con la dimensione di dati da dover estrarre. &lt;br /&gt;
Il che ci porta alla terza architettura che aggiunge fra il primo strato e l’ultimo, un nuovo strato che permette di alleggerire le operazioni ETL faccendoni per la più grande su macchine predisposte a questo scopo nel secondo strato.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Applicazioni&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Le applicazioni della data warehousing sono varie, in seguito solo una piccola lista:&lt;br /&gt;
Negozi: Comportamento del cliente&lt;br /&gt;
Assicurazione: Antifrode&lt;br /&gt;
Telecomunicazione: Analisi chiamate, antifrode&lt;br /&gt;
Salute: Analisi del servizio e salute&lt;br /&gt;
Aspettavo l’ultimo per la fine, La pubblicità mirata in tante azienda usa le informazioni sui clienti per capire meglio i loro gusti.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;u&gt;Glossario:&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
OLTP: &lt;span class=&quot;st&quot;&gt;On-Line Transaction Processing usato nei processi transazionali in un DBMS &lt;/span&gt;&lt;br /&gt;
OLAP:&lt;span style=&quot;font-size: small;&quot;&gt; &lt;span class=&quot;st&quot;&gt;&lt;i&gt;On-Line Analytical Processing usato nei processi di analisi in un data warehouse&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;i&gt;&lt;u&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;Fonti e approfondimenti:&lt;/span&gt;&lt;/b&gt;&lt;/u&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Slide del Prof Luca Cabbibo&lt;br /&gt;
Slide del Prof&amp;nbsp; Elena Baralis (Polito)&lt;br /&gt;
Wikipedia&lt;br /&gt;
http://www.wisegeek.com/ &lt;br /&gt;
http://www.eccellere.com/&lt;br /&gt;
http://www.dwinfocenter.org/getstart.html&lt;br /&gt;
http://www.tech-faq.com/&lt;br /&gt;
&lt;a href=&quot;http://www.freedigitalphotos.net/images/view_photog.php?photogid=721&quot;&gt;Image: renjith krishnan / FreeDigitalPhotos.net&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/4869563410482261297/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2012/01/tutto-quello-che-devi-sapere-sui-data.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/4869563410482261297'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/4869563410482261297'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2012/01/tutto-quello-che-devi-sapere-sui-data.html' title='Tutto quello che devi sapere sui Data warehouse.'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjawaj3D8IyhTAlVwmAp1QuXzSdU2ibNvEq_4ZtnrouSjWbB0-1jhfN6DCcpJZfMmNOJ2fd20-PfIlHuUY1Wg2SXQgFLkXUuJ8nXsLz10jkhO7lGtFK7HK2C_Uimr13UYiOx0GuBi6hXyI/s72-c/63776eo7h5jxc7m.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-5972775157253849943</id><published>2011-12-23T07:39:00.000+01:00</published><updated>2012-02-25T11:13:49.785+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ADA"/><category scheme="http://www.blogger.com/atom/ns#" term="Codec"/><category scheme="http://www.blogger.com/atom/ns#" term="H.323"/><category scheme="http://www.blogger.com/atom/ns#" term="rete"/><category scheme="http://www.blogger.com/atom/ns#" term="rete di telecomunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="rete telefonica"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="RTP"/><category scheme="http://www.blogger.com/atom/ns#" term="sip"/><category scheme="http://www.blogger.com/atom/ns#" term="Skype"/><category scheme="http://www.blogger.com/atom/ns#" term="telefono ip"/><category scheme="http://www.blogger.com/atom/ns#" term="voce"/><category scheme="http://www.blogger.com/atom/ns#" term="voce tramite internet"/><category scheme="http://www.blogger.com/atom/ns#" term="voip"/><title type='text'>Tutto quello che devi sapere su VoIP</title><content type='html'>&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/-G_S_5ZTmikA/TvQdmPRJx7I/AAAAAAAAAow/CsuFWvPRecE/s144/VoipGirl.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://3.bp.blogspot.com/-G_S_5ZTmikA/TvQdmPRJx7I/AAAAAAAAAow/CsuFWvPRecE/s144/VoipGirl.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;VoIP è l’acronimo di Voice over IP e può
essere definito come l’insieme dei protocolli che rende possibile il trasporto
attraverso una rete IP del segnale della voce.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Questo significa per esempio chiamate
telefoniche lunga distanza a costo basso o gratuite se si sfrutta una
connessione internet di qualità accettabile. In quest’articolo vedremmo in
dettaglio che cos’è e come funziona VoIP dopo averne elencati svantaggi e
vantaggi.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






Vantaggi di VoIP&lt;/h2&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






Basso costo&lt;/h3&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Le chiamate telefoniche fate via VoIP costano meno anche se di
lunga distanza. Possiamo addirittura dire che non costano niente, infatti,
basta pensare che le chiamate VoIP abbiano bisogno di una connessione a una
rete (internet) che l’utente sta già pagando. I servizi VoIP sono visti come
aggiuntivi a quelli che già ne offre una. &lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






Liberta&lt;/h3&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;VoIP rende possibile una maggiore libertà che non c’è con la rete
telefonica tradizionale.&lt;/span&gt;&lt;/div&gt;
&lt;h4 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






Mobilità fisica. &lt;/h4&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Si può trasportare il suo telefono IP e in qualsiasi luogo lo
connettiamo a una rete, possiamo ricevere le telefonate.&lt;/span&gt;&lt;/div&gt;
&lt;h4 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






Lavoro flessibile&lt;/h4&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Questo permette quindi ad agenti di call center di lavorare da
casa se hanno una buona connessione internet.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat;&quot;&gt;Manutenzione inesistente&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat;&quot;&gt; o quasi&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat;&quot;&gt;Non c’è bisogno di avere
sempre il supporto di una compagnia telefonica per sistemare I guasti. Di
solito i guasti si riassumono alla perdita del servizio dovuta all’abbassamento
della qualità del servizio della rete. In questo caso basterà riavviare il suo
impianto VoIP e la sua connessione.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat;&quot;&gt;Integrazione con la rete tradizionale&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat;&quot;&gt;Esiste anche un’integrazione
del VoIP con la rete telefonica tradizione. Il che significa che ora ci può
chiamare un PC o un telephono IP sul nostro telephono normale e vice versa. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat;&quot;&gt;Questo è un bel vantaggio e
significa che ognuno può fare il passaggio al VoIP oppure usare entrambi i
servizi senza perdere il contatto con la rete telefonica tradizionale. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat; line-height: 115%;&quot;&gt;Servizi Aggiuntivi&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat; font-size: 12pt; line-height: 115%;&quot;&gt;Usando le chiamate telefoniche via VoIP, abbiamo la
possibilità di avere servizi aggiuntivi senza costo aggiuntivo: FAX, SMS, Applicazione
per i messaggi vocali o video chiamate.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat; font-size: 12pt; line-height: 115%;&quot;&gt;Durante una chiamata, c’è la possibilità di trasmettere altri
tipi di dati come video, audio, file.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






Risparmio per le aziende&lt;/h3&gt;
&lt;div class=&quot;sottotitolo&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
All’interno di un’azienda, si può usare la stessa rete
per il trasporto della voce e dei dati.&lt;/div&gt;
&lt;div class=&quot;sottotitolo&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
Infatti, telefonate interni e altre comunicazioni useranno
la stessa e sola rete IP.&lt;/div&gt;
&lt;div class=&quot;sottotitolo&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
L’azienda paga una volta e usufruisce di video
conferenze, chiamate o video chiamate e trasmissione d’informazioni.&lt;/div&gt;
&lt;h2 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






Svantaggi di VoIP&lt;/h2&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






Qualità vocale non perfetta&lt;/h3&gt;
&lt;div class=&quot;contenuto&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
E’ normale pensare che se si usi la stessa rete IP per le nostre
chiamate e per la trasmissione di dati (pagine internet, download e upload di
file, streaming di contenuto online), alla fine la qualità della voce non sarà alta
visto che le risorse de la rete sono condivise&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






Banda insufficiente&lt;/h3&gt;
&lt;div class=&quot;contenuto&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
Sappiamo che l’orecchio ha una certa tolleranza per quanto
riguarda pezzi mancanti (perdita pacchetti nella rete) oppure ritardi in un
messaggio vocale da capire.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small; line-height: 115%;&quot;&gt;Per avere una qualità di
VoIP accettabile, serve una banda di 128 Kbit/sec bidirezionali minimi, e una
latenza di 150 ms.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;contenuto&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A volte la nostra connessione internet non celo permette.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






VoIP in dettaglio &lt;/h2&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/-z0HsrPESxng/TvQdloMsb1I/AAAAAAAAAos/fBWsz099isg/s144/voipmodern.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;http://4.bp.blogspot.com/-z0HsrPESxng/TvQdloMsb1I/AAAAAAAAAos/fBWsz099isg/s400/voipmodern.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Ora vediamo come funziona VoIP in dettaglio.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;La tecnologia converte il
segnale della voce in un segnale digitale.&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
Questo ultimo può viaggiare compresso in &quot;pacchetti&quot; sulla nostra rete
dati, utilizzando un protocollo IP e subendo poi, il processo inverso per
riconvertirlo in segnale vocale analogico. &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://4.bp.blogspot.com/-iEYAHU_y1YU/TvQdkrYPPEI/AAAAAAAAAoo/B8OOUFi_FPY/s144/voip.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;113&quot; src=&quot;http://4.bp.blogspot.com/-iEYAHU_y1YU/TvQdkrYPPEI/AAAAAAAAAoo/B8OOUFi_FPY/s400/voip.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
Ci
sono due tipi di conversione: ADC (analog to digital converter) per
digitalizzare l’analogico e DAC (digital to analog converter) che fa la conversione
inversa.&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat;&quot;&gt;Funzionamento&lt;/span&gt;&lt;/h3&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat; font-size: 12pt; line-height: 115%;&quot;&gt;Ci sono
vari modi di usare VoIP.&lt;/span&gt;&lt;/div&gt;
&lt;h4 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






VOIP via&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=8242280512173556289&quot; title=&quot;ATA&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;ATA&lt;/span&gt;&lt;/a&gt;&lt;/h4&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat; font-size: 12pt; line-height: 115%;&quot;&gt;Prendere
un telefono normale e trasformarlo in telefono IP usando ATA (Analog Telephone
Adaptator) che premette di connettere un telefono normale a internet
occupandosi della conversione da analogico a digitale e vice versa.&amp;nbsp; &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-U6NdD_vKIHI/TvQdk9eRytI/AAAAAAAAAog/MOlDViNcBrI/s144/ADA.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;86&quot; src=&quot;http://2.bp.blogspot.com/-U6NdD_vKIHI/TvQdk9eRytI/AAAAAAAAAog/MOlDViNcBrI/s400/ADA.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;background-attachment: scroll; background-clip: initial; background-color: white; background-image: none; background-origin: initial; background-position: 0% 0%; background-repeat: repeat repeat; font-size: 12pt; line-height: 115%;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;br style=&quot;mso-special-character: line-break;&quot; /&gt;
&lt;br style=&quot;mso-special-character: line-break;&quot; /&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;h4 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






VOIP via&lt;span class=&quot;apple-converted-space&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;telefono IP&lt;/h4&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;In questo caso non c’è bisogno di adattatore (ADA).&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/-9LJVLWi4HlE/TvQdk1Xp5WI/AAAAAAAAAok/UuKIY679Z7I/s144/withoutADA.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;100&quot; src=&quot;http://1.bp.blogspot.com/-9LJVLWi4HlE/TvQdk1Xp5WI/AAAAAAAAAok/UuKIY679Z7I/s400/withoutADA.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h4 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






&lt;span style=&quot;font-size: 12pt; font-style: normal; font-weight: normal; line-height: 115%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






VOIP connessione diretta&lt;/h4&gt;
&lt;div style=&quot;-moz-border-bottom-colors: none; -moz-border-image: none; -moz-border-left-colors: none; -moz-border-right-colors: none; -moz-border-top-colors: none; border-color: -moz-use-text-color -moz-use-text-color windowtext; border-style: none none solid; border-width: medium medium 1pt; color: black; font-family: Verdana,sans-serif; padding: 0cm 0cm 1pt; text-align: left;&quot;&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;In questo caso la connessione non passa per un Service provider ma
va direttamente al destinatario.&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEK4z78oJwtqM1IlkTFce92enbSluSBWjsg2LNxd8gGFKeuZBkFs_NtRA2065QoOmVVpSJdBe-UWPp3yeh3v3sOhEdwiNcdG-fNT88bhIIq1cTKTSs1bHroRfgID5v9Sdx7mMZP9e3Szc/s1600/directVoip.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;73&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEK4z78oJwtqM1IlkTFce92enbSluSBWjsg2LNxd8gGFKeuZBkFs_NtRA2065QoOmVVpSJdBe-UWPp3yeh3v3sOhEdwiNcdG-fNT88bhIIq1cTKTSs1bHroRfgID5v9Sdx7mMZP9e3Szc/s400/directVoip.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;L’IP
Phone ha un costo, ADA ha un costo e i servizi del VOIP Service Provider hanno
un costo. Per usare il VOIP con il computer, ci servono una connessione
internet, un software VoIP, delle cuffie e un microfono.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Un
elemento importante al funzionamento del VoIP è la Compressione/Decompressione
della voce digitalizzata che permette di occupare uno spazio più ridotto
durante la trasmissione. Per farlo si usa i CODEC. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Un
CODEC è un algoritmo di Compressione/Decompressione che premette di ridurre la
banda necessaria per trasmettere il suono.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h2 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






I protocolli VoIP&lt;/h2&gt;
&lt;div class=&quot;sottotitolo&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;sottotitolo&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
Quali protocolli utilizza il VoIP?&lt;/div&gt;
&lt;div style=&quot;-moz-border-bottom-colors: none; -moz-border-image: none; -moz-border-left-colors: none; -moz-border-right-colors: none; -moz-border-top-colors: none; border-color: -moz-use-text-color -moz-use-text-color windowtext; border-style: none none solid; border-width: medium medium 1pt; color: black; font-family: Verdana,sans-serif; padding: 0cm 0cm 1pt; text-align: left;&quot;&gt;
&lt;div class=&quot;contenuto&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
Ci sono due principali protocolli che permettono il
funzionamento del VOIP e che lavorano in parallelo.&lt;/div&gt;
&lt;div class=&quot;contenuto&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
Il primo si occupa del trasporto dei pacchetti di voce
digitalizzata. Per questo scopo è usato RTP (Real-Time Transport Protocol).&lt;/div&gt;
&lt;div class=&quot;contenuto&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
Il secondo si occupa della “segnalazione” della
comunicazione (ricostruzione del frame audio, sincronizzazione, identificazione
del chiamante, …)&lt;/div&gt;
&lt;div class=&quot;contenuto&quot; style=&quot;border: medium none; padding: 0cm;&quot;&gt;
In questo caso ci sono più protocolli standard tra cui
scegliere:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;SIP&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;(Session
Initiation Protocol) della IETF;&lt;br /&gt;
&lt;b&gt;H.323&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;dell’ITU;&lt;br /&gt;
&lt;b&gt;Skinny
Client Control Protocol&lt;/b&gt;, protocollo proprietario della Cisco;&lt;br /&gt;
&lt;b&gt;Megaco&lt;/b&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;(conosciuto
anche come H.248);&lt;br /&gt;
&lt;b&gt;MGCP&lt;/b&gt;;&lt;br /&gt;
&lt;b&gt;MiNET&lt;/b&gt;,
protocollo proprietario della Mitel;&lt;br /&gt;
&lt;br style=&quot;mso-special-character: line-break;&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=8242280512173556289&quot; name=&quot;ss4.4&quot;&gt;RTP (Real
Time Transport Protocol&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
E&#39; un protocollo usato per il trasferimento dei dati in real time come audio e video. Inoltre permette di incapsulare I pacchetti nello stack TCP/IP.&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;pre style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;Questa è la struttura&lt;/span&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRrDWslEjAQeUAeKYpVX9cIz-jvFx9PulybTpbpPvNY9zzRO5jgkHqJy2ihGSRnvx0ELU5bQFXFL9yOi-FpfgMej6eGFWNnlXS4wKWOglRe1B-fOlH3S7cUqiDlFmo_VSXciHA5IH7B9w/s1600/RTP.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRrDWslEjAQeUAeKYpVX9cIz-jvFx9PulybTpbpPvNY9zzRO5jgkHqJy2ihGSRnvx0ELU5bQFXFL9yOi-FpfgMej6eGFWNnlXS4wKWOglRe1B-fOlH3S7cUqiDlFmo_VSXciHA5IH7B9w/s320/RTP.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;pre&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;
&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 12pt;&quot;&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
Abbiamo
I pacchetti VoIP che sono incapsulati all’interno dei pacchetti RTP che a loro
volta sono incapsulati nei pacchetti UDP-IP.&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
Non
si usa TCP, perché sarebbe troppo pesante per applicazioni di tipo Real time,
invece si usa UDP che ci va bene perché butta i pacchetti invece di aspettare quelli
in ritardo (opzione di lusso in condizione real time).&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
RTP
si occupa dell’ordine del trasporto dei pacchetti in particolare un flusso per
sessione.&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJn7tJcluiAT01N7d8MWBGNbY-7gFBM5ntt7-nYF0R4LdwQZf31ZKguAJW2pOnn9d88dx5wniVb-gRHtxNhDJVExaFS-yaq1elNWGju7BsdZXcmpSRp-Esdz5Rz1mq7iG-vDUvBmEYaQI/s1600/RTPpacket.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;172&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJn7tJcluiAT01N7d8MWBGNbY-7gFBM5ntt7-nYF0R4LdwQZf31ZKguAJW2pOnn9d88dx5wniVb-gRHtxNhDJVExaFS-yaq1elNWGju7BsdZXcmpSRp-Esdz5Rz1mq7iG-vDUvBmEYaQI/s400/RTPpacket.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;pre&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/pre&gt;
&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul style=&quot;color: black; font-family: Verdana,sans-serif;&quot;&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;b&gt;Ver. (Version)&lt;/b&gt;:
(2bit) indica la versione del protocollo. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;b&gt;P (Padding)&lt;/b&gt;: (1
bit) indica se è presente un byte di padding alla fine del pacchetto. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;X (Extension)&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;: (1
bit) indica la presenza di un Extension header tra l’header standard e il
payload. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;CC (CSRC Count)&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;: (4 bit)
contiene il numero di CSRC &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;M (Marker)&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;: (1
bit) Usato dal livello applicativo . Se è settato, significa che il pacchetto
ha una qualche speciale rilevanza per il livello applicativo. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;PT (Payload Type)&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;: (7
bit) indica il formato del payload .&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Sequence Number&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;: (16
bit) il sequence number è incrementato di uno per ogni pacchetto RTP inviato e
permette al ricevente di identificare perdite di pacchetti e ripristinare
l’ordine corretto.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Timestamp&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;: (32
bit) utilizzato per permettere al ricevente di riprodurre il media ricevuto
nell’intervallo appropriato. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;SSRC&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;: (32 bit) il
synchronization source identifier identifica in modo univoco la fonte dello
stream all’interno della sessione RTP. &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;CSRC&lt;/b&gt;: (da 0 a 15, 32 bit ciascuno)
gli identificatori contributing source enumerano le fonti di uno stream
generato da più fonti. Il numero d’identificatori CSRC è dato dal valore del
campo CC&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;color: black; font-family: Verdana, sans-serif;&quot;&gt;

&lt;/span&gt;

















&lt;br /&gt;
&lt;h3 style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;






H.323 e SIP&lt;/h3&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;H.323 &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;È un protocollo standard che contiene requisiti per consegnare
audio tramite rete e include I codec della voce.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;SIP &lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;(Session
Initiation Protocol)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;È un protocollo per organizzare , cambiare e finire una
connessione di conversazione (Conferenze multimedia, connessione fra telefoni e
connessione fra diverse applicazioni)&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Per capire meglio come funzionano H.323 e SIP ,
leggete i miei prossimi articoli.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Terminiamo quest’articolo precisando che per quelli
che non sanno se passare al VoIP, ho una notizia interessante per loro: Il
mondo è già passato a VoIP e forse anche voi. Ecco la prova:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Applicazioni che usano VoIP:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Skype, Justvoip …&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;span class=&quot;MsoIntenseReference&quot;&gt;Fonti e Approfondimenti:&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://speedflow.com/index.php/voip-faq&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;http://speedflow.com/index.php/voip-faq&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://www.voipproducts.org/pstn-vs-voip/&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;http://www.voipproducts.org/pstn-vs-voip/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://www.voip-sip.org/&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;http://www.voip-sip.org/&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://www.mondovoip.com/&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;www.mondo&lt;b&gt;voip&lt;/b&gt;.com&lt;/span&gt;&lt;/a&gt;&lt;cite&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;/span&gt;&lt;/cite&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;cite&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Wikipedia&lt;/span&gt;&lt;/cite&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://tldp.org/HOWTO/VoIP-HOWTO-4.html&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;http://tldp.org/HOWTO/VoIP-HOWTO-4.html&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;a href=&quot;http://www.howstuffworks.com/ip-telephony.htm&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;http://www.howstuffworks.com/ip-telephony.htm&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;color: black; font-family: Verdana,sans-serif; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;color: black; font-family: Verdana, sans-serif;&quot;&gt;

&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/5972775157253849943/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2011/12/tutto-quello-che-devi-sapere-di-voip.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/5972775157253849943'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/5972775157253849943'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2011/12/tutto-quello-che-devi-sapere-di-voip.html' title='Tutto quello che devi sapere su VoIP'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/-G_S_5ZTmikA/TvQdmPRJx7I/AAAAAAAAAow/CsuFWvPRecE/s72-c/VoipGirl.png" height="72" width="72"/><thr:total>0</thr:total><georss:featurename>Torino, Italia</georss:featurename><georss:point>43.834526782236843 11.953125</georss:point><georss:box>19.131274282236841 -28.4765625 68.537779282236841 52.3828125</georss:box></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-706979176346040797</id><published>2011-11-10T00:47:00.000+01:00</published><updated>2011-11-10T02:28:58.038+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="indirizzi ip"/><category scheme="http://www.blogger.com/atom/ns#" term="IP"/><category scheme="http://www.blogger.com/atom/ns#" term="IPsec"/><category scheme="http://www.blogger.com/atom/ns#" term="ipv4"/><category scheme="http://www.blogger.com/atom/ns#" term="ipv6"/><category scheme="http://www.blogger.com/atom/ns#" term="rete"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><title type='text'>Tutto quello che devi sapere su IPv6</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;IPV6 è semplicemente la
nuova versione dell’IP (internet Protocol) successore della version 4.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;E’ un protocollo molto
importante della pila OSI. Infatti, si occupa dell’indirizzamento, del routing,
della frammentazione e del riassemblaggio dei dati da un host all’altro
all’interno di una rete (Internet, Intranet, reti private …). E’ il protocollo più
usato per trasmettere qualsiasi tipo d’informazione usando le tecnologie
esistenti.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;In quest’articolo,
analizzeremo in profondità L’IPV6 e faremmo anche delle correlazioni con il suo
predecessore IPv4.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;i&gt;&lt;span style=&quot;font-family: Cambria;&quot;&gt;Vantaggi dell’IPv6&lt;/span&gt;&lt;/i&gt;&lt;/h2&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Ci sono molti
cambiamenti in questa nuova versione dell’IP.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt;&quot;&gt;


&lt;span style=&quot;font-family: Cambria; font-size: medium;&quot;&gt;Numero di bit dell’indirizzo&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Il numero di bit usato
per l’indirizzo è passato da 32 bit a 128. Questo significa un maggiore numero d’indirizzi
IP il che risolve il problema imminente di esaurimento del numero d’indirizzi
IPV4. In sostanza nella versione 4, c’erano &lt;span class=&quot;nw&quot;&gt;2^32 (circa 4,3
miliardi d’indirizzi). Ora con la nuova versione , abbiamo &lt;/span&gt;2&lt;span class=&quot;st&quot;&gt;^&lt;/span&gt;128 ( circa 340.282.366.920.938.463.463.374.607.431.768.211.45
indirizzi ) cioè un numero talmente grande che non si può pronunciare.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;span style=&quot;font-family: Cambria; font-size: medium;&quot;&gt;La Frammentazione dei pacchetti.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Nella versione 4, c’èra
la possibilità per i router di frammentare i pacchetti quando erano troppo
grandi (superiore alla MTU) per determinate sotto reti. Nella versione attuale
i router non lo possono più fare, cosi da alleggerire il loro lavoro.Solo gli
Host sono in grado di frammentare e poi assembrare i pacchetti.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: Cambria;&quot;&gt;BroadCast e Multicast&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Il broadcast usato
nella versione 4 era molto costoso perche si usava tante risorse per mandare pacchetti
a un’intera rete anche quando non era necessario. In questa Versione Il
Broadcast non si usa più. Invece abbiamo il Multicast integrato e obbligatorio.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt;&quot;&gt;


&lt;span style=&quot;font-family: Cambria; font-size: medium;&quot;&gt;Configurazione StateFull o stateless&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Con informazioni sullo
stato (ad esempio da un server DHCP), IPv6 configura gli indirizzi di rete. &lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Senza Informazioni IPv6
configura lo stesso automaticamente gli indirizzi aiutandosi con i prefissi
annunciati dai router presenti nella rete.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;span class=&quot;nw&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Sicurezza &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span class=&quot;nw&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;IPv6
è stato implementato con IPSec come elemento nativo. Qualsiasi rete anche non
sicura usando IPv6 come protocollo di trasmissione può essere sicuro
dell’integrità la confidenzialità e la provenienza dei pacchetti trasmessi.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: Cambria;&quot;&gt;Qualità
del servizio&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span class=&quot;nw&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;La
qualità del servizio qui è gestita meglio con l’apparizione dei nuovi campi nell’IP
il Flow Label e Traffic Class. &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;nw&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Cosi
Si può gestire in modo appropriato ogni tipologia di traffico.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;span class=&quot;nw&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Estensibilità&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span class=&quot;nw&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;L’IPV4
usava il campo Opzione variabile per specificare gli opzioni. Ora con L’IPV6
abbiamo un’intestazione fissa che poi è seguita da una concatenazione d’intestazioni
che definiscono e impostano ciascuna un’opzione. Questo rende la dimensione
dell’intestazione dell’IPv6 fissa.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;nw&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin: 0cm 0cm 0pt; mso-layout-grid-align: none; text-align: justify;&quot;&gt;
&lt;span class=&quot;nw&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt;&quot;&gt;Un&#39;altra
vantaggio è la mobilità che garantisce &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt;&quot;&gt;la
possibilità di mantenere l&#39;indirizzo IP anche nel caso in cui&lt;/span&gt;&lt;span class=&quot;nw&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt;&quot;&gt;si cambi l&#39;interfaccia fisica di rete.&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2 style=&quot;margin: 12pt 0cm 3pt;&quot;&gt;


&lt;i&gt;&lt;span style=&quot;font-family: Cambria;&quot;&gt;IPV6 in dettaglio &lt;/span&gt;&lt;/i&gt;&lt;/h2&gt;
&lt;br /&gt;
&lt;h2 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;i&gt;&lt;span style=&quot;font-family: Cambria;&quot;&gt;&lt;span class=&quot;Titolo3Carattere&quot;&gt;&lt;span style=&quot;font-size: 13pt; line-height: 115%;&quot;&gt;Architettura&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/h2&gt;
&lt;h2 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;span style=&quot;font-family: Cambria;&quot;&gt;&lt;span class=&quot;Titolo3Carattere&quot;&gt;&lt;span style=&quot;font-size: 13pt; line-height: 115%;&quot;&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;v:shapetype coordsize=&quot;21600,21600&quot; filled=&quot;f&quot; id=&quot;_x0000_t75&quot; o:preferrelative=&quot;t&quot; o:spt=&quot;75&quot; path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; stroked=&quot;f&quot;&gt;
 &lt;v:stroke joinstyle=&quot;miter&quot;&gt;
 &lt;v:formulas&gt;
  &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;&gt;
  &lt;v:f eqn=&quot;sum @0 1 0&quot;&gt;
  &lt;v:f eqn=&quot;sum 0 0 @1&quot;&gt;
  &lt;v:f eqn=&quot;prod @2 1 2&quot;&gt;
  &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;&gt;
  &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;&gt;
  &lt;v:f eqn=&quot;sum @0 0 1&quot;&gt;
  &lt;v:f eqn=&quot;prod @6 1 2&quot;&gt;
  &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;&gt;
  &lt;v:f eqn=&quot;sum @8 21600 0&quot;&gt;
  &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;&gt;
  &lt;v:f eqn=&quot;sum @10 21600 0&quot;&gt;
 &lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:formulas&gt;
 &lt;v:path gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot; o:extrusionok=&quot;f&quot;&gt;
 &lt;o:lock aspectratio=&quot;t&quot; v:ext=&quot;edit&quot;&gt;
&lt;/o:lock&gt;&lt;/v:path&gt;&lt;/v:stroke&gt;&lt;/v:shapetype&gt;&lt;v:shape id=&quot;Immagine_x0020_1&quot; o:spid=&quot;_x0000_i1025&quot; style=&quot;height: 150pt; mso-wrap-style: square; visibility: visible; width: 481.5pt;&quot; type=&quot;#_x0000_t75&quot;&gt;
 &lt;v:imagedata o:title=&quot;&quot; src=&quot;file:///C:%5CUsers%5CWilfried%5CAppData%5CLocal%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_image001.png&quot;&gt;
&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXsAzRKbkL0BqKln8r4YpnyhqOX32J7B3IosaL8VRhjF_E8PsGif9xq3WrwmytIfmMMO74bjZIu_5x3N4OboGyi_Y8dXVxbGRatsAb97wmZvWshNrPLzuTyyJkp2TTWTrXJOULHSKjPEU/s1600/ipv6arch.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;97&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXsAzRKbkL0BqKln8r4YpnyhqOX32J7B3IosaL8VRhjF_E8PsGif9xq3WrwmytIfmMMO74bjZIu_5x3N4OboGyi_Y8dXVxbGRatsAb97wmZvWshNrPLzuTyyJkp2TTWTrXJOULHSKjPEU/s320/ipv6arch.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;span style=&quot;font-family: Cambria; font-size: medium;&quot;&gt;ICMPv6&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
ICMPv6 sostituisce ICMPv4 ed è responsabile di
fornire analisi e appuntare errori dovuti all’insuccesso nella ricezione dei
pacchetti IPv6.&lt;/div&gt;
&lt;br /&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-family: Cambria;&quot;&gt;Neighbor
Discovery (ND)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Neighbor Discovery si occupa dell’interazione fra
nodi adiacenti e include scambio di messaggi per segnalare indirizzi, scoprire
doppi indirizzi, segnalare Router e cambio di direzione. Sostituisce il
protocollo (ARP), ICMPv4 Router Discovery, e ICMPv4 Redirect message.&lt;/div&gt;
&lt;br /&gt;
&lt;h3 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;span style=&quot;font-family: Cambria; font-size: medium;&quot;&gt;Multicast Listener Discovery (MLD)&lt;/span&gt;&lt;/h3&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Multicast Listener Discovery è una serie di 3
messaggi che sostituisce IGMP (Internet Group Management Protocol) per la
gestione dell’appartenenza a una sotto rette Multicast.&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2 style=&quot;margin: 12pt 0cm 3pt; text-align: justify;&quot;&gt;


&lt;i&gt;&lt;span style=&quot;font-family: Cambria;&quot;&gt;Il pacchetto IPV6&lt;/span&gt;&lt;/i&gt;&lt;/h2&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY3MXLzNNbyXFrqhXQwCphwRnRcXQ94SFP5QcML8w79E1h0408fZJ0ycxC1IGbQIxq5t22EkySV_tz4eztNf2xjNESv04E7dEVPwuX5Dlcbu_NYBJ2JLnGKioG_1pcN2DvqD0hI36U_hw/s1600/ipv6pack.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY3MXLzNNbyXFrqhXQwCphwRnRcXQ94SFP5QcML8w79E1h0408fZJ0ycxC1IGbQIxq5t22EkySV_tz4eztNf2xjNESv04E7dEVPwuX5Dlcbu_NYBJ2JLnGKioG_1pcN2DvqD0hI36U_hw/s1600/ipv6pack.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;v:shape id=&quot;Immagine_x0020_3&quot; o:spid=&quot;_x0000_i1028&quot; style=&quot;height: 68.25pt; mso-wrap-style: square; visibility: visible; width: 177.75pt;&quot; type=&quot;#_x0000_t75&quot;&gt;
 &lt;v:imagedata o:title=&quot;&quot; src=&quot;file:///C:%5CUsers%5CWilfried%5CAppData%5CLocal%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_image003.png&quot;&gt;
&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Il pacchetto IPv6 è
composto dall’intestazione seguito di una serie di Intestazioni da estensione (opzioni)
e finalmente il carico utile.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;v:shape id=&quot;Immagine_x0020_7&quot; o:spid=&quot;_x0000_i1026&quot; style=&quot;height: 211.5pt; mso-wrap-style: square; visibility: visible; width: 481.5pt;&quot; type=&quot;#_x0000_t75&quot;&gt;
 &lt;v:imagedata o:title=&quot;&quot; src=&quot;file:///C:%5CUsers%5CWilfried%5CAppData%5CLocal%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_image007.emz&quot;&gt;
&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJq1eR6uEYdLhli5ZPWnSqMrpeZOlnU9Hi8_R7SgLCb0RxWeXQrEerxcL5p-0gPfCj9FHxhRJ5cbxoH8c7Gez42b5SZod9oD-YXT8q7lmLiUyvLjuc-M-8gJFZlwveeePzdAnkDulDGos/s1600/ipv6int.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;206&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJq1eR6uEYdLhli5ZPWnSqMrpeZOlnU9Hi8_R7SgLCb0RxWeXQrEerxcL5p-0gPfCj9FHxhRJ5cbxoH8c7Gez42b5SZod9oD-YXT8q7lmLiUyvLjuc-M-8gJFZlwveeePzdAnkDulDGos/s320/ipv6int.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Il Campo Next Header
esiste in ogni intestazione e permette quindi di avere una struttura a catena.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqPsVMJGKKLfRy9YPzWzUWKPvdxkBFI2EHb3bCT6jK93-a0uqGcggqD20cQa996s3qaGZjeetqnhy1vyt6fgrbUD-sDkhHf7CsM-2WNNX8MDD1SmB66kVnpAnOi3fIiiq_HUm46yQ1lew/s1600/ipv6nexth.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;245&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqPsVMJGKKLfRy9YPzWzUWKPvdxkBFI2EHb3bCT6jK93-a0uqGcggqD20cQa996s3qaGZjeetqnhy1vyt6fgrbUD-sDkhHf7CsM-2WNNX8MDD1SmB66kVnpAnOi3fIiiq_HUm46yQ1lew/s320/ipv6nexth.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Default&quot; style=&quot;margin: 1em 0cm; text-align: justify;&quot;&gt;
&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &#39;Times New Roman&#39;,serif;&quot;&gt;Abbiamo&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif;&quot;&gt; sei&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &#39;Times New Roman&#39;,serif;&quot;&gt; tipi&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif;&quot;&gt; di intestazione&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif;&quot;&gt;corrispondendo&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &#39;Times New Roman&#39;,serif;&quot;&gt;
a un opzione (Hop By Hop Option Header, Routing Header Fragment ,&amp;nbsp; Header,Authentication Header,Encrypted
Security Payload Header, Destination Option Header&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 16px; line-height: 18px;&quot;&gt;)&lt;/span&gt;&lt;/div&gt;
&lt;b style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Cambria;&quot;&gt;&lt;span class=&quot;Titolo3Carattere&quot;&gt;&lt;span style=&quot;font-size: 13pt; line-height: 115%;&quot;&gt;architettura indirizzamento&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;v:shape id=&quot;_x0000_i1030&quot; style=&quot;height: 220.5pt; width: 479.25pt;&quot; type=&quot;#_x0000_t75&quot;&gt;
 &lt;v:imagedata o:title=&quot;&quot; src=&quot;file:///C:%5CUsers%5CWilfried%5CAppData%5CLocal%5CTemp%5Cmsohtmlclip1%5C01%5Cclip_image011.png&quot;&gt;
&lt;/v:imagedata&gt;&lt;/v:shape&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA27uRriLDkZu4W_Fb0Y4cC1muecL3SLHI7-2XWPg2eMEO855P5E41AwXGn-nwDHfvb9HVBr7XvU0r2QVFMTljKCN7F3nIjsy-7haWvgNDhbSJLTgb9I19akaow4SXEruirGfuozmBzvk/s1600/ipv6archind.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;147&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA27uRriLDkZu4W_Fb0Y4cC1muecL3SLHI7-2XWPg2eMEO855P5E41AwXGn-nwDHfvb9HVBr7XvU0r2QVFMTljKCN7F3nIjsy-7haWvgNDhbSJLTgb9I19akaow4SXEruirGfuozmBzvk/s320/ipv6archind.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span class=&quot;Titolo3Carattere&quot;&gt;&lt;span style=&quot;font-size: 13pt; line-height: 115%;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: Cambria;&quot;&gt;formato indirizzi&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;L’indirizzo è di 128
bit. Per poterlo scrivere, usiamo 8 gruppi di 4 numeri in base esadecimale
separati da “: “.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFuaj5sQoyDyb6HQ-yInPU7Qejl4pPa0CEeVu2Ok_5XxCsnLsoo0NaH5WEhieQ5s0KHweyl2qunU1_U8Z4nbm3IOICn0M0W24Fw2gybkF3WbXbga6D01Td-TUz6jKI_7k0rOqDtD4lu1M/s1600/ipv6formind.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;96&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFuaj5sQoyDyb6HQ-yInPU7Qejl4pPa0CEeVu2Ok_5XxCsnLsoo0NaH5WEhieQ5s0KHweyl2qunU1_U8Z4nbm3IOICn0M0W24Fw2gybkF3WbXbga6D01Td-TUz6jKI_7k0rOqDtD4lu1M/s320/ipv6formind.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &#39;Times New Roman&#39;,serif; font-size: 12pt; line-height: 115%;&quot;&gt;Concludiamo quest’articolo
specificando che per rendere il processo di migrazione progressivo esistono
delle tecnologie di compatibilità fra IPv6 e IPv4 fra cui possiamo citare il
Dual Stack, il Tunelling e L’Header Translation.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;&lt;b&gt;Riferimenti&lt;/b&gt;:&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;Slide del Prof Ciminiera&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;Tesi di Laurea di Irene Bonta’ &lt;/span&gt;&lt;a href=&quot;http://www.scribd.com/doc/36853683/Il-protocollo-IPv6-e-progetto-di-una-rete-aziendale&quot;&gt;&lt;span style=&quot;color: blue; font-family: Calibri;&quot;&gt;http://www.scribd.com/doc/36853683/Il-protocollo-IPv6-e-progetto-di-una-rete-aziendale&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;WikiPedia &lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/IPv6&quot;&gt;&lt;span style=&quot;color: blue; font-family: Calibri;&quot;&gt;http://it.wikipedia.org/wiki/IPv6&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;Technet &lt;/span&gt;&lt;a href=&quot;http://technet.microsoft.com/en-us/library/cc781672%28WS.10%29.aspx&quot;&gt;&lt;span style=&quot;color: blue; font-family: Calibri;&quot;&gt;http://technet.microsoft.com/en-us/library/cc781672%28WS.10%29.aspx&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 10pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Calibri;&quot;&gt;Ipv6.com &lt;/span&gt;&lt;a href=&quot;http://ipv6.com/articles/general/ipv6-the-next-generation-internet.htm&quot;&gt;&lt;span style=&quot;color: blue; font-family: Calibri;&quot;&gt;http://ipv6.com/articles/general/ipv6-the-next-generation-internet.htm&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/706979176346040797/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2011/11/tutto-quello-che-devi-sapere-su-ipv6.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/706979176346040797'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/706979176346040797'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2011/11/tutto-quello-che-devi-sapere-su-ipv6.html' title='Tutto quello che devi sapere su IPv6'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXsAzRKbkL0BqKln8r4YpnyhqOX32J7B3IosaL8VRhjF_E8PsGif9xq3WrwmytIfmMMO74bjZIu_5x3N4OboGyi_Y8dXVxbGRatsAb97wmZvWshNrPLzuTyyJkp2TTWTrXJOULHSKjPEU/s72-c/ipv6arch.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-296812556382134218</id><published>2011-01-11T17:37:00.001+01:00</published><updated>2011-01-11T17:37:49.821+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="aloanet"/><category scheme="http://www.blogger.com/atom/ns#" term="aloha"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><title type='text'>Il Protocollo Alohanet</title><content type='html'>&lt;div style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;ALOHA è un protocollo di rete del livello MAC che gestisce l&#39;accesso al mezzo trasmissivo in modalità casuale per connessioni broadcast.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;E stato sviluppato negli anni settanta nelle università Hawaii per collegare le facoltà sparse in diverse isole.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In questo articolo,vedremmo come funziona il protocollo Alohanet originale e poi quello Slotted sviluppato in seguito.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h1 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Funzionamento di Alohanet &lt;/span&gt; &lt;/h1&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;La filosofia del protocollo è il seguente:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-se hai da trasmettere dati,trasmettili e poi ascolta per un eventuale conferma di successo o insuccesso del trasferimento. Dopo un certo tempo di attesa ,se non ricevi una conferma di ricezione dell&#39;informazione che hai trasmesso in precedenza,ritrasmettilo.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-se c&#39;è una collisione (più stazioni trasmettono contemporaneamente),ritrasmetti dopo un  tempo casuale.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Si capisce che una stazione trasmette appena ne ha la necessita indipendentemente da falto che un&#39;altra stazione sta già trasmettendo o meno. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Per evitare che una collisione si ripeta più volte, il tempo di attesa prima della ritrasmissione deve essere diverso per ogni stazione coinvolta nella collisione. Per fare questo si usa il metodo di Back-off secondo il quale il tempo di attesa prima della ritrasmissione viene scelto casualmente fra 0 e (K-1)T dove T è il tempo totale di trasmissione dell&#39;informazione e K puo dipendere dal numero di collisione già avvenute.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Ora vediamo com&#39;è stato migliorato alohanet in aloha slotted.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h1 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Funzionamento del protocollo Aloha Slotted&lt;/h1&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Questo protocollo funziona come prima eccetto l&#39;aggiunta di due vincoli:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-il tempo viene diviso in unita discrete chiamate slot.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-ogni stazione ha l&#39;obbligo di trasmettere sollo all&#39;inizio di un slot.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Quindi se una stazione è pronta a trasmettere ,deve comunque aspettare l&#39;inizio di un slot prima di trasmettere.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Il vantaggio è che due stazione possono collidere solo all&#39;interno di slot. Lo svantaggio qui è che il protocollo deve prevedere un meccanismo di sincronizzazione per indicare ad ogni stazione quando possono trasmettere.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt; &lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Terminiamo l&#39;articolo con un confronto di efficienza. Il protocollo Alohanet originario ha un efficienza di 18,4% e nella versione migliorata Aloha slotted ha un efficienza pari a 36,8%&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Grazie per l&#39;attenzione&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 0.64cm; margin-top: 0.17cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;b&gt;Riferimenti e approfondimenti:&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Articolo Aloha su Wikipedia. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/296812556382134218/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2011/01/il-protocollo-alohanet.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/296812556382134218'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/296812556382134218'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2011/01/il-protocollo-alohanet.html' title='Il Protocollo Alohanet'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-2642081499696829555</id><published>2011-01-11T17:36:00.000+01:00</published><updated>2011-01-11T17:36:53.618+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DQDB"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><title type='text'>Tutto quello che devi sapere su DQDB</title><content type='html'>&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;una rete DQDB(Distributed-Queue Dual-Bus) è una rete del livello collegamento ad accesso multiplo che usa un doppio bus e una coda distribuita fornendo acceso alle reti locali o metropolitane.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;DBDQ è definito nello standard 802.6 e  fornisce fra l&#39;altro servizi di comunicazione a traffico isocrono come la voce per esempio.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In questo articolo vedremmo in dettaglio la topologia di una rete DQDB, come funziona e analizzeremmo la sua trama.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h1 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Topologia&lt;/span&gt;&lt;/h1&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;DQDB è formato da due code in parallelo che attraversano I nodi. Ogni bus ha un punto di inizio &lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span lang=&quot;it-IT&quot;&gt;flusso&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt; e un punto di fine flusso. DQDB si puo usare con 2 configurazioni :&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;span lang=&quot;en-US&quot;&gt;bus &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span lang=&quot;it-IT&quot;&gt;aperto&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;             &lt;/span&gt; &lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5EF9-vwm2hk1sghsRh_BJ63Z9MjT5RXKTi1NU7YcnW_puIKgrNFhyphenhyphen8-zINdszxoUPdZOjH7rBls2lM5uwS5jJa89Yad3btos0sXs2BknIcdfe0sCWGyq3hToLVoM9Lz2ihjSXZI8PWhQ/s1600/DQDB+open+bus.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;227&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5EF9-vwm2hk1sghsRh_BJ63Z9MjT5RXKTi1NU7YcnW_puIKgrNFhyphenhyphen8-zINdszxoUPdZOjH7rBls2lM5uwS5jJa89Yad3btos0sXs2BknIcdfe0sCWGyq3hToLVoM9Lz2ihjSXZI8PWhQ/s640/DQDB+open+bus.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;            &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;In questo &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span lang=&quot;it-IT&quot;&gt;caso&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt;, se c&#39;è guasto fisico di una connessione, la rete viene &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span lang=&quot;it-IT&quot;&gt;riconfigurata&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span lang=&quot;en-US&quot;&gt; come due sotto reti diverse.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 align=&quot;CENTER&quot; class=&quot;western&quot; lang=&quot;en-US&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt; bus chiuso ad anello&lt;/span&gt;&lt;/h2&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;               &lt;/span&gt; &lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_GZESgMjHOKjmsK2JzsWpQqcHFXsuTigr2wshxjtP-UIweAw-pep8zLzWYfl0AzQNHoNSBzfaqrlIMVnrlH74Kp6NPxxiBo5-i1p7LD5fU2sBQr43vZsBIbTCgxPdUH7Hyf3NzBCh9FE/s1600/DQDB+ring.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;452&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_GZESgMjHOKjmsK2JzsWpQqcHFXsuTigr2wshxjtP-UIweAw-pep8zLzWYfl0AzQNHoNSBzfaqrlIMVnrlH74Kp6NPxxiBo5-i1p7LD5fU2sBQr43vZsBIbTCgxPdUH7Hyf3NzBCh9FE/s640/DQDB+ring.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;            &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In questo caso I punti di inizio e fine flusso della configurazione precedente sono collegati. In caso di guasto fisico  di una connessione ,la rete si riconfigura come una rete a doppio bus aperto&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h1 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Funzionamento&lt;/span&gt;&lt;/h1&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Il primo bus A  è usato per trasmettere I dati  e il secondo B per prenotare l&#39;accesso e poter mandare I dati.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Se una trama è occupata nessun altro nodo lo puo usare. Se un nodo vuole trasmettere sul Bus A ,deve prenotare su una  trama del BUS B il che notifica agli altro nodi che una prenotazione è stata fatta.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Ogni nodo ha due contatori :&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;.-&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;RC: Request Counter&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;  che tiene traccia del numero di prenotazioni.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;-&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;CD: Count Down&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;  Tiene traccia del numero di prenotazioni che ci sono prima della trasmissione di un segmento del nodo corrente.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Il Request Conuter incrementa ogni volta che c&#39;è una nuova prenotazione sul Bus B e decrementa ogni volta che una trama vuota esce dal bus A.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Quando un nodo vuole trasmettere  deve :&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;  &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;mettere il segmento da trasferire  nella coda di accesso del bus A;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;  &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;impostare una richiesta di accesso  sul  bus B;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;  &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;copiare il valore corrente del  contatore RC nel contatore CD ;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;  &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;azzerare il contatore RC e  ricomincia a contare le richieste di accesso successive;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;  &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;contare le trame libere che  transitano sul bus A ed al passaggio di ognuno di questi decrementa  il contatore CD. Quando il contatore CD arriva a zero il segmento  può essere trasferito;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;impostare  il bit di busy , al passaggio della prima trama, per indicare che  è&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;stata  utilizzata e trasferire il segmento che era in coda.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 100%; margin-bottom: 0cm; margin-top: 0.49cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In riassunto, un nodo deve aspettare I nodi che hanno prenotato la trama prima della sua prenotazione,solo a questo punto potra trasmettere.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h1 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Trama DQDB&lt;/span&gt;&lt;/h1&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgi0yTeRBXHBiGjPNNYWBRJjo3836b2MZNwRWUJEFP8l6RGUBSrBe9BWhaEQfuCeg1Y_3jYrOb0Nq2tpoQJFPkZJPe_mvH1cyxOR91IAaViENqStM7jsxrJFexHyn1NFyDcSCsrRs2k04/s1600/Trama+DQDB.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;292&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgi0yTeRBXHBiGjPNNYWBRJjo3836b2MZNwRWUJEFP8l6RGUBSrBe9BWhaEQfuCeg1Y_3jYrOb0Nq2tpoQJFPkZJPe_mvH1cyxOR91IAaViENqStM7jsxrJFexHyn1NFyDcSCsrRs2k04/s640/Trama+DQDB.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 100%; margin-bottom: 0cm; margin-top: 0.49cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 100%; margin-bottom: 0cm; margin-top: 0.49cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Ogni trama  ha un bit Busy  e un insieme di bit Request. L&#39;uno serve a scpecificare se la trama è libera (Busy bit = 0) o se sta trasportando un messaggio (Busy bit = 1) e l&#39;altro serve a prenotare la trama.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 100%; margin-bottom: 0cm; margin-top: 0.49cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Il segmento è suddiviso in due ulteriori campi:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;- il &lt;i&gt;segment header &lt;/i&gt;contiene le informazioni relative al payload e al tipo di connessione;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-weight: medium; margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;- il &lt;i&gt;segment payload &lt;/i&gt;è il campo dati, lungo 48 ottetti.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 100%; margin-bottom: 0cm; margin-top: 0.49cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Concludiamo dicendo che la trama di una rete DQDB è molto simile a qualla della cella ATM (ogetto di un articolo che farò fra un po di giorni)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 100%; margin-bottom: 0cm; margin-top: 0.49cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Grazie per l&#39;attenzione.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;line-height: 100%; margin-bottom: 0cm; margin-top: 0.49cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;u&gt;&lt;b&gt;Riferimenti e Approfondimenti:&lt;/b&gt;&lt;/u&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 100%; margin-bottom: 0cm; margin-top: 0.49cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Articolo sul DQDB su Wikipedia&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 100%; margin-bottom: 0cm; margin-top: 0.49cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Articoli su internet :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Laboratorio nislab della boston university nislab.bu.edu&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div lang=&quot;en-US&quot; style=&quot;font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;javvin.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/2642081499696829555/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2011/01/tutto-quello-che-devi-sapere-su-dqdb.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/2642081499696829555'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/2642081499696829555'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2011/01/tutto-quello-che-devi-sapere-su-dqdb.html' title='Tutto quello che devi sapere su DQDB'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5EF9-vwm2hk1sghsRh_BJ63Z9MjT5RXKTi1NU7YcnW_puIKgrNFhyphenhyphen8-zINdszxoUPdZOjH7rBls2lM5uwS5jJa89Yad3btos0sXs2BknIcdfe0sCWGyq3hToLVoM9Lz2ihjSXZI8PWhQ/s72-c/DQDB+open+bus.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-8246327366985635216</id><published>2011-01-11T17:32:00.000+01:00</published><updated>2011-01-11T17:32:55.661+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="token ring"/><title type='text'>Tutto quello che devi sapere sulle reti Token Ring</title><content type='html'>&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Una rete Token Ring è una rete di livello collegamento che implementa le specifiche descritte nell&#39;802.5 .&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Si tratta in particolare i una rete ad anello in cui l&#39;ascesso al canale trasmissivo è determinato dal passaggio di un gettone chiamato Token.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Esseno di livello collegamento ,si capisce che la topologia ad anello della token ring è una topologia logica e quindi fisicamente i terminali non sono per forza organizzati in questo modo.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvrL8fzuB8DXPK4VcrHisfArkOwTCBOb5CEFge4CNNG695LF9-Bc9ngIaDbWeFLye401s0GEyfSrJG218_tOYkQRZ-GgyxiJEsORTmehNhV4Pfzoj_aS3-SDNjLnkCPMYQmKZZBpIo3pA/s1600/Token+Ring+gettone.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;295&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvrL8fzuB8DXPK4VcrHisfArkOwTCBOb5CEFge4CNNG695LF9-Bc9ngIaDbWeFLye401s0GEyfSrJG218_tOYkQRZ-GgyxiJEsORTmehNhV4Pfzoj_aS3-SDNjLnkCPMYQmKZZBpIo3pA/s320/Token+Ring+gettone.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In questo articolo vedremo come funziona una rete token Ring e analizzeremo il formatto di un messaggio Token Ring(trama).&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h1 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Funzionamento&lt;/h1&gt;&lt;ol&gt;&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Sistema di manutenzione autonomo&lt;/h2&gt;&lt;ol&gt;&lt;ol&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;All&#39;inizializzazione i una rete Token ring,c&#39;è  una competizione per determinare quale Terminale della rete giocherà il ruolo di Monitor. Vince chi l&#39;indirizzo Mac più alto. A questo punto, il Monitor avrà come compiti quelli di :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;ogni  7 secondi monitorare la rete alla ricerca di qualsiasi guasto o  perdita del gettone.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;rigenerare  un nuovo gettone in caso di perdita o di gettone orfani (senza  mittente).&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;eliminare  un terminale se questo qui crea problemi nella rete.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;ripristinare  la rete in caso di guasto generale o globale.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Sistema di trasmissione di dati&lt;/h2&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Un gettone o Token è una trama di bit che puo essere riempito dai terminali della rete. Il gettone della rete Token Ring fa il giro  passando da un terminale all&#39;altro. I scenari di funzionamento sono questi:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ol&gt;&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Se  è libero ,un terminale che vuole tramettere deve aspettare il  suo arrivo e poi mettere il segnale occupato e riempire la trama del  suo messaggio e dell&#39;indirizzo Mac del destinatario.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;se  il gettone non è libero, il terminale che lo riceve deve :&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;verificare  se Mac destinatario è suo. Se è cosi legge il  messaggio e manda una conferma al terminale sorgente riempendo la  parte acknowledgment della trama. Se il Mac non è suo ,può  passare il gettone al suo vicino.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;prenotare  il gettone sul bit apposito della trama se vuole trasmettere. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ol&gt;&lt;li value=&quot;1&quot;&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Se  il gettone si libera di nuovo. Le prenotazioni fate in precedenza  diventano delle priorità. Chi ha una priorità alta  cioè (ha prenotato lui per primo) potra avere accesso al  getto al prossimo passaggio.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;E importante notare che il Token funziona in due modi :&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ol&gt;&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Token  token quando è libero e gira per la rete.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Token  dati quando è riempito o da un messaggio o da una conferma  ricezione di messaggio (ACK)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h1 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;La trama della rete Token Ring&lt;/h1&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiyK8PFIMxpCPVZWLeuZAOQyNoAlFvJ-uVsEHpZBx-3BfVsffgtcOisELx7bsOlM0G1djQEN0yCysyxAF9DKRFz_LwsiaiPeB-BsbB5b0tRJU-u5btaOQlyD8nFBSNcXL2JjojkbAU_Mo/s1600/Trama+token+Ring.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;156&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiyK8PFIMxpCPVZWLeuZAOQyNoAlFvJ-uVsEHpZBx-3BfVsffgtcOisELx7bsOlM0G1djQEN0yCysyxAF9DKRFz_LwsiaiPeB-BsbB5b0tRJU-u5btaOQlyD8nFBSNcXL2JjojkbAU_Mo/s640/Trama+token+Ring.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;La trama del Token Ring è formata da 24 bit. In dettaglio è formata da:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 1. &lt;b&gt;Start Delimiter&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Formato da 8 bit e serve per separare il resto del frame.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;div style=&quot;line-height: 0.64cm; margin-bottom: 0.04cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;       &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;2.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Access  Control&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;  (formato a sua volta dall&#39;Access Control e anche dal Frame Control,  dal Destination Address, dal Source Address, dal Data e dal &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Frame_Check_Sequence&quot;&gt;&lt;span style=&quot;color: #0645ad;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;u&gt;Frame  Check Sequence&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;line-height: 0.64cm; margin-bottom: 0.49cm; margin-top: 0.49cm;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Il campo  Priority Bit rappresenta  il bit di priorità usato da una  stazione che vuole trasmettere ma che vede che il token è di  tipo dati e non di tipo token. A questo punto prenota solo se la  priorità che si vuole imporre è maggiore di quella già  presente;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;line-height: 0.64cm; margin-bottom: 0.49cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Il  campo Type è usato per sapere se il token è di tipo  dati o tipo token;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;line-height: 0.64cm; margin-bottom: 0.49cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Il  campo Monitor è usato dalla stazione monitor per vedere se il  frame è orfano (ossia senza mittente e/o destinatario);&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;line-height: 0.64cm; margin-bottom: 0.49cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Il  campo Reservation Bit è il bit necessario per trasmettere. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;  &lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;div style=&quot;line-height: 0.64cm; margin-bottom: 0.49cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;             &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;3.&lt;/span&gt; Ending  Delimiter&lt;span style=&quot;color: black;&quot;&gt; (formato a sua volta, oltre che  dall&#39;Ending Delimiter, anche dal Frame Status).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/ul&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Segue lo schema JK1JK1IE, dove  l&#39;Intermediate Bit, indica se è finita la trasmissione della trama o meno, e l&#39;Error Bit indica gli errori nella trama.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Concludiamo l&#39;articolo con un confronto della Token Ring  con Ethernet.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-Mentre Ethernet ha una rete flessibile in cui la rimossione o l&#39;aggiunta di un Terminale alla rete non crea nessun tipo di problema, in una rete Token Ring ,la rete è rigida e rimuovere o aggiungere un Terminale richiede una nuova inizializzazione della rete.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-Mentre Ethernet funzionava efficientemente in un scenario di traffico scarso per poca probabilità di collisione ,nel Token Ring un terminale che vuole trasmettere deve comunque aspettare l&#39;arrivo del gettone anche se il canale è libero per scarsità di traffico.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-In un scenario di traffico intenso in Ethernet la probabilità di collisione aumenta e quindi garantire l&#39;arrivo di un messaggio in un dato tempo non è possibile. Mentre nel Token Ring con l&#39;uso delle prenotazioni e delle priorità , c&#39;è la garanzia di invio di messaggi entro un dato tempo.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Grazie per l&#39;attenzione.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;i&gt;&lt;u&gt;&lt;b&gt;Riferimenti e approfondimenti:&lt;/b&gt;&lt;/u&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Articolo Token Ring su Wikipedia &lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Articoli sul Token Ring nella rete (trovate con Google)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #000000; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.04cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Appunti di sistemi informatici &lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol&gt;&lt;ol&gt;&lt;ol start=&quot;3&quot;&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;/span&gt;    &lt;/div&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;/span&gt; &lt;/div&gt;&lt;ol&gt;&lt;ol start=&quot;2&quot;&gt;&lt;/ol&gt;&lt;/ol&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/8246327366985635216/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2011/01/tutto-quello-che-devi-sapere-sulle-reti.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/8246327366985635216'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/8246327366985635216'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2011/01/tutto-quello-che-devi-sapere-sulle-reti.html' title='Tutto quello che devi sapere sulle reti Token Ring'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvrL8fzuB8DXPK4VcrHisfArkOwTCBOb5CEFge4CNNG695LF9-Bc9ngIaDbWeFLye401s0GEyfSrJG218_tOYkQRZ-GgyxiJEsORTmehNhV4Pfzoj_aS3-SDNjLnkCPMYQmKZZBpIo3pA/s72-c/Token+Ring+gettone.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-4654137271739773753</id><published>2011-01-10T19:05:00.000+01:00</published><updated>2011-01-11T17:43:07.718+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="instradamento"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="routing"/><title type='text'>Tutto quello che devi sapere sul routing</title><content type='html'>&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Tutto quello che devi sapere sul routing&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Quando un terminale A manda un pacchetto a un terminale B,questo pacchetto attraverso tanti router nella rete. Come fa ogni router che riceve il pacchetto a determinare qual&#39;è il prossimo router più vicino al terminale B ? Questa domanda pone in modo molto semplice il problema del routing.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWKPuFbh7BYy-YBWQpXgruafVqRRvAOHXBZG3p4uhPulQ-raGVTiPsM8Hr5oCiaRlYNaqDCRzSh6zDUaxiVJ-uasMjQf4niYPLA52qubNVw9u1YNZRw6QAN5p5DTko7gg1mS3XH6xmHg/s1600/Routing+PB.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWKPuFbh7BYy-YBWQpXgruafVqRRvAOHXBZG3p4uhPulQ-raGVTiPsM8Hr5oCiaRlYNaqDCRzSh6zDUaxiVJ-uasMjQf4niYPLA52qubNVw9u1YNZRw6QAN5p5DTko7gg1mS3XH6xmHg/s320/Routing+PB.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Prima di andare nello specifico,vediamo cosa fa il router. Il router&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Elabora l’indirizzo dei pacchetti IP e determina la subnet in cui si trova l’host&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;di destinazione.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ol&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;se  l’host di destinazione si trova in una delle subnets a cui il  router `e&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;direttamente  connesso affida il pacchetto alla subnet per la consegna;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;altrimenti  determina il router successivo verso cui instradare il pacchetto.  L&#39;obbiettivo è di determinare il percorso migliore per ogni  terminale possibile.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;/div&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Il routing è composto da due elementi:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ol&gt;&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Un  protocollo di routing per costruire la Routing Table. Viene eseguito  periodicamente a prescindere dai pacchetti dati.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Un  algoritmo di switching, che si applica ad ogni pacchetto in  transito.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;/div&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Una routing table è una tabella che permette di determinare dove mandare il pacchetto analizzando il suo indirizzo ip di destinazione.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;In questo articolo,vedremmo gli algoritmi di routing con i protocolli che gli implementano.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;h1 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Algoritmi di routing&lt;/h1&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;h2 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Distance Vector:&lt;/h2&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;Questo algoritmo locale e dinamico è un implementazione di BellMan Ford distribuita.  Ogni router mantiene una tabella che dice dove mandare un pacchetto diretto verso uno specifico router e quanto costa questo trasferimento. Quindi la tabella da tre informazioni: destinazione,costo e prossima fermata. Per avere queste informazioni su tutte le destinazioni della rete,&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;Ogni router misura la &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Distanza_(matematica)&quot;&gt;distanza&lt;/a&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Distanza_(matematica)&quot;&gt; o costo &lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;(secondo una metrica che può includere vari fattori) che lo separa dai nodi adiacenti e riceve la stessa informazione dai nodi vicini .Utilizzando l&#39;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Algoritmo_di_Bellman-Ford&quot;&gt;algoritmo di Bellman-Ford  con i suoi dati e quelli dei nodi adiacenti&lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;, il router costruisce una tabella che associa ad ogni destinazione conosciuta: la stima della distanza che lo separa dalla destinazione e &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;il primo passo del percorso calcolato.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;Periodicamente ogni router manda un aggiornamento ai suoi vicini. Un aggiornamento è una lista di coppie (destinazione,distanza) cioè tutta la tabella di routing. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;table border=&quot;1&quot; bordercolor=&quot;#c0c0c0&quot; cellpadding=&quot;5&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;   &lt;td bgcolor=&quot;#f7f8ff&quot; width=&quot;100%&quot;&gt;    &lt;div align=&quot;CENTER&quot; style=&quot;font-style: normal; font-weight: medium; text-decoration: none;&quot;&gt;    &lt;br /&gt;
&lt;/div&gt;&lt;/td&gt;  &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Il problema con quest&#39;algoritmo resta la formazione di cicli all&#39;interno dei percorsi calcolati. Ci sono varie alternative per evitare la formazione di cicli. Per esempio Split Horizon che segue questa regola:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Quando mandi un aggiornamento al router A,non specificare le destinazioni che raggiungi tramite A.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Un altro svantaggio è la propagazione di un informazione errata attraverso la rete nel caso di un malfunzionamento di un router per esempio.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h2 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Link State&lt;/h2&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;Questo è un algoritmo basato sullo stato dei collegamenti della rete che implementa al suo interno &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Dijkstra&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;La strategia usata è quella di mandare dei messaggi a tutti i router (non solo i vicini). I messaggi tratta solo di informazioni sui collegamenti diretti(non di tutta la tabella di routing).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;I messaggi sono chiamati Link state Packet e sono composti di un ID (indentifica il nodo che manda il pacchetto),il costo del collegamento a tutti i nodi direttamente connessi a lui,un numero di sequenza e un Time-To-Live (durata di vita del pacchetto).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Il numero di sequenza serve a sapere se un pacchetto è recente o meno rispetto a pacchetti ricevuti in precedenza.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Ogni nodo memorizza i pacchetti ricevuti e costruisce una mappa completa e aggiornata della rete: il Link State Database.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt; &lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;A questo punto ogni router usando l&#39;algoritmo &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Dijkstra&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt; single shortest Path sugli informazioni ottenuti dagli altri nodi calcola il percorso a più basso costo partendo da se stesso.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Quindi in questo caso la topologia dell&#39;intera rete è conosciuta.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;È possibile costruire la tabella di routing di un nodo memorizzando per ciascuna destinazione il nodo successivo sul cammino a costo minimo.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Vantaggi e svantaggi&lt;/h3&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;L&#39;utilizzo di un algoritmo di routing Link State, presenta diversi vantaggi:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.49cm; margin-top: 0.49cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;può  gestire reti composte da un gran numero di nodi;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.49cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;converge  rapidamente al cammino minimo;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.49cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;difficilmente  genera cammini ciclici;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.49cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;è  facile da comprendere poiché ogni nodo ha la mappa della  rete;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; line-height: 0.64cm; margin-top: 0.17cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Il principale svantaggio di un algoritmo Link State è la complessità di realizzazione, anche dovuta alla notevole capacità di memoria ed elaborazione richiesti.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Ora vediamo i protocolli di routing.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h1 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Protocolli di routing.&lt;/h1&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Ci sono 2 grande categorie di routing che hanno a che vedere con l&#39;organizzazione delle reti di internet:Interior Gateway Protocol e Exterior Gateway protocol. Internet è fatta di più sotto reti(AS:autonomous System) connesse fra loro.  Interior Gateway Protocol raggruppa l&#39;insieme dei protocolli che si occupa del routing interno a un AS.  Exterior Gateway protocol si occupa del routing esterno ad un AS cioè fra due router di bordo .&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifo-NonTreFkkQBh2xQX0P5Y7l9rIWfAhq6H4WCYuazWLkzDfazHUt8qBG48mk3iaAlwQo3aVGHJl4RB6-WhzEMdB_7nx361u72RAZ1d14h_y2fjurbD9-tMfkYfQTEwFF5hwQszl6XX0/s1600/internet+routing.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;348&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifo-NonTreFkkQBh2xQX0P5Y7l9rIWfAhq6H4WCYuazWLkzDfazHUt8qBG48mk3iaAlwQo3aVGHJl4RB6-WhzEMdB_7nx361u72RAZ1d14h_y2fjurbD9-tMfkYfQTEwFF5hwQszl6XX0/s640/internet+routing.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h2 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;Interior Gateway Protocol&lt;/h2&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;h3 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;RIP(routing information protocol)&lt;/h3&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;LTR&quot; id=&quot;content&quot;&gt;  &lt;div dir=&quot;LTR&quot; id=&quot;bodyContent&quot;&gt;   &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;Il   Routing Information Protocol (RIP) è molto usato su reti   locali ed aiuta i &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Router&quot;&gt;router&lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;   ad adattarsi dinamicamente ai cambiamenti dei collegamenti di rete,   scambiandosi informazioni riguardo a quali reti possono raggiungere   e quanto siano lontane. Il RIP è un&#39;implementazione del   Distance Vector che impiega il conteggio dei numeri di passi (hop   count) come metrica di routing. Il massimo numero di hop permessi è   15. Ogni router RIP trasmette di default, ogni 30 secondi, la   propria tabella completa di routing a tutti i vicini direttamente   collegati, generando grandi quantità di traffico di rete.   Opzionalmente può utilizzare un meccanismo di ottimizzazione   denominato &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Split_horizon&quot;&gt;split   horizon.&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;font-style: normal; font-weight: medium; text-decoration: none;&quot;&gt;   &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;E da   notare che il basso numero di hop impone un limite alla grandezza   della rete. D&#39;altra parte, è molto facile da configurare.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;h3 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;OSPF(open shortest path first)&lt;/h3&gt;&lt;div style=&quot;border-bottom: 1px solid #c0c0c0; border-left: none; border-right: none; border-top: none; font-style: normal; font-weight: medium; line-height: 0.64cm; margin-bottom: 0.25cm; padding-bottom: 0.07cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;Il protocollo Open Shortest Path First(OSPF) è un protocollo, che gestisce le tabelle di routing in una rete con il metodo del &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Link_State&quot;&gt;Link State&lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;. Questo &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Standard&quot;&gt;standard &lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;è open (aperto) nel senso che è un protocollo non proprietario. Il protocollo utilizza un metodo di instradamento che non si differenzia sostanzialmente dal &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Link_State&quot;&gt;Link State&lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;, ma aggiunge delle altre proprietà:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Autenticazione&quot;&gt;Autenticazione &lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;dei &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Messaggio&quot;&gt;messaggi, &lt;/a&gt;&lt;a href=&quot;http://it.wikipedia.org/w/index.php?title=Bilanciamento_del_carico&amp;amp;action=edit&amp;amp;redlink=1&quot;&gt;Bilanciamento del carico,e &lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;Aggiunta di un ulteriore grado di &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Gerarchia&quot;&gt;gerarchia &lt;/a&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;nei &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Dominio&quot;&gt;domini.&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Dominio&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;b&gt;Inizializzazione del protocollo:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; margin-left: 1.27cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;ul&gt;&lt;li value=&quot;1&quot;&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Inizializzazione  e controllo (attraverso livelli inferiori) del funzionamento delle  interfacce&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Si  inviano pacchetti Hello in broadcast per acquisire le informazioni  sui router vicini&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;  &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Si  ricevono i pacchetti Hello dei vicini&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Dominio&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;I   pacchetti Hello vengono anche usati per testare il funzionamento di   link (keep alive)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div align=&quot;CENTER&quot; style=&quot;line-height: 0.64cm; margin-top: 0.17cm;&quot;&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Dominio&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;b&gt;Funzionamento del protocollo:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;ul&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;   &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;i   router&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;    &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;formano    i Link State Advertisement (LSA) che contengono una lista delle    reti adiacenti con i relativi costi di raggiungimento&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;    &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;gli    LSA sono trasmessi a tutti gli altri router&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt;   &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;tutti   i router della rete hanno lo stesso insieme di dati e quindi   possono costruire lo stesso grafo pesato della rete&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Dominio&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;il   grafo di rete è utilizzato per determinare i cammini ottimi   e quindi l’instradamento&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/ul&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2 align=&quot;CENTER&quot; class=&quot;western&quot;&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Dominio&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;b&gt;Exterior Gateway Protocol&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/h2&gt;&lt;div align=&quot;CENTER&quot; style=&quot;font-style: normal; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Dominio&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;b&gt;Border Gateway Protocol&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;CENTER&quot; style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Dominio&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;&lt;span style=&quot;text-decoration: none;&quot;&gt;&lt;span style=&quot;font-weight: medium;&quot;&gt;Per stabilire una route i router BGP si scambiano informazioni riguardanti la&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;raggiungibilità di una rete e una serie di attributi relativi al link (o ai link) tra i&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;due AS coinvolti:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Weight&lt;/b&gt; (prop. Cisco)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;E’ un attributo locale (interno ad un router).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Non `e propagato (advertised).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;In caso di multipath, viene preferita la route con maggior weight.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Local preference&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;E’ usato per scegliere la strada di uscita preferita tra due o più router.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;In caso di multi-route, viene preferita la route con maggior peso.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Multi-exit discriminator (MED) o metric attribute&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;MED&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;E’ usato per suggerire la strada di ingresso preferita tra due o pi `u router.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;In caso di multi-route, viene preferita la route con minor peso.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Origin&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;E’ usato per classificare il modo in cui BGP ha appreso una route.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Le route sono divise in:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;IGP - la route e generata da un protocollo IGP ed `e interna all’AS che la&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;propaga&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;EGP - la route e stata appresa attraverso un protocollo EGP &lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Incomplete - la route e di origine sconosciuta o appresa tramite altra via&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;La classificazione `e usata per la scelta della tabella di routing, ovviamente&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;preferendo le prime alle altre: IGP &amp;gt;EGP &amp;gt;Incomplete&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;AS path&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;usato per determinare i loop:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Ogni router traversato viene aggiunto ad una lista ordinata.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Vengono scartate tutte le routes che contengano loops.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Next hop&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;usato per indicare il next hop (numero IP del router che fa&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;l’advertising)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-style: normal; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Community&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;E’ usato per raggruppare destinazioni (comunità) per le quali le decisioni di&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;LEFT&quot; style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;routing debbano subire speciali trattamenti.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Per definire le comunità si usano Route maps.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Terminiamo l&#39;articolo dicendo che il RIP è un protocollo molto usato ma è spesso sostituito dal OSPF soprattutto per reti molto grandi.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Grazie per l&#39;attenzione&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;em&gt;&lt;u&gt;Riferimenti e approfondimenti:&lt;/u&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Slide del Professore Peccorella dell&#39;università degli studi di Firenze&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-style: normal; font-weight: medium; margin-bottom: 0cm; text-decoration: none;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Andalus&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Articoli presi su internet: Wikipedia&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/4654137271739773753/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2011/01/tutto-quello-che-devi-sapere-sul.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/4654137271739773753'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/4654137271739773753'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2011/01/tutto-quello-che-devi-sapere-sul.html' title='Tutto quello che devi sapere sul routing'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWKPuFbh7BYy-YBWQpXgruafVqRRvAOHXBZG3p4uhPulQ-raGVTiPsM8Hr5oCiaRlYNaqDCRzSh6zDUaxiVJ-uasMjQf4niYPLA52qubNVw9u1YNZRw6QAN5p5DTko7gg1mS3XH6xmHg/s72-c/Routing+PB.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-5039411709363618631</id><published>2011-01-04T02:53:00.000+01:00</published><updated>2011-01-04T02:57:51.765+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="commutazione a circuito virtuale"/><category scheme="http://www.blogger.com/atom/ns#" term="commutazione a datagram"/><category scheme="http://www.blogger.com/atom/ns#" term="commutazione a messaggio"/><category scheme="http://www.blogger.com/atom/ns#" term="commutazione a pacchetto"/><category scheme="http://www.blogger.com/atom/ns#" term="modalità di commutazione"/><category scheme="http://www.blogger.com/atom/ns#" term="rete di commutazione"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><title type='text'>Modalità di commutazione dell&#39;informazione</title><content type='html'>&lt;h1 class=&quot;western&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif; font-size: small; font-weight: normal;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/h1&gt;&lt;h1 class=&quot;western&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif; font-size: small; font-weight: normal;&quot;&gt;Nelle grande reti come internet,ci sono più sotto reti che sono connesse fra di loro con degli switch (apparecchiatura di rete capace di gestire la comunicazione tra qualsiasi due nodi terminali). Queste reti si chiamano reti a commutazione.&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In questo articolo analizzeremo 3 modalità di commutazione:circuito,pacchetto e messaggio.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2 class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1 Commutazione a pacchetto&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3 class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Funzionamento:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Per  comunicare un terminale deve chiedere una connessione.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Gli switch della rete riservano dei canali di comunicazione creando cosi un circuito. Il terminale sorgente manda i dati che usufruiranno il circuito  creato appositamente. Dopo di che si chiude la comunicazione alla fine del trasferimento cosi i canali riservati in precedenza sono liberati.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3 class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Struttura:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Nella commutazione a pacchetto ci sono 3 fasi:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-setup Fase in cui si ricerca il percorso migliore fra sorgente A e destinazione B (End-to-End)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-Utilizzo Fase durante la quale il messaggio è mandato da A a B. Il collegamento è mantenuto e controllato&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;-Reset o Fine Utilizzo è la fase in cui il collegamento viene chiuso.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiup-NRpAzSbufWtWBa3ONmr0zt_lnMeMmYjkCjzoCdX7eIUBIYGDymTrAbFj7xCwHSCF72_xiSM2TtC7r-oVPyP2Ci9AB2s2nZ7c6Om7VRSJxQVrumnOoj2bEo9clJcwFcplfEj2aoftA/s1600/Commutazione+di+circuito.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiup-NRpAzSbufWtWBa3ONmr0zt_lnMeMmYjkCjzoCdX7eIUBIYGDymTrAbFj7xCwHSCF72_xiSM2TtC7r-oVPyP2Ci9AB2s2nZ7c6Om7VRSJxQVrumnOoj2bEo9clJcwFcplfEj2aoftA/s400/Commutazione+di+circuito.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;I diversi ritardi sono creati dal tempo di setup  e di chiusura più il tempo dell&#39;attesa dell&#39;arrivo dei dati.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Questa modalità è usata quando la richiesta di connessione è frequente e la fase di utilizzo dura di più rispetto alle altre.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Lo svantaggio è che non c&#39;è nessun punto di salvataggio nei nodi intermedi.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3 class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Applicazione&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;La rete telefonica nello strato fisico usa la commutazione a circuito. Basta pensare alla modalità di comunicazione. L&#39;utente A chiama (setup) quando i due utenti sono collegati &lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;si possono mandare messaggi vocali (Fase utilizzo) e alla fine si riagganciare (Chiusura)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXctkV8yivWfODWp0WAbedbpztH7t6GqYsG5pAbkp8ydaMk-KKaCsZ2X_dJbCO4u71a3b6gLJ4dCTe3vMK6L2emU3LtKhyphenhyphen1tMMB_dSLQ0DCp8FIVGCqy_Z8mJ_Hs6Pf1LzgOnn4fsIU90/s1600/rete+telefonica+fisico.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;147&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXctkV8yivWfODWp0WAbedbpztH7t6GqYsG5pAbkp8ydaMk-KKaCsZ2X_dJbCO4u71a3b6gLJ4dCTe3vMK6L2emU3LtKhyphenhyphen1tMMB_dSLQ0DCp8FIVGCqy_Z8mJ_Hs6Pf1LzgOnn4fsIU90/s400/rete+telefonica+fisico.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2 class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt; 2 Commutazione a Pacchetto&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h3 class=&quot;western&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Principio:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm; margin-left: 1.32cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;In questa modalità i dati sono divisi in pacchetti di informazione che vengono poi mandati attraverso la rete uno alla volta.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Ci sono due implementazioni della commutazione a pacchetto : circuito virtuale e datagram&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start=&quot;2&quot;&gt;&lt;ol&gt;&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Commutazione   a Datagram&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;I pacchetti non devo seguire un percorso fisso. Non c&#39;è bisogno di richiedere la connessione.  Non c&#39;è prenotazione dei canali di comunicazione che invece vengono allocate dinamicamente. I pacchetti possono arrivare fuori sequenza. Possibilità di lavoro in parallelo cioè un terminale può mandare dati ricevendone altri contemporaneamente il che fa risparmiare un bel po di tempo.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinn4Ir5A-Rljy0m4pcf09dq7_-fwbF2TN9jVMqhpqKIQz62M-oqiaeZaQ_0KK4jPpiKWXbRgPpnfqexnQxTKGkWM4lvcezmpdhiXYVTfcnLeoPqleCzDDd5cvt6iFm7gTXb7hZG4Qq8JU/s1600/commutazione+datagram.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;166&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinn4Ir5A-Rljy0m4pcf09dq7_-fwbF2TN9jVMqhpqKIQz62M-oqiaeZaQ_0KK4jPpiKWXbRgPpnfqexnQxTKGkWM4lvcezmpdhiXYVTfcnLeoPqleCzDDd5cvt6iFm7gTXb7hZG4Qq8JU/s400/commutazione+datagram.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Esempio di una rete che usa questa modalità di commutazione è internet che la implementa nello strato di rete.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start=&quot;2&quot;&gt;&lt;ol start=&quot;2&quot;&gt;&lt;li&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Commutazione   a circuito virtuale&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/ol&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Questa modalità è una via di mezzo fra la commutazione a circuito e quella a datagram. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Come nella commutazione a datagram ,i dati sono suddivisi in pacchetti.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Come nella commutazione a circuito ,ci sono tre fasi setup,utilizzo e fine utilizzo e quindi i pacchetti seguono un percorso fisso. Non c&#39;è il problema dell&#39;ordinazione dei pacchetti all&#39;arrivo.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Per i canali di comunicazione possono essere :&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;- prenotati come  nella commutazione a circuito.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;- allocati dinamicamente come nella commutazione a datagram.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Il circuito è detto virtuale perché i suoi rami e collegamenti sono condivisi da altri flussi.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVxK2u9-vDecTIvMtucbwcC3NEu8dE2k2iLrONPPDs9hM7eYQ357gI9DSPXepBqtTTlDpqzl9_i6vqTuC0E7hCIsHpIy-MWWxCT6zPcHbaC9BcqAAbvCbLUT6om35Hkzc8ok7FXQi-slI/s1600/Commutazione+di+circuito+virtuale.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;216&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVxK2u9-vDecTIvMtucbwcC3NEu8dE2k2iLrONPPDs9hM7eYQ357gI9DSPXepBqtTTlDpqzl9_i6vqTuC0E7hCIsHpIy-MWWxCT6zPcHbaC9BcqAAbvCbLUT6om35Hkzc8ok7FXQi-slI/s400/Commutazione+di+circuito+virtuale.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif; font-weight: bold;&quot;&gt;3 Commutazione a Messaggio&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;In questa modalità il messaggio è inviato interamente su base LINK-to-LINK senza fase di instaurazione e chiusura di connessione.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Si usa questa modalità quando la richiesta di connessione non è frequente e i dati da mandare sono limitati.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Essendo nello strato di rete ,c&#39;è la possibilità di ricevere bit errati.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;In conclusione si usa una modalità di commutazione nelle reti a commutazione in base ai requisiti della rete.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-family: &#39;DejaVu Sans&#39;, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;u&gt;Riferimenti e Approfondimenti:&lt;/u&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;Slide del professore Romano Fantacci dell&#39;universita degli studi di Firenze &lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;Copyright immagini : Mc-Graw Hill&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;margin-bottom: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/5039411709363618631/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2011/01/modalita-di-commutazione.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/5039411709363618631'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/5039411709363618631'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2011/01/modalita-di-commutazione.html' title='Modalità di commutazione dell&#39;informazione'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiup-NRpAzSbufWtWBa3ONmr0zt_lnMeMmYjkCjzoCdX7eIUBIYGDymTrAbFj7xCwHSCF72_xiSM2TtC7r-oVPyP2Ci9AB2s2nZ7c6Om7VRSJxQVrumnOoj2bEo9clJcwFcplfEj2aoftA/s72-c/Commutazione+di+circuito.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-1868158648854619374</id><published>2011-01-02T11:48:00.000+01:00</published><updated>2011-01-02T11:51:31.092+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CSMA/CD"/><category scheme="http://www.blogger.com/atom/ns#" term="Ethernet"/><category scheme="http://www.blogger.com/atom/ns#" term="IEEE 802.3"/><category scheme="http://www.blogger.com/atom/ns#" term="LAN"/><category scheme="http://www.blogger.com/atom/ns#" term="MAC"/><category scheme="http://www.blogger.com/atom/ns#" term="reti"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><title type='text'>Tutto quello che devi sapere su Ethernet</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLC61X2PCVRx1b0memhfFYyZ1YeJmRzXB_RuZ4i1_YdR9asOdYPQtsP9BJRLNLgN7ra5Gc_cijngNGtpiOFjISsH0Ot47Y4nhJYZ-J0uM-_RAbJNnHOfZycroObyE7CwHlqxP7IBOXt2k/s1600/ethernet.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLC61X2PCVRx1b0memhfFYyZ1YeJmRzXB_RuZ4i1_YdR9asOdYPQtsP9BJRLNLgN7ra5Gc_cijngNGtpiOFjISsH0Ot47Y4nhJYZ-J0uM-_RAbJNnHOfZycroObyE7CwHlqxP7IBOXt2k/s320/ethernet.jpg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;Con Ethernet , si intende una famiglia di tecnologie per reti locali (LAN) sviluppato inizialmente al livello sperimentale da &lt;/span&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;a href=&quot;http://it.wikipedia.org/wiki/Robert_Metcalfe&quot; style=&quot;color: black;&quot; title=&quot;Robert Metcalfe&quot;&gt;&lt;span style=&quot;color: #0645ad; text-decoration: none;&quot;&gt;Robert Metcalfe&lt;/span&gt;&lt;/a&gt;&amp;nbsp;e &lt;span style=&quot;text-decoration: none;&quot;&gt;David Boggs&lt;/span&gt;&amp;nbsp;(suo assistente) allo&amp;nbsp;&lt;a href=&quot;http://it.wikipedia.org/wiki/Xerox_PARC&quot; style=&quot;color: black;&quot; title=&quot;Xerox PARC&quot;&gt;&lt;span style=&quot;color: #0645ad; text-decoration: none;&quot;&gt;Xerox PARC&lt;/span&gt;&lt;/a&gt; e poi ri&lt;/span&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;coperta dalla norma IEEE 802.3.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%;&quot;&gt;Il principio di una rete Ethernet è semplice:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;color: #324354; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt;&quot;&gt;Tutti i terminali della rete Ethernet sono connessi allo stesso mezzo di comunicazione, costituito da cavi cilindrici.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;&quot;&gt;&lt;span style=&quot;color: #324354; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt;&quot;&gt;Quest’articolo parlerà degli elementi di una rete Ethernet, della sua topologia, del suo Funzionamento.&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;h1&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;componenti di una rete Ethernet:&lt;span class=&quot;mw-headline&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt; font-weight: normal; line-height: 115%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div style=&quot;border-bottom: solid #AAAAAA 1.0pt; border: none; mso-border-bottom-alt: solid #AAAAAA .75pt; mso-element: para-border-div; padding: 0cm 0cm 2.0pt 0cm;&quot;&gt;&lt;h2 style=&quot;border: none; line-height: 14.25pt; margin-bottom: 7.2pt; margin-left: 0cm; margin-right: 0cm; margin-top: 0cm; mso-border-bottom-alt: solid #AAAAAA .75pt; mso-padding-alt: 0cm 0cm 2.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span style=&quot;color: black; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; font-weight: normal;&quot;&gt;La rete Ethernet è composta dei nodi della rete e del mezzo trasmissivo.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;border: none; line-height: 14.25pt; margin-bottom: 7.2pt; margin-left: 0cm; margin-right: 0cm; margin-top: 0cm; mso-border-bottom-alt: solid #AAAAAA .75pt; mso-padding-alt: 0cm 0cm 2.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span style=&quot;color: black; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; font-weight: normal;&quot;&gt;I nodi sono divisi in due classi:&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;border: none; line-height: 14.25pt; margin-bottom: 7.2pt; margin-left: 0cm; margin-right: 0cm; margin-top: 0cm; mso-border-bottom-alt: solid #AAAAAA .75pt; mso-padding-alt: 0cm 0cm 2.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt; font-weight: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 12pt; font-weight: normal;&quot;&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;1-&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 12pt; font-weight: normal;&quot;&gt;Gli apparati terminali: Elementi che sono o la sorgente o la destinazione di un Frame d’informazioni. Come esempio abbiamo PC, Notebook, server, oppure stampanti.&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNJFrlBfncKRtnBPufQS6O7A1rxpK0ZUk50l0jfcQsFdbWVjvVQ_tFsdUxjEV0aSqCYcIVeQGnE4xP1iL_oDPUDDMf81L9HB0vvyRiv8hh-MgqDBulgY4gwONnH1qw7DMGYNnzoEsaqng/s1600/apparati+terminali.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNJFrlBfncKRtnBPufQS6O7A1rxpK0ZUk50l0jfcQsFdbWVjvVQ_tFsdUxjEV0aSqCYcIVeQGnE4xP1iL_oDPUDDMf81L9HB0vvyRiv8hh-MgqDBulgY4gwONnH1qw7DMGYNnzoEsaqng/s1600/apparati+terminali.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNJFrlBfncKRtnBPufQS6O7A1rxpK0ZUk50l0jfcQsFdbWVjvVQ_tFsdUxjEV0aSqCYcIVeQGnE4xP1iL_oDPUDDMf81L9HB0vvyRiv8hh-MgqDBulgY4gwONnH1qw7DMGYNnzoEsaqng/s1600/apparati+terminali.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: black; font-weight: normal;&quot;&gt;2&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;-&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 12pt; font: normal normal normal 7pt/normal &#39;Times New Roman&#39;; line-height: 19px;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 12pt; font-weight: normal; line-height: 19px;&quot;&gt;Gli apparati di comunicazione: Elementi intermediari che ricevono e poi spediscono Frame d’informazione attraverso la rete. Come esempio abbiamo i repeater, switch oppure modem.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfsoJo3GIPQa3ypoBFMq20dPjsNjGulj-9WROWkv-u2uPUVm_YFvdTn3RwUmuqaSEoaAxfm2wz2HEE9z1ExSDDe_m2CsxOgvEDZ6YrtD2CnpCYX_fVfYtOnaqYa4LrEn_XPxdsDRbI2ok/s1600/apparati+di+comunicazione.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;97&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfsoJo3GIPQa3ypoBFMq20dPjsNjGulj-9WROWkv-u2uPUVm_YFvdTn3RwUmuqaSEoaAxfm2wz2HEE9z1ExSDDe_m2CsxOgvEDZ6YrtD2CnpCYX_fVfYtOnaqYa4LrEn_XPxdsDRbI2ok/s320/apparati+di+comunicazione.jpg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 19px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 19px;&quot;&gt;Il mezzo trasmissivo è comune e definisce percorsi per i segnali elettrici attraverso la rete. Può essere un cavo doppio o un cavo a fibra ottica.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiV1R14bLKm9zlHVAnR-toschlwwvaVTOkfM4GpmF1WgonhRmQ_wihzaJ_HXju21ntHWAVQmsqAcjAb4PcToJCreq2U6fqCv2znakkZKjLYd3ivMExmyzVh5nj4YNW9mr36dKNviqo6aI/s1600/Mezzo+tramissivo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;152&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiV1R14bLKm9zlHVAnR-toschlwwvaVTOkfM4GpmF1WgonhRmQ_wihzaJ_HXju21ntHWAVQmsqAcjAb4PcToJCreq2U6fqCv2znakkZKjLYd3ivMExmyzVh5nj4YNW9mr36dKNviqo6aI/s320/Mezzo+tramissivo.jpg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 32px; font-weight: bold;&quot;&gt;Topologia di una rete Ethernet&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; line-height: 18px;&quot;&gt;Come si è detto&amp;nbsp;all&#39;introduzione&amp;nbsp;un solo mezzo permette di trasportare i frame da una sorgente a una destinazione. Questa ci fa subito pensare a una topologia a bus coassiale.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Questo rappresenta solo la topologia logica della rete cioè,&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 12pt; line-height: 115%;&quot;&gt; il percorso logico che le informazioni seguono per arrivare a destinazione&lt;/span&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 12pt; line-height: 115%;&quot;&gt; Nelle prime reti Ethernet la topologia elettrica corrispondeva anche alla topologia fisica, cioè al modo in cui fisicamente le varie stazioni erano collegate tra loro. In seguito con l’adozione di apparati di comunicazione come repeater o switch, la topologia fisica è cambiata.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt; line-height: 115%;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px; line-height: 18px;&quot;&gt;Ora vedremo le strutture più semplici che si trovano combinate nelle topologie ethernet fisiche in generale.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 24px; font-weight: bold;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 24px; font-weight: bold;&quot;&gt;La connessione Punto-a-Punto&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 18px;&quot;&gt;Rappresenta la struttura più semplice e coinvolge due elementi. Può essere del tipo&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px; line-height: 18px;&quot;&gt;AT-a-AT, AT-a-AC oppure AC-a-AC&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKrhAjgALpsYhdFqaRN2obcT9rQVsG__cIUxiQcMIHxmUGLs5T-PaXTeBdRkrltAFzroyexG2bLkHK6DspylW4O5X-zUkhIXcIauQenKch5of2GChezTolAkltOcoguv7bdXc0xvbEgUE/s1600/punto+a+punto.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKrhAjgALpsYhdFqaRN2obcT9rQVsG__cIUxiQcMIHxmUGLs5T-PaXTeBdRkrltAFzroyexG2bLkHK6DspylW4O5X-zUkhIXcIauQenKch5of2GChezTolAkltOcoguv7bdXc0xvbEgUE/s1600/punto+a+punto.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 24px; font-weight: bold;&quot;&gt;La struttura doppio bus coassiale.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 18px;&quot;&gt;E una struttura molto usata singolarmente dalle reti ethernet semplici.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOkf-PZX2fl8maLAg4YbZey0cYpFhskEPCiys6bSljiOMkNzAoQw_v-Vvk7m3270oyLGgcX9vo7b3FqO2Z4dRMO9RUTr8YNyAfkd_Qphn32sIitaUdax0Em7NSCLfjbyX8kHllzSDYynM/s1600/Topologia+Bus.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOkf-PZX2fl8maLAg4YbZey0cYpFhskEPCiys6bSljiOMkNzAoQw_v-Vvk7m3270oyLGgcX9vo7b3FqO2Z4dRMO9RUTr8YNyAfkd_Qphn32sIitaUdax0Em7NSCLfjbyX8kHllzSDYynM/s320/Topologia+Bus.jpg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 24px; font-weight: bold;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 24px; font-weight: bold;&quot;&gt;Struttura a Stella&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 24px; font-weight: bold;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 18px;&quot;&gt;Questa struttura si ritrova nelle reti ethernet più complesse.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwzkF1L8eyoadpNlLaZdSgq-VJDe0x8egBanVQM5TLjImn8i6hfL81QH-akriXH6eS1lrZtt7m5gbVWX9_6u8u4EZVtNnlXTmnFZ3mFB57KpPTwWeHnwhsYVZ4uZhEvx-0Pnbx-eBDynY/s1600/stella.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwzkF1L8eyoadpNlLaZdSgq-VJDe0x8egBanVQM5TLjImn8i6hfL81QH-akriXH6eS1lrZtt7m5gbVWX9_6u8u4EZVtNnlXTmnFZ3mFB57KpPTwWeHnwhsYVZ4uZhEvx-0Pnbx-eBDynY/s1600/stella.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 18px;&quot;&gt;In queste strutture gli apparati di comunicazione vanno dai repeater (per aumentare la lunghezza dei segmenti di rette) agli switch (per collegare più reti ethernet in un nodo).&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;h1&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-family: Georgia, &#39;Times New Roman&#39;, serif; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; Funzionamento della rete Ethernet&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Ethernet fornisce al livello di rete un servizio senza connessione in cui l’informazione è trasmessa in modalità broadcast. Tutti i terminali ricevono l’informazione e solo il terminale destinatario dopo verifica legge tutto il pacchetto mandato.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Non c’è nessun sistema che gestisce l’accesso al mezzo trasmissivo. Il sistema di gestione delle collisioni e dell’accesso condiviso del canale trasmissivo è interno a ogni apparato di rete e si chiama &lt;b&gt;CSMA/CD&lt;/b&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Carrier Sense&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;: ascolto del canale (Ogni Terminale ascolta in continuo il canale per determinare intervalli fra la trasmissione dei Frame&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 12pt; line-height: 115%;&quot;&gt;.&lt;/span&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Multile Access&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;: accesso multiplo&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Collision Detecion&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;: rilevamento di collisione&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Ecco come avviene la comunicazione nei diversi scenari possibili:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #303030; font-size: 16px; line-height: 20px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 15.0pt; margin-right: 0cm; margin-top: 3.75pt; mso-list: l5 level1 lfo3; tab-stops: list 36.0pt; text-indent: -18.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: #303030; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #303030; font-size: 12pt;&quot;&gt;Ciascun terminale verifica che non via siano comunicazioni sulla linea prima di emettere.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 15.0pt; margin-right: 0cm; margin-top: 3.75pt; mso-list: l5 level1 lfo3; tab-stops: list 36.0pt; text-indent: -18.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: #303030; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #303030; font-size: 12pt;&quot;&gt;Se due terminali emettono contemporaneamente, allora vi sarà collisione (cioè più trame di dati si trovano sulla linea allo stesso momento).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 15.0pt; margin-right: 0cm; margin-top: 3.75pt; mso-list: l5 level1 lfo3; tab-stops: list 36.0pt; text-indent: -18.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: #303030; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #303030; font-size: 12pt;&quot;&gt;I due terminali interrompono le loro comunicazioni e aspetto per un periodo aleatorio, poi sarà la prima che avrà terminato questo periodo a emettere di nuovo.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 15.0pt; margin-right: 0cm; margin-top: 3.75pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: 7.5pt; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #303030; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt;&quot;&gt;Questo principio è basato su più limiti:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 15.0pt; margin-right: 0cm; margin-top: 3.75pt; mso-list: l4 level1 lfo4; tab-stops: list 36.0pt; text-indent: -18.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: #303030; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #303030; font-size: 12pt;&quot;&gt;I pacchetti di dati devono avere una dimensione massima.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 15.0pt; margin-right: 0cm; margin-top: 3.75pt; mso-list: l4 level1 lfo4; tab-stops: list 36.0pt; text-indent: -18.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: #303030; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #303030; font-size: 12pt;&quot;&gt;Deve esserci un tempo di attesa fra le due emissioni.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: 7.5pt; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #303030; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt;&quot;&gt;Il tempo di attesa varia secondo la frequenza delle collisioni:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 15.0pt; margin-right: 0cm; margin-top: 3.75pt; mso-list: l2 level1 lfo5; tab-stops: list 36.0pt; text-indent: -18.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: #303030; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #303030; font-size: 12pt;&quot;&gt;Dopo la prima collisione, un terminale aspetta per una data unità di tempo.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 15.0pt; margin-right: 0cm; margin-top: 3.75pt; mso-list: l2 level1 lfo5; tab-stops: list 36.0pt; text-indent: -18.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: #303030; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #303030; font-size: 12pt;&quot;&gt;Dopo la seconda collisione, il terminale aspetta per due unità di tempo.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 15.0pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 15.0pt; margin-right: 0cm; margin-top: 3.75pt; mso-list: l2 level1 lfo5; tab-stops: list 36.0pt; text-indent: -18.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: #303030; font-size: 10pt;&quot;&gt;·&lt;span style=&quot;font: normal normal normal 7pt/normal &#39;Times New Roman&#39;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #303030; font-size: 12pt;&quot;&gt;Dopo la terza collisione, il terminale aspetta per quattro unità di tempo.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Dopo ogni trasmissione di un terminale, tutti i terminali avranno di nuovo un’opportunità di accesso al canale con priorità uguale.&lt;/span&gt;&lt;/div&gt;&lt;h1&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-family: Georgia, &#39;Times New Roman&#39;, serif; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Confronto del modello IEEE 802.3 con il modello &amp;nbsp;OSI&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h1&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDrLEFgQmyGhcVrrZMEw93otyG0kZNYifAA98hbia4eQMg030W6EZmQPsUTGRIeGzPAQ3NBUt0bg2z5I7yJqtnTXyFKYNqfv2tZ3nLMHaSUaSPOGgpsi19u1615RIfE8_HJ35Fd2Hz1Rg/s1600/confronto.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDrLEFgQmyGhcVrrZMEw93otyG0kZNYifAA98hbia4eQMg030W6EZmQPsUTGRIeGzPAQ3NBUt0bg2z5I7yJqtnTXyFKYNqfv2tZ3nLMHaSUaSPOGgpsi19u1615RIfE8_HJ35Fd2Hz1Rg/s400/confronto.jpg&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;I livelli ethernet sono MAC –Client, MAC e livello fisico.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Il &lt;b&gt;MAC-Client&lt;/b&gt; può essere:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;color: black; line-height: normal; mso-list: l1 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;Logical      Link Control (LLC), che fornisce un’interfaccia fra il livello MAC e I livelli      superiori. &lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 12pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-list: l1 level1 lfo2; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;Un Bridge o Switch, che fornisce un’interfaccia LAN-a-LAN fra rei che      usano lo stesso protocollo (Esempio Ethernet-a-Ethernet) oppure protocolli      diversi (Esempio Ethernet-a-Token Ring).&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;Il &lt;b&gt;Livello Mac&lt;/b&gt; ha la responsabilità di:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;color: black; line-height: normal; mso-list: l3 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt;&quot;&gt;Encapsulazione      dei dati, incluso assemblaggio e suddivisione del frame prima e dopo la      trasmissione, e del controllo e rilevamento di errori dopo la ricezione.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;line-height: normal; mso-list: l3 level1 lfo1; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; tab-stops: list 36.0pt;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;Accesso al canale trasmissivo, incluso l’inizializzazione del frame e la      manutenzione in caso d’insuccesso della trasmissione.&lt;/span&gt;&lt;span style=&quot;border-bottom-color: windowtext; border-bottom-style: none; border-bottom-width: 1pt; border-left-color: windowtext; border-left-style: none; border-left-width: 1pt; border-right-color: windowtext; border-right-style: none; border-right-width: 1pt; border-top-color: windowtext; border-top-style: none; border-top-width: 1pt; font-size: 12pt; padding-bottom: 0cm; padding-left: 0cm; padding-right: 0cm; padding-top: 0cm;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;line-height: 18.0pt; margin-bottom: 6.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.8pt;&quot;&gt;&lt;span style=&quot;color: black; font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;Il &lt;b&gt;livello fisico&lt;/b&gt; si occupa della trasmissione dei dati, della cifratura del segnale del tipo di mezzo trasmissivo connettendo due nodi.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%;&quot;&gt;Terminiamo l’articolo con i vantaggi che offre la rete ethernet:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;ol&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 18px;&quot;&gt;Facile da capire, implementare e gestire.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 18px;&quot;&gt;Costa poco rispetto altre tecnologie LAN.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; line-height: 18px;&quot;&gt;Grande flessibilità&amp;nbsp;nell&#39;estensione&amp;nbsp;e l’installazione della rete.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 16px; line-height: 24px;&quot;&gt;Funziona bene e genera pochi problemi.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 18.0pt; margin-bottom: 1.2pt; mso-margin-top-alt: auto;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;span class=&quot;MsoIntenseReference&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Riferimenti e approfondimenti&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;:&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom: solid windowtext 1.0pt; border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-element: para-border-div; padding: 0cm 0cm 1.0pt 0cm;&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-padding-alt: 0cm 0cm 1.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%;&quot;&gt;Articoli su Ethernet nei siti: &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-padding-alt: 0cm 0cm 1.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, &#39;Times New Roman&#39;, serif;&quot;&gt;&lt;span style=&quot;font-size: 12pt; line-height: 115%;&quot;&gt;javvin.com&lt;/span&gt;&lt;span style=&quot;color: #303030; font-size: 12pt; line-height: 115%;&quot;&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-padding-alt: 0cm 0cm 1.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span style=&quot;color: #303030; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%;&quot;&gt;kiokea.net&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-padding-alt: 0cm 0cm 1.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span style=&quot;color: #303030; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%;&quot;&gt;wikipedia.com &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-padding-alt: 0cm 0cm 1.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span style=&quot;color: black; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%;&quot;&gt;howstuffworks.com &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-padding-alt: 0cm 0cm 1.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span style=&quot;color: black; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%;&quot;&gt;cisco.com &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-padding-alt: 0cm 0cm 1.0pt 0cm; padding: 0cm;&quot;&gt;&lt;span style=&quot;color: #303030; font-family: Georgia, &#39;Times New Roman&#39;, serif; font-size: 12pt; line-height: 115%;&quot;&gt;Appunti del prof Necci su Ethernet (uniroma3)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-bottom-alt: solid windowtext .75pt; mso-padding-alt: 0cm 0cm 1.0pt 0cm; padding: 0cm;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/1868158648854619374/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2011/01/tutto-quello-che-devi-sapere-su.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/1868158648854619374'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/1868158648854619374'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2011/01/tutto-quello-che-devi-sapere-su.html' title='Tutto quello che devi sapere su Ethernet'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLC61X2PCVRx1b0memhfFYyZ1YeJmRzXB_RuZ4i1_YdR9asOdYPQtsP9BJRLNLgN7ra5Gc_cijngNGtpiOFjISsH0Ot47Y4nhJYZ-J0uM-_RAbJNnHOfZycroObyE7CwHlqxP7IBOXt2k/s72-c/ethernet.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-6328225856439563391</id><published>2010-12-29T05:30:00.000+01:00</published><updated>2010-12-29T23:19:04.514+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Formula di clos"/><category scheme="http://www.blogger.com/atom/ns#" term="linea di ingresso"/><category scheme="http://www.blogger.com/atom/ns#" term="linea di uscita"/><category scheme="http://www.blogger.com/atom/ns#" term="Probabilita di non blocco"/><category scheme="http://www.blogger.com/atom/ns#" term="rete di connessione"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="struttura S-S"/><category scheme="http://www.blogger.com/atom/ns#" term="struttura s-s-s"/><category scheme="http://www.blogger.com/atom/ns#" term="struttura S-T"/><category scheme="http://www.blogger.com/atom/ns#" term="struttura T-S"/><category scheme="http://www.blogger.com/atom/ns#" term="struttura t-s-t"/><category scheme="http://www.blogger.com/atom/ns#" term="trama"/><title type='text'>L’Architettura di una rete di connessione</title><content type='html'>&lt;h1&gt;&lt;span style=&quot;font-weight:normal;font-size:13px;&quot;&gt;&lt;a rel=&quot;attachment wp-att-563&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/rete-cinnessione/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-563&quot; title=&quot;rete cinnessione&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/rete-cinnessione.jpg&quot; alt=&quot;&quot; width=&quot;221&quot; height=&quot;226&quot; /&gt;&lt;/a&gt;Nell&#39;articolo Tutto quello che devi sapere sulle reti di telecomunicazione, abbiamo visto il diagramma a blocchi di una rete a commutazione o meglio un auto-commutatore. Oggi ci concentriamo sul blocco centrale: la rete di connessione.&lt;/span&gt;&lt;/h1&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-544&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/struttura-a-blocchi-di-una-rete-di-commutazione-2/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-544&quot; title=&quot;Struttura a blocchi di una rete di commutazione&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/struttura-a-blocchi-di-una-rete-di-commutazione1.jpg&quot; alt=&quot;&quot; width=&quot;579&quot; height=&quot;430&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h2&gt;Cos’è la rete di connessione?&lt;/h2&gt;&lt;br/&gt;La rete di connessione è un circuito che organizza e modifica le terminazioni entranti usando i requisiti dell’unità di controllo per poi fornire le terminazioni di uscita. Si tratta di creare la comunicazione tra gli utenti A e B usando le linee in entrata e uscita corrispondenti a quelli degli utenti.&lt;br/&gt;&lt;br/&gt;Una rete di connessione si dice non bloccante dal punto di vista della struttura se considerate le richieste di connessione in ingresso non in conflitto fra di loro (cioè rivolte a linee di uscita diverse), la rete riesce a realizzare l’operazione di comunicazione giacché in questo caso le richieste in uscita sono disponibili.&lt;br/&gt;&lt;br/&gt;La struttura si dice bloccante invece se la rete non riesce a realizzare l’operazione di comunicazione richiesta.&lt;br/&gt;&lt;br/&gt;Una struttura in genere è non bloccante per definizione.&lt;br/&gt;&lt;h2&gt;Tipi di Strutture per la rete di connessione&lt;/h2&gt;&lt;br/&gt;&lt;h3&gt;Struttura a divisione di spazio:&lt;/h3&gt;&lt;br/&gt;[caption id=&quot;attachment_545&quot; align=&quot;aligncenter&quot; width=&quot;240&quot; caption=&quot;Struttura a divisione di tempo&quot;]&lt;a rel=&quot;attachment wp-att-545&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/sdt/&quot;&gt;&lt;img class=&quot;size-full wp-image-545&quot; title=&quot;SDT&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/sdt.jpg&quot; alt=&quot;&quot; width=&quot;240&quot; height=&quot;254&quot; /&gt;&lt;/a&gt;[/caption]&lt;br/&gt;&lt;br/&gt;Ha una funzionalità duale cioè si usa sia nella telefonia analogica sia nella telefonia numerica.&lt;br/&gt;&lt;br/&gt;È una struttura non bloccante.&lt;br/&gt;&lt;br/&gt;Il suo costo è uguale a NxM con N ingressi e M uscite.&lt;br/&gt;&lt;br/&gt;L’operazione fondamentale che compie è quella di spostare i canali della trama d’ingresso mantenendola inalterata da una linea a un&#39;altra.&lt;br/&gt;&lt;br/&gt;Esempio:&lt;br/&gt;&lt;br/&gt;Immaginiamo che in ingresso abbiamo la richiesta di spostare il canale nella linea 3 alla linea 5 di uscita:&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-546&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/sdt1/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-546&quot; title=&quot;SDT1&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/sdt1.jpg&quot; alt=&quot;&quot; width=&quot;100&quot; height=&quot;124&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h3&gt;Struttura a divisione di tempo&lt;/h3&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-547&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/tsi/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-547&quot; title=&quot;TSI&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/tsi.jpg&quot; alt=&quot;Time Slot Interchanger&quot; width=&quot;254&quot; height=&quot;82&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Si chiama in Inglese Time Slot Interchanger (TSI).&lt;br/&gt;&lt;br/&gt;Si usa solo nella telefonia numerica. L’operazione principale che compie è quella di permutare il canale in ingresso nella stessa trama (non c’è cambio di linea).&lt;br/&gt;&lt;br/&gt;Gli TSI sono delle memorie a lettura/scrittura.&lt;br/&gt;&lt;br/&gt;Il tempo di una trama è 125µs&lt;br/&gt;&lt;br/&gt;Funzionamento:&lt;br/&gt;&lt;br/&gt;Per prima cosa c’è una scrittura nella memoria (TSI) della trama letta in ingresso e poi una lettura dalla stessa memoria dell’informazione che andrà in uscita.&lt;br/&gt;&lt;br/&gt;Ci sono due modalità di funzionamento:&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Scrittura sequenziale e Lettura Casuale&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;Qui la permutazione è implementata in uscita. Infatti, la casualità della lettura è definita da segnali che provengono dall’unità centrale.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Scrittura casuale e Lettura sequenziale&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;Qui il funzionamento è duale cioè la permutazione sarà implementata all’ingresso. Come prima la casualità della lettura è dettata dai segnali dell’unità centrale.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Calcolo del costo della struttura&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;Costo = tempo di accesso alla TSI&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-560&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/tempo-accesso/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-560&quot; title=&quot;Tempo accesso&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/tempo-accesso.jpg&quot; alt=&quot;&quot; width=&quot;484&quot; height=&quot;50&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h3&gt;Strutture a Più stadi&lt;/h3&gt;&lt;br/&gt;Le strutture a più stadi sono strutture composte di altre strutture organizzati in stadi successivi dove le uscite della struttura di uno stadio sono gli ingressi della struttura del stadio successivo e cosi via.&lt;br/&gt;&lt;br/&gt;Gli obbiettivi di queste strutture sono 2:&lt;br/&gt;&lt;br/&gt;-aumentare il grado di libertà di una struttura monostadio (permutazione canale e cambio linea)&lt;br/&gt;&lt;br/&gt;-diminuire il costo totale&lt;br/&gt;&lt;br/&gt;Ovviamente c’è un obbiettivo intrinseco alla struttura di cui non parlato: creare una struttura non bloccante.&lt;br/&gt;&lt;br/&gt;Ci sono due tipi di strutture multistadio:&lt;br/&gt;&lt;br/&gt;1. &lt;strong&gt;omogenee&lt;/strong&gt; (usano la stessa tecnologia di struttura: S)&lt;br/&gt;&lt;br/&gt;2. &lt;strong&gt;eterogenee&lt;/strong&gt; (usano tecnologie di struttura diverse: T e S)&lt;br/&gt;&lt;br/&gt;Ora analizzeremo in profondità qualche struttura multistadio.&lt;br/&gt;&lt;div&gt;&lt;br/&gt;&lt;table border=&quot;1&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot;&gt;&lt;br/&gt;&lt;tbody&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;217&quot; valign=&quot;top&quot;&gt;Numero di stadi&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;217&quot; valign=&quot;top&quot;&gt;Omogeneo&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;217&quot; valign=&quot;top&quot;&gt;Eterogeneo&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;217&quot; valign=&quot;top&quot;&gt;2&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;217&quot; valign=&quot;top&quot;&gt;S-S&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;217&quot; valign=&quot;top&quot;&gt;T-S|S-T&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;217&quot; valign=&quot;top&quot;&gt;3&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;217&quot; valign=&quot;top&quot;&gt;S-S-S&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;217&quot; valign=&quot;top&quot;&gt;T-S-T&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;/tbody&gt;&lt;br/&gt;&lt;/table&gt;&lt;br/&gt;&lt;/div&gt;&lt;br/&gt;&lt;h4&gt;La struttura S-S&lt;/h4&gt;&lt;br/&gt;Facciamo un esempio:&lt;br/&gt;&lt;br/&gt;abbiamo N ingressi e M uscite.&lt;br/&gt;&lt;br/&gt;N=15 e M=4&lt;br/&gt;&lt;br/&gt;La soluzione monostadio con una struttura S ci da un costo di 60. La struttura è non bloccante.&lt;br/&gt;&lt;br/&gt;La soluzione con 2 stadi S-S&lt;br/&gt;&lt;br/&gt;Ecco la configurazione:&lt;br/&gt;&lt;table border=&quot;1&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot; width=&quot;584&quot;&gt;&lt;br/&gt;&lt;tbody&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;92&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;Stadio&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;Numero di blocchi S&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;Numero d’ingressi&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;170&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;Numero di Uscite&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;92&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;1&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;3&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;5&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;170&quot; valign=&quot;top&quot;&gt;2&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;92&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;2&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;2&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;3&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;170&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;2&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;/tbody&gt;&lt;br/&gt;&lt;/table&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-548&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/configurazione-s-s/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-548&quot; title=&quot;Configurazione S-S&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/configurazione-s-s.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;318&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Calcolo costo&lt;/strong&gt;:&lt;br/&gt;&lt;br/&gt;Costo totale = Costo1 + Costo2 = 3(5x2) + 2(3x2) = 30 + 12 = 42 &amp;lt; 60 &lt;strong&gt;Secondo obbiettivo raggiunto&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;Vediamo se la struttura creata è non bloccante.osserviamo questa richiesta di commutazione:&lt;br/&gt;&lt;br/&gt;LINEA2-BLOCCO3-STADIO1--&amp;gt;LINEA2-BLOCCO1-STADIO2&lt;br/&gt;&lt;br/&gt;LINEA5-BLOCCO3-STADIO1--&amp;gt;LINEA1-BLOCCO1-STADIO2&lt;br/&gt;&lt;br/&gt;Questa richiesta di commutazione non può essere portata a termine perche c’è un blocco:&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;&lt;a rel=&quot;attachment wp-att-550&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/configurazione-s-s-bloccante-2/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-550&quot; title=&quot;Configurazione S-S-bloccante&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/configurazione-s-s-bloccante1.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;331&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;br/&gt;Si può aumentare il numero di uscite dei blocchi del primo stadio quante sono le uscite dei blocchi al secondo stadio ,pero questo aumenterebbe il costo e l’obbiettivo due non sarebbe più raggiunto.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Strutture T-S&lt;/strong&gt;:&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-551&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/t-s/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-551&quot; title=&quot;T-S&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/t-s.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;313&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Primo obbiettivo raggiunto : abbiamo due gradi di liberta.&lt;br/&gt;&lt;br/&gt;Esempio di funzionamento: richiesta di commutazione: CANALE 2-LINEA4 --&amp;gt; CANALE5-LINEA1&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Esecuzione&lt;/strong&gt;:&lt;br/&gt;&lt;br/&gt;La Matrice T del quarto blocco sposta il canale 2 sulla posizione 5 in uscita.&lt;br/&gt;&lt;br/&gt;S trasferisce il canale 5 dalla linea 4 alla linea 1&lt;br/&gt;&lt;br/&gt;Non c’è riduzione di costo.&lt;br/&gt;&lt;br/&gt;Vediamo se la rete è bloccante:&lt;br/&gt;&lt;br/&gt;Consideriamo la richiesta di commutazione seguente:&lt;br/&gt;&lt;br/&gt;LINEA1-CANALE3 --&amp;gt; LINEA1-CANALE8&lt;br/&gt;&lt;br/&gt;LINEA1-CANALE5 --&amp;gt;LINEA4-CANALE8&lt;br/&gt;&lt;br/&gt;La prima richiesta blocca la prima linea impedendo l’esecuzione della seconda richiesta.&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-552&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/t-s-bloccato/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-552&quot; title=&quot;T-S bloccato&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/t-s-bloccato.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;226&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Strutture S-T&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-553&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/s-t/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-553&quot; title=&quot;S-T&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/s-t.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;335&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Anche qui abbiamo 2 gradi di libertà.&lt;br/&gt;&lt;br/&gt;Esempio di funzionamento:&lt;br/&gt;&lt;br/&gt;CANALE2-LINEA5 --&amp;gt;CANALE5-LINEA3&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Esecuzione&lt;/strong&gt;:&lt;br/&gt;&lt;br/&gt;La Matrice S trasferisce la trama presente in ingresso nella linea5 alla linea3 in uscita&lt;br/&gt;&lt;br/&gt;La Matrice T del terzo blocco sposta il canale 2 sulla posizione 5 in uscita.&lt;br/&gt;&lt;br/&gt;Vediamo se la struttura è non bloccante:&lt;br/&gt;&lt;br/&gt;Consideriamo la richiesta di commutazione seguente:&lt;br/&gt;&lt;br/&gt;CANALE5-LINEA3--&amp;gt; CANALE6-LINEA4&lt;br/&gt;&lt;br/&gt;CANALE1-LINEA7--&amp;gt;CANALE2-LINEA4&lt;br/&gt;&lt;br/&gt;La prima richiesta blocca la linea4. La richiesta due : impossibile da eseguire.&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-554&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/s-t-bloccato/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-554&quot; title=&quot;S-T-bloccato&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/s-t-bloccato.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;217&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Ora vediamo le strutture a 3 stadi.&lt;br/&gt;&lt;h4&gt;La struttura S-S-S&lt;/h4&gt;&lt;br/&gt;Consideriamo per semplicità di avere N linee in ingresso e N linee in uscita.&lt;br/&gt;&lt;br/&gt;La soluzione monostadio S ha un costo pari a N².&lt;br/&gt;&lt;br/&gt;In questa struttura abbiamo 3 stadi organizzate nel seguente modo:&lt;br/&gt;&lt;table border=&quot;1&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot; width=&quot;584&quot;&gt;&lt;br/&gt;&lt;tbody&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;92&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;Stadio&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;Numero di blocchi S&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;Numero d’ingressi&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;170&quot; valign=&quot;top&quot;&gt;Numero di Uscite&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;92&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;1&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;161&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;N/n&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;161&quot; valign=&quot;top&quot;&gt;n&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;170&quot; valign=&quot;top&quot;&gt;k&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;92&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;2&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;161&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;K&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;161&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;N/n&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;170&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;N/n&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;92&quot; valign=&quot;top&quot;&gt;3&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;N/n&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;text-align:center;&quot; width=&quot;161&quot; valign=&quot;top&quot;&gt;k&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;170&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p style=&quot;text-align:center;&quot;&gt;n&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;/tbody&gt;&lt;br/&gt;&lt;/table&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-555&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/configurazione-s-s-s/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-555&quot; title=&quot;Configurazione S-S-S&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/configurazione-s-s-s.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;294&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Calcolo del costo&lt;/strong&gt;:&lt;br/&gt;&lt;br/&gt;Costo Totale = C1+C2+C3 = N/n(n x k) + k(N/n)(N/n) + N/n(k x n) = 2Nk + K(N/n)² &amp;lt; N²&lt;br/&gt;&lt;h5&gt;Assenza di Blocco (Formula di CLOS)&lt;/h5&gt;&lt;br/&gt;Il principio usato è semplice: Calcolare il valore di k che nel peggiore caso garantisce l’assenza di blocco e quindi anche negli altri casi si potrà usare questo valore di k sapendo che la struttura costruita è non bloccante.&lt;br/&gt;&lt;br/&gt;Enunciamo il caso peggiore:&lt;br/&gt;&lt;br/&gt;Fra le n linee d’ingresso al primo blocco (A) del primo stadio, n-1 sono indisponibili.&lt;br/&gt;&lt;br/&gt;Il blocco del terzo stadio(B) che voglio raggiungere a solo un’uscita libera.&lt;br/&gt;&lt;br/&gt;I blocchi del secondo stadio che hanno occupato le n-1 uscite del blocco B sono disgiunti dai blocchi che hanno in  ingresso le linee generate dalle richieste del blocco A.&lt;br/&gt;&lt;br/&gt;Tutto questo ci fa concludere che al secondo stadio abbiamo bisogno di:&lt;br/&gt;&lt;br/&gt;k = n-1 (linee del blocco A) + n-1 (linee del blocco B) + 1(unica linea rimasta libera da usare per l’ultima richiesta)&lt;br/&gt;&lt;br/&gt;k=2n-1 condizione di CLOS&lt;br/&gt;&lt;br/&gt;il costo diventa  2N(2n-1) + (2n-1)(N/n)²&lt;br/&gt;&lt;br/&gt;Ora basta minimizzare questo costo rispetto a n.&lt;br/&gt;&lt;h5&gt;Struttura T-S-T&lt;/h5&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-556&quot; href=&quot;http://studiconme.wordpress.com/2010/12/29/l%e2%80%99architettura-di-una-rete-di-connessione/t-s-t/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-556&quot; title=&quot;T-S-T&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/t-s-t.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;224&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Questa struttura ha per obbiettivo di risolvere le situazioni di blocco delle strutture T-S e S-T.&lt;br/&gt;&lt;h6&gt;Come funziona?&lt;/h6&gt;&lt;br/&gt;Esempio di richiesta di commutazione:&lt;br/&gt;&lt;br/&gt;CANALE3-LINEA1--&amp;gt;CANALE 2-LINEA4&lt;br/&gt;&lt;br/&gt;La  Matrice T del primo blocco del primo stadio  sposta il canale 3  sulla posizione 2 in uscita.&lt;br/&gt;&lt;br/&gt;La Matrice S  trasferisce la trama presente in ingresso nella linea1 alla linea4 in uscita&lt;br/&gt;&lt;br/&gt;La  Matrice T del terzo stadio del terzo blocco  non sposta niente.&lt;br/&gt;&lt;br/&gt;Supponiamo di avere N ingressi e N uscite.  La matrice S avrà un costo di N².&lt;br/&gt;&lt;br/&gt;Per minimizzare  il costo dobbiamo agire sulle matrice T del primo e del terzo  stadio.&lt;br/&gt;&lt;br/&gt;Per il primo stadio prendo delle trame in ingresso con n canali e in uscita delle trame con k canali (con k&amp;gt;n)&lt;br/&gt;&lt;br/&gt;Per il terzo stadio  prendo delle trame in ingresso con k canali e in uscita delle trame con n canali (con k&amp;gt;n).&lt;br/&gt;&lt;br/&gt;Come nella struttura S-S-S ,possiamo usare la formula di CLOS.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Ipotesi del caso peggiore&lt;/strong&gt;:&lt;br/&gt;&lt;br/&gt;Sia una trama del primo stadio (la trama del blocco A). n-1 canali sono indisponibili,quindi noi permuteremmo l’unico canale libero nell’unica posizione libera in uscita in una trama (quella del blocco B)  del terzo stadio.&lt;br/&gt;&lt;br/&gt;Le n-1 posizioni occupate in uscita sulla trama del blocco A sono diverse dalle posizioni occupate in ingresso sulla trama del blocco B.&lt;br/&gt;&lt;br/&gt;Da cui si trova k = 2n-1. Il costo poi va minimizzato in funzione di n.&lt;br/&gt;&lt;br/&gt;Concludiamo l’articolo con la probabilità di non blocco delle strutture T-S-T e S-S-S.&lt;br/&gt;&lt;h5&gt;Probabilità di non blocco&lt;/h5&gt;&lt;br/&gt;Sia a la probabilità di avere una richiesta di connessione su una linea d’ingresso&lt;br/&gt;&lt;br/&gt;Supponiamo che l’indirizzamento della richiesta su una delle k uscite sia uniforme.&lt;br/&gt;&lt;br/&gt;Sia p la probabilità che una linea in uscita da un blocco del primo stadio sia occupata  = n x a /k&lt;br/&gt;&lt;br/&gt;1-p = probabilità  che almeno linea in uscita da un blocco del primo stadio sia occupata.&lt;br/&gt;&lt;br/&gt;(1-p)² = probabilità che almeno un percorso  intero dal primo stadio al terzo  sia occupato&lt;br/&gt;&lt;br/&gt;1-(1-p)²  = probabilità che un percorso  intero dal primo stadio al terzo  sia occupato&lt;br/&gt;&lt;br/&gt;Sappiamo che ci sono k percorsi&lt;br/&gt;&lt;br/&gt;(1-(1-p)²)&lt;sup&gt;k &lt;/sup&gt;= probabilità che tutti i percorsi  dal primo stadio al terzo  siano occupati.&lt;br/&gt;&lt;br/&gt;Sia P la probabilità di non blocco.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;P = (1-(1-p)²  )&lt;sup&gt;k &lt;/sup&gt;&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;Grazie per l’attenzione&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Riferimenti e Approfondiment&lt;/strong&gt;i:&lt;br/&gt;&lt;br/&gt;1.Slide del prof Fantacci dell&#39;&lt;a title=&quot;Universtà degli studi di Firenze&quot; href=&quot;http://www.unifi.it&quot;&gt;unifi&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;2.Appunti dello studente Roberto bandini dell&#39;unifi: &lt;a href=&quot;http://www.robertobandini.it/&quot;&gt;http://www.robertobandini.it&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/6328225856439563391/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/12/larchitettura-di-una-rete-di.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6328225856439563391'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6328225856439563391'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/12/larchitettura-di-una-rete-di.html' title='L’Architettura di una rete di connessione'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-7640581531316075848</id><published>2010-12-28T08:02:00.000+01:00</published><updated>2010-12-29T23:19:04.478+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="rete a maglia"/><category scheme="http://www.blogger.com/atom/ns#" term="rete a stella"/><category scheme="http://www.blogger.com/atom/ns#" term="rete di commutazione"/><category scheme="http://www.blogger.com/atom/ns#" term="rete di telecomunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="rete telefonica"/><category scheme="http://www.blogger.com/atom/ns#" term="rete telefonica nazionale"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="topologia di rete"/><title type='text'>Tutto quello che devi sapere sulle reti di telecomunicazioni</title><content type='html'>&lt;h1&gt;&lt;a rel=&quot;attachment wp-att-536&quot; href=&quot;http://studiconme.wordpress.com/2010/12/28/tutto-quello-che-devi-sapere-sulle-reti-di-telecomunicazioni/reti/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-536&quot; title=&quot;reti&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/reti.jpg&quot; alt=&quot;&quot; width=&quot;391&quot; height=&quot;294&quot; /&gt;&lt;/a&gt;&lt;/h1&gt;&lt;br/&gt;&lt;h1&gt;&lt;span style=&quot;font-weight:normal;font-size:13px;&quot;&gt;Una rete di telecomunicazione è un insieme di nodi che comunicano tra di loro mandandosi messaggi dove per ogni nodo s’intende un insieme di apparecchiature che gioca il ruolo di mittente, destinatario o entrambi. Al secondo del tipo di rete (rete di calcolatori o rete telefonica) un nodo può essere il telefono dell’utente o un calcolatore mentre il canale di comunicazione può essere cavo fisico, fibre ottiche o onde radio. Ci sono più tipologie di reti in base alla loro struttura.&lt;/span&gt;&lt;/h1&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;h2&gt;Tipologie di reti:&lt;/h2&gt;&lt;br/&gt;Come tipologie, abbiamo la configurazione a stella e quella a maglia:&lt;br/&gt;&lt;h3&gt;Rete a maglia:&lt;/h3&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-530&quot; href=&quot;http://studiconme.wordpress.com/2010/12/28/tutto-quello-che-devi-sapere-sulle-reti-di-telecomunicazioni/rete-a-maglia/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-530&quot; title=&quot;rete a maglia&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/rete-a-maglia.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;324&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Si tratta di una rete, dove ogni nodo è connesso (direttamente) con tutti gli altri nodi della rete tramite un collegamento bidirezionale.&lt;br/&gt;&lt;br/&gt;E una rete completamente interconnessa in cui ci può essere comunicazione simultanea visto che c’è un canale individuale per ogni copia di nodi. Si usa questa tipologia di rete quando il numero di nodi è piccolo. Lo svantaggio è il costo di allacciamento che cresce all’aumentare dei nodi nella rete. Per risparmiare si può usare una stella a stella.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;h3&gt;Rete a stella (Rete a commutazione):&lt;/h3&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-531&quot; href=&quot;http://studiconme.wordpress.com/2010/12/28/tutto-quello-che-devi-sapere-sulle-reti-di-telecomunicazioni/rete-a-stella/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-531&quot; title=&quot;Rete a Stella&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/rete-a-stella.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;313&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;In questa rete ci sono due tipi di nodi:&lt;br/&gt;&lt;br/&gt;Il nodo utente che è un nodo terminale che può essere o mittente o destinatario.&lt;br/&gt;&lt;br/&gt;Il nodo centrale che ha il compito di mettere in comunicazione due nodi utenti.  E ovvio che la comunicazione garantita non è simultanea per tutti i nodi. Si chiama anche centrale di commutazioni.&lt;br/&gt;&lt;br/&gt;Vediamo da più vicino come funzionano le centrali di commutazioni:&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;h4&gt;Centrale di commutazione:&lt;/h4&gt;&lt;br/&gt;Prima di vedere cosa sono le centrali di commutazione, definiamo cosa intendiamo per commutazione.&lt;br/&gt;&lt;br/&gt;Una commutazione è il processo che permette di definire opportunatamente il percorso mittente-destinatario.&lt;br/&gt;&lt;br/&gt;I compiti di una centrale di commutazione sono:&lt;br/&gt;&lt;br/&gt;-mettere in connessione due nodi utenti&lt;br/&gt;&lt;br/&gt;-mantenere la connessione fra due nodi utenti&lt;br/&gt;&lt;br/&gt;-abbattere la connessione fra due nodi utenti quando la comunicazione finisce&lt;br/&gt;&lt;br/&gt;-fornire servizi aggiuntivi della rete&lt;br/&gt;&lt;br/&gt;Ora vediamo la struttura della rete di commutazione:&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-532&quot; href=&quot;http://studiconme.wordpress.com/2010/12/28/tutto-quello-che-devi-sapere-sulle-reti-di-telecomunicazioni/struttura-a-blocchi-di-una-rete-di-commutazione/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-532&quot; title=&quot;Struttura a blocchi di una rete di commutazione&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/struttura-a-blocchi-di-una-rete-di-commutazione.jpg&quot; alt=&quot;&quot; width=&quot;579&quot; height=&quot;430&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Come si vede nella figura della struttura a blocco semplificata di una centrale di commutazione, ci sono tre parti principali:&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Le terminazioni entranti e uscenti&lt;/strong&gt;: Sono dispositivi che interfacciano la centrale con la linea esterna (linea utente o linea di un&#39;altra centrale.)&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;La rete di connessione&lt;/strong&gt;: si compone di apparecchiature di commutazione che permettono di collegare fisicamente e temporaneamente le linee interne provenendo dalla terminazione di entrata con quelle provenendo dalle terminazioni esterne nell’obiettivo di far comunicare due nodi utenti.&lt;br/&gt;&lt;br/&gt;Questa rete può essere a matrice:&lt;br/&gt;&lt;br/&gt;Esempio: Matrice (3x12)-3 linee per far comunicare 24 utenti.&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-533&quot; href=&quot;http://studiconme.wordpress.com/2010/12/28/tutto-quello-che-devi-sapere-sulle-reti-di-telecomunicazioni/esempio-linee/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-533&quot; title=&quot;esempio linee&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/esempio-linee.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;304&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;em&gt;Unità di comando e di segnalazione; &lt;/em&gt;&lt;/strong&gt;si tratta di un blocco costituito da un sistema a microprocessore in quanto svolge la funzione di identificare la terminazione d’ingresso a cui è collegato l’utente chiamante, di individuare la terminazione di uscita su cui evadere la richiesta di collegamento, di attivare la matrice per collegare la terminazione d’ingresso con quella d’uscita, disattivare la connessione al termine della telefonata, di ricevere le segnalazioni emesse dagli utenti per l’instradamento delle chiamate.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;br/&gt;Ora vediamo qualcosa di più interessante: le architetture di una rete di comunicazione; cene sono due principali quella gerarchica e quella non.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;h3&gt;Rete policentrica ma non gerarchica.&lt;/h3&gt;&lt;br/&gt;Si è già capito che con i problemi di costi non si può usare nei casi complessi (grande numero di utenti) le centrali di commutazione sono indispensabili. In quest’architettura, si usano due tipologie (a maglia e a stella).&lt;br/&gt;&lt;br/&gt;Detto semplicemente ,si tratta di una maglia di reti a stelle.&lt;br/&gt;&lt;br/&gt;Esempio con una rete urbana:&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-534&quot; href=&quot;http://studiconme.wordpress.com/2010/12/28/tutto-quello-che-devi-sapere-sulle-reti-di-telecomunicazioni/rete-policentrica-ma-non-gerarchica/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-534&quot; title=&quot;rete policentrica ma non gerarchica&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/rete-policentrica-ma-non-gerarchica.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;428&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Si capisce l’utilità della rete pensando a territori grandi che necessitano più reti urbane.&lt;br/&gt;&lt;br/&gt;L’unico limite è il costo e la difficoltà della gestione che cresce con la complessità della rete.&lt;br/&gt;&lt;br/&gt;Basta pensare a un intero paese che deve essere coperto dalla rete. Qui si può usare una rete policentrica gerarchica&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;h3&gt;Rete policentrica gerarchica.&lt;/h3&gt;&lt;br/&gt;Qui abbiamo una struttura a stella fatta di stelle. 2 utenti possono comunicare indipendentemente da dove si trovino. Quindi le centrali locali gestiscono le comunicazioni locali e sono tutte connesse fra di loro per permettere comunicazione fra utenti di diverse località. Pero gestire un gran numero di comunicazione simultaneamente richiede che centrali siano capaci di sopportare il volume di traffico entrante e uscente.&lt;br/&gt;&lt;br/&gt;Ora vediamo un esempio di architettura mista usata dalla rete telefonica nazionale.&lt;br/&gt;&lt;br/&gt;La rete telefonica nazionale è di tipo gerarchico con tipologia mista stella/maglia. Con questo tipo di struttura il traffico telefonico di aree geografiche, sempre maggiori man mano che aumenta la distanza dei centri che si devono collegare, viene instradato su una stessa via per utilizzare al meglio i collegamenti tra le centrali.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;br/&gt;Il territorio nazionale è diviso in diverse aree:&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;aree urbane&lt;/strong&gt;: che si trovano nei centri urbani:&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Settori&lt;/strong&gt;: insieme di aree urbane ubicate in centri di settore.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Distretto&lt;/strong&gt;: insieme di settori ubicati in centri di distretto.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Compartimenti&lt;/strong&gt;: insieme di distretti ubicati in centri di compartimento.&lt;br/&gt;&lt;br/&gt;Ecco la struttura globale della rete:&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-535&quot; href=&quot;http://studiconme.wordpress.com/2010/12/28/tutto-quello-che-devi-sapere-sulle-reti-di-telecomunicazioni/struttura-globa-della-rete-telefonica-nazione/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-535&quot; title=&quot;Struttura globa della rete telefonica nazione&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/struttura-globa-della-rete-telefonica-nazione.jpg&quot; alt=&quot;&quot; width=&quot;630&quot; height=&quot;888&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Terminiamo l’articolo parlando della trasmissione di messaggi fra utenti di una rete.&lt;br/&gt;&lt;br/&gt;Il metodo usato si chiama multiplexing. In pratica, un &lt;strong&gt;Multiplexer&lt;/strong&gt; viene utilizzato come intermediario tra l’elaboratore centrale e i terminali, con il compito di farli dialogare tra loro. Il collegamento prevede una linea ad alta velocità tra l’elaboratore e il Multiplexer, e linee meno veloci tra il Multiplexer e i vari terminali.&lt;br/&gt;&lt;br/&gt;Questo collegamento consente che su una stessa linea possano viaggiare &lt;strong&gt;contemporaneamente&lt;/strong&gt; informazioni provenienti da terminali diversi, utilizzando una tecnica di divisione del tempo chiamata &lt;strong&gt;Multiplexing&lt;/strong&gt;, che opera in maniera molto simile al time sharing (tempo condiviso). Il Multiplexer ha il compito di prelevare da ogni terminale, a intervalli di tempo regolari, i byte che questi inviano e di passarli all’elaboratore, che si occuperà di ricostruire il messaggio e di eseguire le operazioni richieste.&lt;br/&gt;&lt;br/&gt;Riferimenti e Approfondimenti&lt;br/&gt;&lt;br/&gt;1.Wikipedia: &lt;a href=&quot;http://it.wikipedia.org/wiki/Rete_per_telecomunicazioni&quot;&gt;http://it.wikipedia.org/wiki/Rete_per_telecomunicazioni&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;2.Articoli che trattano di reti di telecomunicazione su internet&lt;br/&gt;&lt;br/&gt;&amp;nbsp;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/7640581531316075848/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/12/tutto-quello-che-devi-sapere-sulle-reti.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/7640581531316075848'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/7640581531316075848'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/12/tutto-quello-che-devi-sapere-sulle-reti.html' title='Tutto quello che devi sapere sulle reti di telecomunicazioni'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-2712445021640674933</id><published>2010-12-28T07:09:00.000+01:00</published><updated>2010-12-29T23:19:04.463+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FDM"/><category scheme="http://www.blogger.com/atom/ns#" term="PCM"/><category scheme="http://www.blogger.com/atom/ns#" term="rete telefonica"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="TDM"/><category scheme="http://www.blogger.com/atom/ns#" term="trasmissione della voce"/><title type='text'>Introduzione alle reti telefoniche</title><content type='html'>&lt;h1&gt;&lt;a rel=&quot;attachment wp-att-522&quot; href=&quot;http://studiconme.wordpress.com/?attachment_id=522&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-522&quot; title=&quot;rete telefonica&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/rete-telefonica.jpg&quot; alt=&quot;&quot; width=&quot;242&quot; height=&quot;227&quot; /&gt;&lt;/a&gt;&lt;/h1&gt;&lt;br/&gt;La rete telefonica è una rete di telecomunicazione che permette a una coppia di utente (gli abbonati) di comunicare trasmettendosi messaggi vocali. La rete telefonica deve fornire una prestazione di conversazione normale, quasi come se si fosse in presenza fisica, riconoscendo sia &lt;em&gt;che cosa &lt;/em&gt;viene detto sia &lt;em&gt;chi &lt;/em&gt;parla all’altro estremo. Queste caratteristiche costituiscono lo standard di qualità della telefonia pubblica. Per una prestazione di questo livello all’utente è dato un circuito analogico avente banda di frequenze comprese fra 300 e 3400 Hz.&lt;br/&gt;&lt;h2&gt;Trasmissione analogica della voce:&lt;/h2&gt;&lt;br/&gt;Un segnale analogico è un&#39;onda elettromagnetica che varia con continuità e che può essere trasmesso sopra una larga varietà di mezzi; esempi sono i cavi quali il doppino telefonico, il cavo coassiale, la fibra ottica e la propagazione nell&#39;atmosfera o nello spazio. La rete telefonica trasferisce segnali elettrici analogici che rappresentano la voce. Su una linea ci sono più segnali. La tecnica di trasmissione usata si chiama FDM(&lt;strong&gt;Frequency Division Multipliplexing&lt;/strong&gt;) ovvero traslazione continua nel tempo in frequenza di ciascun segnale uscente da un telefono.  Questo segnale multiplato vera poi amplificato per aumentare l’energia del segnale analogico che diminuisce con la distanza.&lt;br/&gt;&lt;h2&gt;Trasmissione digitale della voce.&lt;/h2&gt;&lt;br/&gt;Le telecomunicazioni, originariamente rivolte a soddisfare le esigenze concernenti il trasporto del solo traffico voce, nel tempo si sono però spostate verso la necessità di trasferire informazioni di tipo digitale. Un segnale digitale è una sequenza di impulsi che possono invece essere trasmessi solo attraverso un cavo.  La rete telefonica usa un convertitore analogico/digitale detto &lt;em&gt;codec &lt;/em&gt;(&lt;em&gt;coder&lt;/em&gt;-&lt;em&gt;decoder&lt;/em&gt;) che in un verso esegue l’operazione di codifica, ossia prende il segnale analogico che rappresenta la voce e lo trasforma in un flusso di bit, nel verso opposto compie l’operazione inversa (decodifica).  La tecnica di codifica della voce di uso generalizzato nella rete telefonica pubblica è chiamata &lt;strong&gt;&lt;em&gt;Pulse Code Modulation &lt;/em&gt;&lt;/strong&gt;(PCM) e opera come segue:  -Il segnale che rappresenta la voce (curva A) è campionato a intervalli di tempo  equidistanti d&lt;em&gt;t&lt;/em&gt;. Si ottiene un treno di impulsi distanziati nel tempo di d&lt;em&gt;t&lt;/em&gt;.  -L’ampiezza di ogni impulso è rappresentata mediante un numero intero. Si ottiene  una successione di numeri che si susseguono nel tempo a intervalli d&lt;em&gt;t&lt;/em&gt;. Se ogni  numero è rappresentato da &lt;em&gt;n &lt;/em&gt;bit, si ha un flusso di &lt;em&gt;n &lt;/em&gt;bit ogni d&lt;em&gt;t &lt;/em&gt;secondi.  &lt;strong&gt;Il teorema del campionamento&lt;/strong&gt; ci assicura che, per ricostruire la nostra curva, si deve usare un  intervallo d&lt;em&gt;t &lt;/em&gt;pari alla metà del periodo corrispondente alla massima frequenza che si vuole  riprodurre. In altre parole, se vogliamo riprodurre tutte le frequenze fino a &lt;em&gt;f&lt;/em&gt;max dobbiamo  campionare con una frequenza 2d&lt;em&gt;f&lt;/em&gt;max. In telefonia si è visto che la frequenza massima è 3,4 kHz  che, arrotondata per eccesso a 4 kHz, prescrive una frequenza di campionamento di 8 kHz,  corrispondente a d&lt;em&gt;t &lt;/em&gt;= 125 µs.  La seconda operazione, ossia la sostituzione di un’ampiezza d’impulso con un numero,  introduce un errore dovuto al fatto che un numero di &lt;em&gt;n &lt;/em&gt;bit può rappresentare al massimo 2n  valori distinti (corrispondenti ad altrettanti livelli dell’impulso). Quando l’impulso assume un  valore intermedio fra due livelli viene approssimato con uno di essi e viene così alterato. Il  treno di impulsi alterati produrrà, in fase di ricostruzione del segnale, una forma d’onda (curva  B) diversa da quella originale. La differenza fra le due curve equivale a un disturbo chiamato  &lt;em&gt;rumore di quantizzazione&lt;/em&gt;.  &lt;a rel=&quot;attachment wp-att-521&quot; href=&quot;http://studiconme.wordpress.com/?attachment_id=521&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-521&quot; title=&quot;Voice coding &amp;amp; decoding&quot; src=&quot;http://studiconme.files.wordpress.com/2010/12/voice-coding-decoding.jpg&quot; alt=&quot;&quot; width=&quot;455&quot; height=&quot;277&quot; /&gt;&lt;/a&gt; La trasmissione fra centrali viene effettuata realizzando più giunzioni su una stessa linea fisica  mediante multiplazione a divisione di tempo (TDM: &lt;strong&gt;Time Division Multipliplexing&lt;/strong&gt;) da apparati detti multiplex (multiplatore) che affacciano canali da 64 kbit/s. Il collegamento deve essere mantenuto solo durante il tempo in cui ci sia sincronizzazione e individuazione del canale dove mandare il messaggio.  Concludiamo dicendo che oggi le reti si sono talmente modernizzate che si usa un sistema di rete che permette la trasmissione di dati multimedia (voce,video,immagini,testo). Sto parlando dell’ISDN&lt;br/&gt;&lt;br/&gt;Riferimenti e Approfondimenti:&lt;br/&gt;&lt;br/&gt;1. Wikipedia:   articolo: &lt;a href=&quot;http://it.wikipedia.org/wiki/Rete_telefonica&quot;&gt;http://it.wikipedia.org/wiki/Rete_telefonica&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;2. Appunti del l Prof  A. Lazzari dell&#39;università di Parma: &lt;a href=&quot;http://www.cedi.unipr.it/links/Corsi/telematica/Materiale/dispense/Telefonia/PSTN.html&quot;&gt;http://www.cedi.unipr.it/links/Corsi/telematica/Materiale/dispense/Telefonia/PSTN.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&amp;nbsp;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/2712445021640674933/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/12/introduzione-alle-reti-telefoniche.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/2712445021640674933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/2712445021640674933'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/12/introduzione-alle-reti-telefoniche.html' title='Introduzione alle reti telefoniche'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-5580824379641115240</id><published>2010-11-22T15:41:00.000+01:00</published><updated>2010-12-29T23:19:04.426+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AH"/><category scheme="http://www.blogger.com/atom/ns#" term="ESP"/><category scheme="http://www.blogger.com/atom/ns#" term="IKE"/><category scheme="http://www.blogger.com/atom/ns#" term="IP"/><category scheme="http://www.blogger.com/atom/ns#" term="IPsec"/><category scheme="http://www.blogger.com/atom/ns#" term="IPsecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="modalità trasporto"/><category scheme="http://www.blogger.com/atom/ns#" term="modalità tunnel"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="reti private"/><category scheme="http://www.blogger.com/atom/ns#" term="VPN"/><title type='text'>Tutto quello che devi sapere su IPSecure</title><content type='html'>&lt;h2&gt;Definizione&lt;/h2&gt;&lt;br/&gt;&lt;strong&gt;Internet Protocol Security (IPSec) &lt;/strong&gt;è una collezione di protocolli implementati da IETF che fornisce un metodo robusto e facilmente espandibile per garantire la sicurezza del protocollo IP, sia esso versione 4 sia 6, e dei protocolli di livello superiore (come ad esempio UDP e TCP), proteggendo i pacchetti che viaggiano tra due sistemi host, tra due security gateway (ad esempio router o firewall) oppure tra un sistema host e una security gateway.&lt;br/&gt;&lt;br/&gt;La sicurezza viene raggiunta attraverso la &lt;a href=&quot;http://it.wikipedia.org/wiki/Cifratura&quot;&gt;cifratura&lt;/a&gt; e l&#39;&lt;a href=&quot;http://it.wikipedia.org/wiki/Autenticazione&quot;&gt;autenticazione&lt;/a&gt; dei &lt;a href=&quot;http://it.wikipedia.org/wiki/Pacchetto&quot;&gt;pacchetti&lt;/a&gt; IP. La sicurezza viene fornita, quindi, a &lt;a href=&quot;http://it.wikipedia.org/wiki/Livello_di_rete&quot;&gt;livello di rete&lt;/a&gt;. La capacità di fornire protezione a livello di rete rende questo &lt;a href=&quot;http://it.wikipedia.org/wiki/Protocollo_di_rete&quot;&gt;protocollo&lt;/a&gt; trasparente al livello delle applicazioni che non devono essere modificate.&lt;br/&gt;&lt;br/&gt;IPSec permette di:&lt;br/&gt;&lt;ul&gt;&lt;br/&gt;	&lt;li&gt;Rendere sicure le comunicazioni tra diversi uffici di un’organizzazione.&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;Rendere sicuro l’accesso remoto via Internet.&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;Stabilite connettività intranet/extranet con partner aziendali.&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;Miglioramenti nella sicurezza del commercio elettronico.&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;Rendere sicure le VPN basate su reti IP.&lt;/li&gt;&lt;br/&gt;&lt;/ul&gt;&lt;br/&gt;IP Sec offre come servizi principali:&lt;br/&gt;&lt;ul&gt;&lt;br/&gt;	&lt;li&gt;Controllo degli accessi;&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;Integrità dei datagrammi;&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;Autenticazione dell&#39;origine dei dati;&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;Rifiuto dei pacchetti introdotti nuovamente in rete (una forma parziale di verifica dell&#39;integrità di sequenza);&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;Riservatezza (mediante l&#39;uso della crittografia);&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;Limitata riservatezza del flusso del traffico.&lt;/li&gt;&lt;br/&gt;&lt;/ul&gt;&lt;br/&gt;&lt;h2&gt;Come funziona IPsec?&lt;/h2&gt;&lt;br/&gt;&lt;strong&gt; &lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;IPSec crea delle comunicazioni sicure che sono basate su:&lt;br/&gt;&lt;br/&gt;-         Protocolli di garanzia dell&#39;integrità dei dati&lt;br/&gt;&lt;br/&gt;-         Algoritmi cronografici&lt;br/&gt;&lt;br/&gt;Per ogni trasmissione di dati, IPSec stabilisce una connessione di un certo tempo.&lt;br/&gt;&lt;br/&gt;Per ogni trasmissione IPSec tiene un certo numero d’informazione sulla connessione usando La SAD (Security Association Database.)&lt;br/&gt;&lt;br/&gt;Per controllare gli accessi alla connessione IPSec usa la SPD (Security Policy Database).&lt;br/&gt;&lt;br/&gt;Per garantire l&#39;integrità dei dati L&#39;IPSec usa 2 protocolli (&lt;a href=&quot;http://it.wikipedia.org/w/index.php?title=Authentication_Header&amp;amp;action=edit&amp;amp;redlink=1&quot;&gt;Authentication Header&lt;/a&gt; (AH) e &lt;a href=&quot;http://it.wikipedia.org/w/index.php?title=Encapsulating_Security_Payload&amp;amp;action=edit&amp;amp;redlink=1&quot;&gt;Encapsulating Security Payload&lt;/a&gt; (ESP). )&lt;br/&gt;&lt;br/&gt;Per garantire lo scambio delle chiavi e realizzare un flusso crittografato, IPSec usa il protocollo IKE (Internet Key Exchange.)&lt;br/&gt;&lt;br/&gt;Per funzionare IPSec ha due modalità:&lt;br/&gt;&lt;br/&gt;-&lt;strong&gt;Modalità Trasporto (Transport Mode)&lt;/strong&gt;: quando, tra due sistemi terminali di una connessione IPSec, viene a essere garantita la sicurezza dei protocolli di livello superiore a IP;&lt;br/&gt;&lt;br/&gt;-&lt;strong&gt;Modalità Tunnel (Tunnel Mode)&lt;/strong&gt;: quando gli attori vengono a essere le security gateway e la sicurezza è data a tutto il pacchetto IP.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Figura1: Architettura dell&#39;IPSec&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;a rel=&quot;attachment wp-att-492&quot; href=&quot;http://studiconme.wordpress.com/2010/11/22/tutto-quello-che-devi-sapere-su-ipsecure/ipsec-architecture/&quot;&gt;&lt;img title=&quot;IPsec architecture&quot; src=&quot;http://studiconme.files.wordpress.com/2010/11/ipsec-architecture.jpg&quot; alt=&quot;IPsec architecture&quot; width=&quot;594&quot; height=&quot;212&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h2&gt;IPsec in dettaglio&lt;/h2&gt;&lt;br/&gt;&lt;strong&gt; &lt;/strong&gt;&lt;br/&gt;&lt;h3&gt;Security Policy Database (SPD)&lt;/h3&gt;&lt;br/&gt;SPD definisce i requisiti di sicurezza per IPSec. E&#39; consultato ogni qualvolta sia necessario trattare del traffico, sia in ingresso sia in uscita e basandosi su caratteristiche legate al protocollo IP, oppure a quanto contenuto nei protocolli di livello superiore, permette l&#39;applicazione di un semplice criterio:&lt;br/&gt;&lt;ul&gt;&lt;br/&gt;	&lt;li&gt;&lt;strong&gt;Scarta&lt;/strong&gt;: impedirà al pacchetto di entrare/uscire;&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;&lt;strong&gt;Non applicare&lt;/strong&gt;: non applicherà i servizi di sicurezza al pacchetto in uscita e non si aspetterà di averne sul pacchetto in entrata;&lt;/li&gt;&lt;br/&gt;	&lt;li&gt;&lt;strong&gt;Applica&lt;/strong&gt;: applicherà i servizi di sicurezza al pacchetto in uscita e si aspetterà di averne sul pacchetto in entrata.&lt;/li&gt;&lt;br/&gt;&lt;/ul&gt;&lt;br/&gt;&lt;h3&gt;Security Association (SA) e Security Association Database (SAD)&lt;/h3&gt;&lt;br/&gt;Una SA è un insieme di accordi circa i protocolli, gli algoritmi crittografici e le chiavi da utilizzare per la comunicazione IPSec.&lt;br/&gt;&lt;br/&gt;Ogni SA, che sia creata manualmente o come vedremo dopo, mediante IKE, definisce, anche in base al protocollo utilizzato, che sia esso AH o ESP, un legame di tipo unidirezionale. Supponendo, ad esempio, di avere due sistemi, A e B, connessi mediante IPSec, si avrà per ognuno dei due una SA&lt;sub&gt;ingresso&lt;/sub&gt; ed una SA&lt;sub&gt;uscita&lt;/sub&gt;, aventi però gli stessi parametri dal punto di vista crittografico.&lt;br/&gt;&lt;br/&gt;SAD è l&#39;archivio all&#39;interno del quale, ogni singolo sistema conserverà un elenco delle SA attive, identificandole con i seguenti parametri.&lt;br/&gt;&lt;ul&gt;&lt;br/&gt;	&lt;li&gt; Gli indirizzi IP dei &lt;em&gt;peer&lt;/em&gt; coinvolti nella comunicazione.&lt;/li&gt;&lt;br/&gt;	&lt;li&gt; Il protocollo che sarà utilizzato per il tunnel (AH o ESP.)&lt;/li&gt;&lt;br/&gt;	&lt;li&gt; Le tecniche di cifratura utilizzate e le relative chiavi.&lt;/li&gt;&lt;br/&gt;	&lt;li&gt; Un intero a 32 bit chiamato SPI, acronimo per Security Parameter Index.&lt;/li&gt;&lt;br/&gt;&lt;/ul&gt;&lt;br/&gt;&lt;h3&gt;Autentication Header (AH)&lt;/h3&gt;&lt;br/&gt;AH rappresenta una &lt;strong&gt;Semplice autenticazione &lt;/strong&gt;e permette di autenticare il mittente ed evitare attacchi “man in the middle”.&lt;br/&gt;&lt;br/&gt;Garantisce l&#39;integrità del messaggio ma non offre la confidenzialità.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Figura2: Autentication Header&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;a rel=&quot;attachment wp-att-494&quot; href=&quot;http://studiconme.wordpress.com/2010/11/22/tutto-quello-che-devi-sapere-su-ipsecure/autentication-header/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-494&quot; title=&quot;Autentication Header&quot; src=&quot;http://studiconme.files.wordpress.com/2010/11/autentication-header.jpg&quot; alt=&quot;Autentication Header&quot; width=&quot;562&quot; height=&quot;171&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;/strong&gt;&lt;br/&gt;&lt;h3&gt;Encapsulating Security Payload (ESP)&lt;/h3&gt;&lt;br/&gt;Corrisponde allo scenario di autenticazione e crittazione.&lt;br/&gt;&lt;br/&gt;Abbiamo autenticazione del mittente &lt;em&gt;e&lt;/em&gt; crittazione del payload. Livello massimo di sicurezza, ma viene “oscurato” il payload IP, quindi crea problemi per il caching, il filtering e la gestione della QoS.&lt;br/&gt;&lt;br/&gt;In questo caso abbiamo confidenzialità e controllo d’integrità del messaggio.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Figura 3:Encapsulating Security Payload:&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;a rel=&quot;attachment wp-att-495&quot; href=&quot;http://studiconme.wordpress.com/2010/11/22/tutto-quello-che-devi-sapere-su-ipsecure/encapsulating-secrity-payload/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-495&quot; title=&quot;Encapsulating secrity Payload&quot; src=&quot;http://studiconme.files.wordpress.com/2010/11/encapsulating-secrity-payload.jpg&quot; alt=&quot;Encapsulating secrity Payload&quot; width=&quot;576&quot; height=&quot;182&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;/strong&gt;&lt;br/&gt;&lt;h3&gt;Modalità di Funzionamento:&lt;/h3&gt;&lt;br/&gt;&lt;strong&gt;Figura 4: Modalità di Funzionamento dell&#39;IPSec:&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;a rel=&quot;attachment wp-att-497&quot; href=&quot;http://studiconme.wordpress.com/2010/11/22/tutto-quello-che-devi-sapere-su-ipsecure/modalita-di-funzionamento-ipsec-2/&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-497&quot; title=&quot;Modalità di funzionamento Ipsec&quot; src=&quot;http://studiconme.files.wordpress.com/2010/11/modalitc3a0-di-funzionamento-ipsec1.jpg&quot; alt=&quot;Modalità di funzionamento Ipsec&quot; width=&quot;594&quot; height=&quot;309&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Trasporto:&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;Nella &lt;strong&gt;modalità trasporto, &lt;/strong&gt;l&#39;intestazione Ipsec è inserita subito dopo di quella dell&#39;IP. Il campo &lt;em&gt;Protocol &lt;/em&gt;nell&#39;intestazione IP è cambiato in modo da indicare che un&#39;intestazione IPsec segue quella solita dell&#39;IP. L&#39;intestazione IPsec contiene le&lt;br/&gt;&lt;br/&gt;informazioni di sicurezza: l&#39;identificatore SA, un nuovo numero di sequenza,&lt;br/&gt;&lt;br/&gt;eventualmente un controllo d’integrità del campo payload.&lt;br/&gt;&lt;br/&gt;La modalità trasporto non cambia di molto la lunghezza del pacchetto. Aggiunge un&lt;br/&gt;&lt;br/&gt;intestazione al pacchetto IP detta AH (Authentication Header). AH garantisce il controllo&lt;br/&gt;&lt;br/&gt;dell&#39;integrità e la sicurezza contro gli attacchi di ricezione, ma non la segretezza (cioè la cifratura).Nel transport mode si devono ricalcolare i checksum dell’IP e del TCP.&lt;br/&gt;&lt;br/&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;Tunnel:&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;Nella &lt;strong&gt;modalità tunnel &lt;/strong&gt;l&#39;intero pacchetto IP, compresa l&#39;intestazione, è incapsulato nel corpo di un nuovo pacchetto IP con un&#39;intestazione IP completamente diversa. La modalità tunnel è utile quando il tunnel arriva in un posto diverso dalla sua destinazione finale. Il tunnel di solito arriva a una macchina con un gateway sicuro, per esempio il firewall dell&#39;azienda. Facendo terminare il tunnel su questa macchina sicura, il pacchetto è mandato in chiaro al destinatario sulla LAN dell&#39;azienda. Il firewall si occupa di decifrare il messaggio. La modalità tunnel è utile anche nella situazione in cui si vuole aggregare un insieme di connessioni TCP, per poi gestirle come un unico flusso cifrato. In questo modo si evita che un intruso possa avere informazioni sul traffico: per esempio chi sta mandando dei pacchetti, a chi li sta mandando e quanti ne sta inviando (Analisi del traffico).&lt;br/&gt;&lt;h2&gt;Casi Pratici di uso dell&#39;IPSec:&lt;/h2&gt;&lt;br/&gt;•    due diverse sedi comunicano tramite un tunnel reso sicuro,&lt;br/&gt;&lt;br/&gt;•    gli utenti esterni (telelavoro, utenti in viaggio, etc.) accedono alla rete aziendale tramite un canale sicuro, attraverso Internet non è possibile “vedere” il contenuto dei pacchetti.&lt;br/&gt;&lt;h2&gt;Vantaggi e Svantaggi dell&#39;IPSec:&lt;/h2&gt;&lt;br/&gt;&lt;strong&gt; &lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;IPsec è il miglior protocollo di sicurezza IP disponibile al momento. Il suo punto debole è però la sua complessità. IPsec contiene troppe opzioni e lascia troppa flessibilità al suo utilizzatore, mette a disposizione vari metodi per ottenere lo stesso risultato. Questa complessità addizionale ha un effetto devastante sugli standard di sicurezza.&lt;br/&gt;&lt;br/&gt;&lt;em&gt;La trappola della complessità&lt;/em&gt;&lt;br/&gt;&lt;br/&gt;Il nemico peggiore della sicurezza è la complessità. Fallimenti semplici sono semplici da evitare e spesso anche semplici da gestire. Con la complessità invece non si sa come comportarsi. Sistemi complessi mostrano di solito più fallimenti. La complessità non solo rende impossibile la creazione di un sistema sicuro, ma rende il sistema difficile da gestire. IPsec è troppo complesso per essere sicuro. Il progetto chiaramente cerca di supportare differenti situazioni con opzioni diverse. Ciò lo rende veramente complicato. Anche la documentazione è difficile da capire. IPsec ha due modi operativi: AH ed ESP. AH offre l&#39;autenticazione, ESP l&#39;autenticazione, la cifratura o entrambi. Esistono quindi 4 diversi&lt;br/&gt;&lt;br/&gt;modi per due macchine che vogliono comunicare tra loro usando l&#39;IPsec: transport/AH, tunnel/AH, transport/ESP, tunnel/ESP. Principalmente le funzionalità della modalità tunnel sono un sovra insieme delle funzionalità della modalità transport. L&#39;unico vantaggio di transport è la dimensione minore del pacchetto. Con l&#39;attuale sviluppo della banda larga si potrebbe eliminare del tutto la modalità transport. Lo stesso discorso vale per ESP e AH. Con una leggera modifica a ESP, includendo il controllo dell&#39;intestazione IP, si potrebbe eliminare anche AH, alleggerendo la complessità del progetto. Un&#39;altra debolezza di IPsec è l&#39;ordine in cui compie l&#39;autenticazione e la cifratura. IPsec esegue prima la cifratura e poi autentica il testo cifrato.&lt;br/&gt;&lt;br/&gt;&lt;em&gt;Tipico attacco a IPsec&lt;/em&gt;&lt;br/&gt;&lt;br/&gt;– supponiamo che due interlocutori abbiano stabilito una SA (che chiameremo SA1) e la usino per trasferire informazioni cifrate con il protocollo ESP (che chiameremo ESP1.)&lt;br/&gt;&lt;br/&gt;– finita la trasmissione, SA1 è cancellata.&lt;br/&gt;&lt;br/&gt;– supponiamo ora che qualche ora dopo i due interlocutori abbiano di nuovo la necessità di scambiare dati sensibili.&lt;br/&gt;&lt;br/&gt;– se il ricevente usa lo stesso &lt;em&gt;Security Parameter Index &lt;/em&gt;(l&#39;identificatore della connessione) della ricezione precedente un critto-analista potrebbe introdurre un pacchetto prelevato dalla trasmissione precedente.&lt;br/&gt;&lt;br/&gt;– il ricevente controlla l&#39;autenticazione e la trova valida, procede alla decrittazione del messaggio, presumibilmente con una chiave diversa da quella precedente, e si trova con dei dati spazzatura che potrebbero influire sulla stabilità del sistema.&lt;br/&gt;&lt;br/&gt;Quest’attacco si potrebbe evitare introducendo l&#39;autenticazione di tutto ciò che è usato per determinare il significato del messaggio.&lt;br/&gt;&lt;br/&gt;Ciononostante, utilizzando un algoritmo robusto di cifratura dei dati e stando attenti ai dettagli, si riesce a trasmettere i dati in modo abbastanza sicuro. Non esiste un&#39;alternativa valida che rimpiazza IPsec utilizzando IPv4, l&#39;attuale protocollo standard per le trasmissioni su Internet. Nello sviluppo di Ipv6, il nuovo protocollo per le trasmissioni Internet, si sta dando maggiore importanza alla sicurezza e quindi ci sarà da aspettarsi un supporto nativo alle funzioni di crittografia e di autenticazione sicura.&lt;br/&gt;&lt;br/&gt;&lt;em&gt;&lt;strong&gt;Riferimenti e approfondimenti:&lt;/strong&gt;&lt;/em&gt;&lt;br/&gt;&lt;br/&gt;1. Articolo Ipsec-How to su Pluto.it  |&lt;a title=&quot;pluto&quot; href=&quot;http://www.pluto.it/files/ildp/traduzioni/ipsec-howto&quot; target=&quot;_blank&quot;&gt; http://www.pluto.it/files/ildp/traduzioni/ipsec-howto&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;2.Wikipedia | &lt;a title=&quot;IPsec&quot; href=&quot;http://it.wikipedia.org/wiki/IPsec&quot; target=&quot;_blank&quot;&gt;http://it.wikipedia.org/wiki/IPsec&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;3. Presentazione Powerpoint di Fabrizio Grossi | Microsoft TechNet&lt;br/&gt;&lt;br/&gt;4.Tesina di Claudio Alberto Pisapia e Emanuel Weitschek | VPN e Sicurezza: IPSec&lt;br/&gt;&lt;br/&gt;5.Articolo di Antonio Magri sull&#39;IPSec | &lt;a href=&quot;http://www.amagri.it/sicurezza_ms_windows/vpn/ipsec&quot;&gt;http://www.amagri.it/sicurezza_ms_windows/vpn/ipsec&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;6. Presentazione Powerpoint di Tommaso Peccorela | &lt;a title=&quot;Sicurezza e Gestione delle Reti di Telecomunicazioni&quot; href=&quot;http://lart.det.unifi.it/webfm&quot; target=&quot;_blank&quot;&gt;Unifi&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/5580824379641115240/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/11/tutto-quello-che-devi-sapere-su.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/5580824379641115240'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/5580824379641115240'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/11/tutto-quello-che-devi-sapere-su.html' title='Tutto quello che devi sapere su IPSecure'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-889977656937384371</id><published>2010-11-11T15:00:00.000+01:00</published><updated>2010-12-29T23:19:04.412+01:00</updated><title type='text'>Secchione o ultimo della classe. Qual è il tuo posto?</title><content type='html'>&lt;img class=&quot;aligncenter&quot; title=&quot;secchione&quot; src=&quot;http://www.focus.it/media/notizie/2007/giugno/laif_01042373_secchione.jpg&quot; alt=&quot;sec&quot; width=&quot;303&quot; height=&quot;383&quot; /&gt;&lt;br/&gt;&lt;br/&gt;Nella nostra classe c’è sempre stato uno studente secchione, che prende voti alti, non si sa quando studia, però è sempre il primo. Allo stesso tempo c’è anche sempre un ultimo della classe, che si siede in fondo, disturba durante le lezioni, e non ha paura di nessuno. Il secchione fuori della scuola a volte è timido, introverso, ha pochi amici, è sempre rinchiuso a studiare. Invece l’ultimo della classe ha molti amici, organizza sempre le feste, è simpatico, ecc…&lt;br/&gt;&lt;br/&gt;Ora che siamo all’università sappiamo tutti che per trovare un lavoro non basta avere 110 e lode, ma devi anche avere capacità sociali per poterlo trovare.&lt;br/&gt;&lt;br/&gt;In questo articolo analizzeremo tutti e due gli studenti per capire come diventare studente modello all’università.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;h1&gt;Tipologie di studenti&lt;/h1&gt;&lt;br/&gt;&lt;strong&gt; &lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;Generalmente abbiamo sempre 3 tipi di studenti: super-dotati, fortunati e normali.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;SUPERDOTATI&lt;/strong&gt;: questi sono rarissimi, ma hanno delle alte capacità( memorizzazione, logica, matematica, ecc…) per fare un esempio loro studiano nelle enciclopedie e la sera per divertirsi ascoltano documentari di National Geographic. Si capisce che hanno una cultura molto ricca e a volte non sono compresi dai comuni mortali. Ad esempio, così era Einstein. Se non sei superdotato forse sei fortunato.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;FORTUNATI&lt;/strong&gt;: persone che hanno un IQ più elevato e delle capacità innate. Studiano pochissimo e capiscono molto velocemente. Praticamente avranno una media di 25 senza passare più di 4 ore al giorno a studiare. Ne troviamo di più ai giorni nostri, basta andare alle lauree e contare quelli giovani con 110 e lode. Forse ti senti fortunato, guarda il tuo libretto per verificarlo altrimenti sei normale.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;NORMALI&lt;/strong&gt;: sono studenti come te e me. Niente capacità nascoste, niente intelligenza speciale. La buona notizia è che anche noi possiamo avere una media alta, ma dobbiamo studiare un sacco.&lt;br/&gt;&lt;br/&gt;Con un po’ di costanza e di conoscenza di se stesso si arriva a fare cose straordinarie.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;br/&gt;Ora che sai circa che tipo di studente sei, vediamo quali sono i vantaggi ad essere uno studioso?&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;h1&gt;Vantaggi dello studioso:&lt;/h1&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;br/&gt;Uno studioso è un gran contenitore di conoscenza. Di solito studia circa bene e ha voti abbastanza alti. Quali sono i suoi vantaggi.&lt;br/&gt;&lt;br/&gt;-comprensione veloce: facendo un sacco di domande al prof durante o dopo la lezione, lo studente capisce molto più velocemente i concetti.&lt;br/&gt;&lt;br/&gt;-Condivisione: Lo studente che capisce e condivide diventa più padrone della materia perché lo spiega a tante persone.&lt;br/&gt;&lt;br/&gt;-Appunti degli appunti: Uno studente che sintetizza gli appunti presi a lezione, capisce e memorizza meglio gli argomenti.&lt;br/&gt;&lt;br/&gt;L’ultimo della classe ci può insegnare qualcosa di buono.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;h1&gt;Vantaggi ad essere ultimo della classe:&lt;/h1&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;br/&gt;L’ultimo della classe è il classico ribelle che fa tutto a modo suo, anche se è vietato o sbagliato.&lt;br/&gt;&lt;br/&gt;Allo stesso tempo sviluppa delle capacità interessanti:&lt;br/&gt;&lt;br/&gt;-Reti di conoscenze: parlando a tante persone e avendo un po’ d’amici, non ha problemi di comunicazione e può risolvere qualsiasi tipo di problema pratico chiamando la persona giusta se la conosce.&lt;br/&gt;&lt;br/&gt;-Capacita organizzative: Uno che organizza eventi e si sposta sempre in gruppo è molto abile nel riunire persone e organizzare attività coinvolgente.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;br/&gt;La domanda è, ma uno può essere entrambi studioso e Ultimo della classe?&lt;br/&gt;&lt;br/&gt;Meglio sarebbe possibile avere la buona parte d’entrambi i profili?&lt;br/&gt;&lt;br/&gt;La persona che risponde, risponderà anche alla leggendaria domanda dello Studente Modello.&lt;br/&gt;&lt;br/&gt;Come diventarlo?&lt;br/&gt;&lt;br/&gt;Io affermerei che non tutti lo vogliono o lo possono fare, ma in ogni caso dalla mia esperienza ci vogliono disciplina e cambiamento d’abitudini.&lt;br/&gt;&lt;br/&gt;Un po’ di consigli per finire:&lt;br/&gt;&lt;br/&gt;Siediti sempre in prima fila&lt;br/&gt;&lt;br/&gt;Tutti i giorni studierai&lt;br/&gt;&lt;br/&gt;Dai tuoi appunti, delle schede sintetizzerai.&lt;br/&gt;&lt;br/&gt;Ai professori delle domande farai&lt;br/&gt;&lt;br/&gt;Ai tuoi compagni i concetti spiegherai&lt;br/&gt;&lt;br/&gt;Questi consigli rispetterai</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/889977656937384371/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/11/secchione-o-ultimo-della-classe-qual-e.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/889977656937384371'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/889977656937384371'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/11/secchione-o-ultimo-della-classe-qual-e.html' title='Secchione o ultimo della classe. Qual è il tuo posto?'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-6541115467342547188</id><published>2010-11-11T14:47:00.000+01:00</published><updated>2010-12-29T23:19:04.399+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><title type='text'>Tutto quello che devi sapere su una VPN</title><content type='html'>[caption id=&quot;&quot; align=&quot;aligncenter&quot; width=&quot;450&quot; caption=&quot;vpn&quot;]&lt;img title=&quot;vpn&quot; src=&quot;http://www.andreabeggi.net/wp-content/vpn.gif&quot; alt=&quot;vvvvvpppppnnnnn&quot; width=&quot;450&quot; height=&quot;295&quot; /&gt;[/caption]&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;Una &lt;strong&gt;Virtual Private Network&lt;/strong&gt; o &lt;strong&gt;VPN&lt;/strong&gt; è una &lt;a title=&quot;Rete informatica&quot; href=&quot;http://it.wikipedia.org/wiki/Rete_informatica&quot;&gt;rete&lt;/a&gt; privata instaurata tra soggetti che utilizzano un sistema di trasmissione pubblico e condiviso come per esempio &lt;a title=&quot;Internet&quot; href=&quot;http://it.wikipedia.org/wiki/Internet&quot;&gt;Internet&lt;/a&gt;. Lo scopo delle reti VPN è di dare alle aziende le stesse possibilità delle linee private in affitto ad un costo inferiore sfruttando le reti condivise pubbliche. (Wiki)&lt;br/&gt;&lt;h2&gt;Qual è la differenza fra una VPN che usa un’infrastruttura privata e quella che ne usa una pubblica?&lt;/h2&gt;&lt;br/&gt;Una VPN con infrastruttura privata costa tanto  e è difficilmente riconfigurabile. Allo stesso tempo offre sicurezza e una qualita del servizio previdibile.&lt;br/&gt;&lt;br/&gt;Un tempo era l’unica opzione possibile per le reti private,mentre ora ci sono anche infrastrutture pubbliche(internet).&lt;br/&gt;&lt;br/&gt;Una VPN che sfrutta internet ha un costo basso e un ottima integrazione del protocolo IP  e si puo riconfigurare.&lt;br/&gt;&lt;br/&gt;Ci sono anche dei limiti:&lt;br/&gt;&lt;h3&gt;1.Sicurezza&lt;/h3&gt;&lt;br/&gt;Facendo viaggiare i dati una azienda via internet c’è possibilità di un intrusione esterna. Per ovviare al problema si puo usare:&lt;br/&gt;&lt;br/&gt;a)       Un firewall(è una bariera o filtro tra la rete privata e Internet)&lt;br/&gt;&lt;br/&gt;b)       IPsec(Protocollo di sicurezza del livello di rete basato sul pacchetto IP)&lt;br/&gt;&lt;br/&gt;c)       i server AAA(server Autenticazione,Autorizzazione,Accounting usati per un sicuro accesso in modo remoto  ad una VPN)&lt;br/&gt;&lt;br/&gt;d)       il criptaggio(Processo di codificare tutti idati mandati in modo che lo decodifichi solo il destinatario)&lt;br/&gt;&lt;h3&gt;2.La scarsità degli indirizzi di Routing&lt;/h3&gt;&lt;br/&gt;Qui si puo usare il NAT&lt;br/&gt;&lt;br/&gt;Vedere&lt;a class=&quot;aligncenter&quot; title=&quot;NAT&quot; href=&quot;http://studiconme.wordpress.com/2010/11/02/tutto-quello-che-devi-sapere-sul-nat/&quot; target=&quot;_self&quot;&gt;qui&lt;/a&gt; per gli approfondimenti sul NAT.&lt;br/&gt;&lt;h2&gt;Tipi di VPN&lt;/h2&gt;&lt;br/&gt;&lt;h3&gt;Remote Access VPN –VPDN(Virtual Private Dial-up Network)&lt;/h3&gt;&lt;br/&gt;E una conessione host to LAN utilizzato dale aziende che hanno dipendenti che hanno bisogno di connetersi alla rete dell’azienda da piu posti remoti. L’azienda in questo caso contatta un enterprise Service Provider che configura un NAS (Network access Server) e fornisce agli utenti della rete un software VPN speciale da usare sul loro computer per la connessione .&lt;br/&gt;&lt;h3&gt;Site-to-Site VPN&lt;/h3&gt;&lt;br/&gt;Attraverso internet l’azienda college piu siti insieme. Poi usando strumenti adeguati e criptaggio ad alta scala struttura una gerarchia di acessi a livelli rispetto alla natura dell’host di chi si connete.&lt;br/&gt;&lt;br/&gt;In pratica se si conette un cliente avra una certa vista della rette che sara diversa da quella accessibile da un dipendente dell’azienda.&lt;br/&gt;&lt;h2&gt;Perche usare le VPN?&lt;/h2&gt;&lt;br/&gt;Come l’abbiamo visto sono poco costose,sono semplici e si possono configurare.&lt;br/&gt;&lt;br/&gt;L’estendibilità della rete è facilitata e si gestisce comodamente con gli strumenti appositi.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt; &lt;/strong&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/6541115467342547188/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/11/tutto-quello-che-devi-sapere-su-una-vpn.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6541115467342547188'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6541115467342547188'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/11/tutto-quello-che-devi-sapere-su-una-vpn.html' title='Tutto quello che devi sapere su una VPN'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-6413855758535269987</id><published>2010-11-02T22:35:00.000+01:00</published><updated>2010-12-29T23:19:04.376+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="indirizzi ip"/><category scheme="http://www.blogger.com/atom/ns#" term="nat"/><category scheme="http://www.blogger.com/atom/ns#" term="nat dinamico"/><category scheme="http://www.blogger.com/atom/ns#" term="nat statico"/><category scheme="http://www.blogger.com/atom/ns#" term="network adress translation"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="traslazione di indirizzi ip"/><title type='text'>Tutto quello che devi sapere sul NAT</title><content type='html'>&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Il NAT(Network Adress Translation) è un metodo per alleviare il problema della scarsità d’indirizzi IPv4. In effetti, Il numero d’indirizzi ip usabili per l’instradamento dei pacchetti via internet non è sufficiente per soddisfare la richiesta.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;[caption id=&quot;&quot; align=&quot;aligncenter&quot; width=&quot;400&quot; caption=&quot;nat &quot;]&lt;img title=&quot;NAT&quot; src=&quot;http://www.blindhog.net/wp-content/uploads/2007/09/nat.jpg&quot; alt=&quot;NAT img&quot; width=&quot;400&quot; height=&quot;465&quot; /&gt;[/caption]&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Oltre ad essere pochi, gli indirizzi ip sono anche costosi.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Le aziende hanno il bisogno di non far vedere la struttura interna della loro intranet; la NAT gli aiuta a risolvere questo problema.&lt;/span&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;h2&gt;Principio di funzionamento:&lt;/h2&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;La NAT funziona al livello di rete (3 nello stack iso/osi) che è il livello dove lavorano i router sotto il livello di trasporto.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;La NAT funziona tramite un firewall o un router che è messo fra una rete privata e internet.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;All’interno della rete privata sono usati indirizzi ip non di routing che serve solo all’interno.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;La NAT ha un o più indirizzi ip di routing.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Quando la NAT riceve un pacchetto dall’interno, scambia l’indirizzo ip (con porta) interno con uno esterno valido per il routing e mantiene una tabella di routing per gestire le connessioni e le diverse comunicazioni fra host.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Se invece riceve un pacchetto dall&#39;esterno,verifica con la tabella di routing se c&#39;è  un host interno che aspetta un pacchetto se no ignora il pacchetto mandato.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Per un utente interno l’uso del NAT è del tutto trasparente e per l’host esterno gli sembra di avere una comunicazione con un host che ha l’indirizzo ip fornito dal NAT.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Una rete interna usa degli indirizzi ip riservati proprio a questo scopo:&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:Garamond;font-size:x-large;&quot;&gt;&lt;span style=&quot;font-size:21px;&quot;&gt;La tabella seguente rappresenta gli indirizzi ip che possono essere usati dalle reti private.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;table class=&quot;MsoNormalTable&quot; style=&quot;border:medium none;border-collapse:collapse;&quot; border=&quot;1&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot;&gt;&lt;br/&gt;&lt;tbody&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td style=&quot;border:1pt solid windowtext;width:252.8pt;padding:0 5.4pt;&quot; width=&quot;337&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Class&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;width:252.8pt;border:1pt 1pt 1pt medium solid solid solid none windowtext windowtext windowtext 0;padding:0 5.4pt;&quot; width=&quot;337&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Private Address Range &lt;/span&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td style=&quot;width:252.8pt;border:medium 1pt 1pt none solid solid 0 windowtext windowtext;padding:0 5.4pt;&quot; width=&quot;337&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;A&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;width:252.8pt;border:medium 1pt 1pt medium none solid solid none 0 windowtext windowtext 0;padding:0 5.4pt;&quot; width=&quot;337&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;10.0.0.0 - 10.255.255.255&lt;/span&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td style=&quot;width:252.8pt;border:medium 1pt 1pt none solid solid 0 windowtext windowtext;padding:0 5.4pt;&quot; width=&quot;337&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;B&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;width:252.8pt;border:medium 1pt 1pt medium none solid solid none 0 windowtext windowtext 0;padding:0 5.4pt;&quot; width=&quot;337&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;172.16.0.0 - 172.31.255.255&lt;/span&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td style=&quot;width:252.8pt;border:medium 1pt 1pt none solid solid 0 windowtext windowtext;padding:0 5.4pt;&quot; width=&quot;337&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;C&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;td style=&quot;width:252.8pt;border:medium 1pt 1pt medium none solid solid none 0 windowtext windowtext 0;padding:0 5.4pt;&quot; width=&quot;337&quot; valign=&quot;top&quot;&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;192.168.0.0 - 192.168.255.255&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;/tbody&gt;&lt;br/&gt;&lt;/table&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align:center;&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;h2&gt;Tipi di NAT&lt;/h2&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;h3&gt;NAT Statico:&lt;/h3&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Si tratta di una corrispondenza tra un indirizzo ip interno e uno esterno che è gestito dal NAT al momento di una comunicazione fra host interni e host da internet. &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;La connessione è trasparente, ma il problema della scarsità degli indirizzi ip non è risolto. &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Il NAT statico non è usato molto.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;h3&gt;NAPT (dinamico) -Network Adress and Port Translation&lt;/h3&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Richiede un protocollo di trasporto statefull (TCP).&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Il NAT deve gestire un numero d’indirizzi Ip esterni molto più piccolo del numero di host presente nella rete privata.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;C’è una traduzione dinamica degli indirizzi in altre parole ad un host interno è assegnato un indirizzo esterno libero in modo dinamico, quando vuole comunicare con l’esterno.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Questo è possibile grazie al meccanismo: traslazione di porta (porte diverse ma stesso indirizzo ip).&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;h2&gt;La sicurezza nell’uso della NAT&lt;/h2&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;La sicurezza è garantita dal mascheramento dell’indirizzo ip fornito dalla traduzione.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Visto che i pacchetti che vengono dal l’esterno non sono accettati,a meno che ci sia una connessione aperta prima da un host interno.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Il NAT da anche la sicurezza di un firewall.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;h2&gt;Limiti del NAT&lt;/h2&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Tanti servizi hanno bisogno di una comunicazione in cui il client può essere server e vice versa, ma il NAT non lo permette nel senso che una connessione che inizia dall’esterno(internet) difficilmente può essere legittimata dal NAT che ignora il pacchetto. &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Abbiamo per esempio servizi di condivisione di file, console di giochi con modalità live servizi VOIP &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Per rimediare al problema basta usare NAT in congiunzione con Ipsec(&lt;/span&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;uno standard per ottenere connessioni basate su &lt;a title=&quot;Rete informatica&quot; href=&quot;http://it.wikipedia.org/wiki/Rete_informatica&quot;&gt;reti&lt;/a&gt; &lt;a title=&quot;Internet Protocol&quot; href=&quot;http://it.wikipedia.org/wiki/Internet_Protocol&quot;&gt;IP&lt;/a&gt; sicure&lt;/span&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;).&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Per farlo, il firewall deve permettere i protocolli seguenti:&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Internet Key Exchange (IKE) - User Datagram Protocol (UDP) &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot; lang=&quot;EN-GB&quot;&gt;Encapsulating Security Payload (ESP) &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Authentication Header (AH) &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;&quot;&gt;Spero che hai gradito la lettura. Se hai dubbi,accomodati pure usando il form dei commenti qui sotto.&lt;/span&gt;&lt;/p&gt;&lt;br/&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:1.2pt;margin-left:18pt;line-height:18pt;&quot;&gt;&lt;span style=&quot;font-size:16pt;font-family:Garamond;color:black;&quot;&gt; &lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/6413855758535269987/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/11/tutto-quello-che-devi-sapere-sul-nat.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6413855758535269987'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6413855758535269987'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/11/tutto-quello-che-devi-sapere-sul-nat.html' title='Tutto quello che devi sapere sul NAT'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-6304015185304111928</id><published>2010-10-21T05:30:00.000+02:00</published><updated>2010-12-29T23:19:04.332+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="apparato di rete"/><category scheme="http://www.blogger.com/atom/ns#" term="gestione di rete"/><category scheme="http://www.blogger.com/atom/ns#" term="INMF"/><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="MIB"/><category scheme="http://www.blogger.com/atom/ns#" term="network component"/><category scheme="http://www.blogger.com/atom/ns#" term="NMS"/><category scheme="http://www.blogger.com/atom/ns#" term="reti"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="SMI"/><category scheme="http://www.blogger.com/atom/ns#" term="SNMP"/><title type='text'>Tutto quello che devi sapere su SNMP</title><content type='html'>&lt;h2&gt;Definizione&lt;/h2&gt;&lt;br/&gt;&lt;strong&gt;Simple Network Management Protocol&lt;/strong&gt; (&lt;strong&gt;SNMP&lt;/strong&gt;),definita dalla &lt;a title=&quot;Internet Engineering Task Force&quot; href=&quot;http://it.wikipedia.org/wiki/Internet_Engineering_Task_Force&quot;&gt;IETF&lt;/a&gt;(Internet Engineering Task Force) nella RFC 1157 è un protocollo Client/Server del livello applicazione dello Stack ISO/OSI  che fa parte del pacchetto TCP/IP e permette di gestire l’infrastruttura di intere reti&lt;br/&gt;&lt;br/&gt;Permette ad un amministratore di rete di :&lt;br/&gt;&lt;br/&gt;-monitorare e controllo di ogni apparato raggiungibile tramite la rete&lt;br/&gt;&lt;br/&gt;-monitorare le prestazioni della rete&lt;br/&gt;&lt;br/&gt;-diagnosticare problemi di rete&lt;br/&gt;&lt;h2&gt;Come funziona SMNP?&lt;/h2&gt;&lt;br/&gt;Un sistema di gestione di rete si basa su due elementi che comunicano fra di loro: un supervisore e degli agenti. Il supervisore è una console tramite il quale l’amministratore di rete esegue delle operazioni di gestione. Gli agenti sono delle entita che si trovano collegati ad ogni aparato di rete dal quale recuperano delle informazioni(informazioni hardware ,parametri di configurazione ,statistiche di prestazione o altro direttamente collegato al comportamento in corso dell’aparato in questione.)&lt;br/&gt;&lt;br/&gt;Queste informazioni sono  classificati in un database. SNMP permette il dialogo fra il supervisore e gli agenti tramite lo scambio di messagi SNMP che usano il protocollo UDP per il trasporto.&lt;br/&gt;&lt;br/&gt;Più in dettaglio, il manager dialoga con i sistemi gestiti essenzialmente in due modi: invia &lt;strong&gt;richieste SNMP&lt;/strong&gt; e riceve &lt;strong&gt;notifiche SNMP&lt;/strong&gt;.&lt;br/&gt;&lt;h2&gt;Quali sono i componenti SNMP?&lt;/h2&gt;&lt;br/&gt;&lt;h3&gt;Supervisore SNMP (il Client)&lt;/h3&gt;&lt;br/&gt;Il supervisore è un generalmente un calcolatore che l’amministratore utilizza per eseguire uno o piu NMS(Network Managment System : console che permette di fare operazioni di gestione). Il supervisore rimane in ascolto sulla porta UDP 162.&lt;br/&gt;&lt;h4&gt;Funzionalità importanti:&lt;/h4&gt;&lt;br/&gt;-Fare delle richieste agli agenti&lt;br/&gt;&lt;br/&gt;-Ricevere delle risposte dagli agenti&lt;br/&gt;&lt;br/&gt;-Modificare delle variabili negli agenti&lt;br/&gt;&lt;br/&gt;-Riconoscere eventi  asincroni  dagli agenti (tramite i TRAP)&lt;br/&gt;&lt;h3&gt;Managed Device(ogetto gestibile)&lt;/h3&gt;&lt;br/&gt;Dispositivo o apparato di rete che puo essere monitorato o gestito attraverso delle informazioni sulle sue caratteristiche.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Esempio&lt;/strong&gt;:Switch,Hub,router,server,Stampante…&lt;br/&gt;&lt;h3&gt;Agente SMNP (il server)&lt;/h3&gt;&lt;br/&gt;Un agente SNMP è un programma che integrato in un oggetto gestibile  che permette a quest’ultimo di raccogliere informazioni localmente in un database per poi renderlo disponibile al supervisore SNMP  quando viene richiesto. Ce ne sono di due tipi: quello standard (Net-SNMP) e quelli proprietari.L’agente rimane in ascolto sulla porta UDP 161&lt;br/&gt;&lt;h4&gt;Funzionalità importanti:&lt;/h4&gt;&lt;br/&gt;-collezionare informazioni di gestione sul suo comportamento e sull’ambiente&lt;br/&gt;&lt;br/&gt;-Caricare e scaricare informazioni di gestione come definiti nel database&lt;br/&gt;&lt;br/&gt;-Segnalare eventi al supervisore&lt;br/&gt;&lt;br/&gt;-Agire come proxy per un nodo della rete non compatibile con SNMP&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Diagramma di base di una comunicazione SNMP:&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/10/diag.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-457&quot; title=&quot;diag&quot; src=&quot;http://studiconme.files.wordpress.com/2010/10/diag.jpg&quot; alt=&quot;&quot; width=&quot;466&quot; height=&quot;481&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;span style=&quot;font-size:15px;font-weight:bold;&quot;&gt;Database MIB(Management Information Base)&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;Ogni SNMP contiene un database di informazioni sui propri parametri gestibili. Il supervisore SNMP usa questo database quando richiede informazioni da usare dal NMS.&lt;br/&gt;&lt;br/&gt;Questo database condiviso prende il nome di MIB. Gli oggetti nel MIB sono suddivisi in categorie (System,interface,Adress Translation,ip,icmp,Tcp,Udp,Egp,Transmission,Snmp)&lt;br/&gt;&lt;h4&gt;Struttura dell’MIB:&lt;/h4&gt;&lt;br/&gt;.&lt;br/&gt;&lt;br/&gt;SMI(Structure Management Information) definisce in modo standard come devono essere strutturate le informazioni e la loro gerarchia per essere inserite in un Information Base: MIB.&lt;br/&gt;&lt;br/&gt;Un MIB è strutturato in albero gerarchico e contiene parametri gestibili che sono identificati da un Object Identifier (OID).&lt;br/&gt;&lt;br/&gt;Ci sono 2 tipi di parametri gestibili :&lt;br/&gt;&lt;br/&gt;-scalari(una sola istanza dell’oggetto)  Esempio: Nome del venditore di un apparatoàrisposta unica&lt;br/&gt;&lt;br/&gt;- tabulari(un istanza multipla dell’ogetto) Esempio:L’utilizzo della CPU di un quad-Processoreà risposta con 4 elementi&lt;br/&gt;&lt;br/&gt;Ogni parametro gestito puo essere identificato dalla catena completa dei nomi degli ogetti sul suo cammino patendo dalla radice oppure dalla catena degli OID dei parametri del cammino in questione.&lt;br/&gt;&lt;br/&gt;Esempio: OID di “sysDescr” è &lt;em&gt;iso.organization.dod.internet.MGMT.MIB.SYSTEM&lt;/em&gt; è equivalente a 1.3.6.1.2.1.1&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/10/mib.jpg&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-458&quot; title=&quot;MIB&quot; src=&quot;http://studiconme.files.wordpress.com/2010/10/mib.jpg&quot; alt=&quot;&quot; width=&quot;476&quot; height=&quot;553&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h2&gt;Messaggi SNMP:&lt;/h2&gt;&lt;br/&gt;Il protocollo SNMP prevede sei tipi di messaggi:&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;em&gt;get-request&lt;/em&gt;&lt;/strong&gt; : utilizzata per il recupero di una o più informazioni contenute nel &lt;strong&gt;MIB &lt;/strong&gt;di un &lt;em&gt;Agent&lt;/em&gt; da parte di un &lt;em&gt;supervisore&lt;/em&gt;;&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;em&gt;get-next-request&lt;/em&gt;&lt;/strong&gt; : utilizzata per &quot;percorrere&quot; le strutture dati del &lt;strong&gt;MIB &lt;/strong&gt;di un &lt;em&gt;Agent&lt;/em&gt; da parte di un &lt;em&gt;supervisore&lt;/em&gt;, accedendo in  sequenza alla informazioni in esso contenute.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;em&gt;get-bulk &lt;/em&gt;&lt;/strong&gt;:utilizzata per leggere un MIB con un&#39;unica richiesta anziché utilizzare piu messaggi &lt;strong&gt;&lt;em&gt;get-next-request &lt;/em&gt;&lt;/strong&gt;da parte di un supervisore&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;em&gt;set-request&lt;/em&gt;&lt;/strong&gt; : utilizzata per la modifica delle informazioni contenute nel &lt;strong&gt;MIB &lt;/strong&gt;di un &lt;em&gt;Agent&lt;/em&gt; da parte di un &lt;em&gt;Supervisore&lt;/em&gt;;&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;em&gt;get-response&lt;/em&gt;&lt;/strong&gt;:utilizzata in risposta ad ognuna delle precedenti per inviare informazioni di risposta al supervisore (get, get-next) o per confermare l’operazione richiesta (set)&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;&lt;em&gt;trap&lt;/em&gt;&lt;/strong&gt; : utilizzata, nella comunicazione asincrona, per la segnalazione da parte di un &lt;em&gt;Agent&lt;/em&gt; ad un &lt;em&gt;supervisore&lt;/em&gt; di eventi considerati come eccezioni al normale funzionamento. Per l&#39;operazione di trap sono previsti un numero limitato di eventi predefiniti per i quali è definito l&#39;utilizzo di questa operazione;&lt;br/&gt;&lt;h2&gt;Il Pacchetto SMNP-PDU(Protocol Data Unit):&lt;/h2&gt;&lt;br/&gt;I pacchetti SNMP (SNMP-PDU) sono costituiti da una etichetta globale, contenente 3 campi, e dal messaggio SNMP vero e proprio. L’etichetta contiene:&lt;br/&gt;&lt;br/&gt;- &lt;em&gt;la lunghezza complessiva della PDU SNMP in ottetti,&lt;/em&gt;&lt;br/&gt;&lt;br/&gt;&lt;em&gt;- la versione del protocollo SNMP utilizzata per la codifica del messaggio,&lt;/em&gt;&lt;br/&gt;&lt;br/&gt;&lt;em&gt;- la stringa identificativa della “community” del mittente del messaggio.&lt;/em&gt;&lt;br/&gt;&lt;br/&gt;Quest’ultimo campo è utilizzato per realizzare i meccanismi di controllo dell&#39;accesso e di autorizzazione previsti in &lt;strong&gt;SNMP. &lt;/strong&gt;Tali meccanismi sono particolarmente semplici: la “&lt;em&gt;community&lt;/em&gt;” definisce una particolare relazione tra un Agente ed uno o più &lt;em&gt;supervisori&lt;/em&gt;: quando un&#39;entità &lt;strong&gt;SNMP&lt;/strong&gt; invia un messaggio, vi inserisce, &lt;span style=&quot;text-decoration:underline;&quot;&gt;in chiaro&lt;/span&gt;, la comunità di appartenenza; se questa viene accettata dall&#39;entità &lt;strong&gt;SNMP&lt;/strong&gt; che riceve il messaggio, l&#39;entità chiamante è riconosciuta come appartenete alla comunità e si procede all’esecuzione dell’operazione conseguente, altrimenti il messaggio viene ignorato.&lt;br/&gt;&lt;br/&gt;Ci sono tre tipi di community:&lt;br/&gt;&lt;br/&gt;monitor:permete di lavorare in Read only , quindi il supervisore puo solamente effetuare richieste agli agenti.&lt;br/&gt;&lt;br/&gt;Control:lavoro read/write;Qui i supervisori possono anche modificare degli informazioni di gestione tramite richieste del tipo set.&lt;br/&gt;&lt;br/&gt;Trap:permette a un agente di mandare un messaggio Trap SNMP al supervisore.&lt;br/&gt;&lt;h2&gt;Versioni di SNMP(v1-v2-v3)&lt;/h2&gt;&lt;br/&gt;Vediamo la differenza fra le 3 versioni si SNMP.&lt;br/&gt;&lt;table border=&quot;1&quot; cellspacing=&quot;0&quot; cellpadding=&quot;0&quot;&gt;&lt;br/&gt;&lt;tbody&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;169&quot; valign=&quot;top&quot;&gt;&lt;strong&gt; Versione&lt;/strong&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;183&quot; valign=&quot;top&quot;&gt;&lt;strong&gt;Sistema di Autenticazione&lt;/strong&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;154&quot; valign=&quot;top&quot;&gt;&lt;strong&gt;Criptaggio&lt;/strong&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;506&quot; valign=&quot;top&quot;&gt;&lt;strong&gt;funzionamento&lt;/strong&gt;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;169&quot; valign=&quot;top&quot;&gt;&lt;strong&gt;SNMPv1&lt;/strong&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;183&quot; valign=&quot;top&quot;&gt;Community&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;154&quot; valign=&quot;top&quot;&gt;No&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;506&quot; valign=&quot;top&quot;&gt;SNMPv1 utilizza un sitema di autenticazione   che una password di nome communty.&amp;nbsp;&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;169&quot; valign=&quot;top&quot;&gt;&lt;strong&gt;SNMPv2&lt;/strong&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;183&quot; valign=&quot;top&quot;&gt;MD5&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;154&quot; valign=&quot;top&quot;&gt;No&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;506&quot; valign=&quot;top&quot;&gt;SNMPv2 utilizza un sitema di autenticazione   che is basa sugli algoritmi MD5&amp;nbsp;&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;tr&gt;&lt;br/&gt;&lt;td width=&quot;169&quot; valign=&quot;top&quot;&gt;&lt;strong&gt;SNMPv3&lt;/strong&gt;&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;183&quot; valign=&quot;top&quot;&gt;MD5 o SHA&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;154&quot; valign=&quot;top&quot;&gt;DES&lt;/td&gt;&lt;br/&gt;&lt;td width=&quot;506&quot; valign=&quot;top&quot;&gt;SNMPv3 in piu dell’autenticazion   cifratta con MD5,fornisce un criptaggio DES&amp;nbsp;&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;/td&gt;&lt;br/&gt;&lt;/tr&gt;&lt;br/&gt;&lt;/tbody&gt;&lt;br/&gt;&lt;/table&gt;&lt;br/&gt;Il sitema di autenticazione del SNMPv1 non è in grado di garantire la completa sicurezza dell’accesso agli agenti, in quanto il trasporto in chiaro dell&#39;identificativo della comunità consente, in modo reletivamente facile, l’intercettazione della stringa di community e quindi l’intrusione di &lt;em&gt;Manager&lt;/em&gt; non autorizzati: a questo inconveniente si è cercato di porre rimedio attraverso la definizione di meccanismi più severi per l&#39;autenticazione e con l&#39;introduzione di meccanismi di crittografia, definiti dapprima nel &lt;strong&gt;S-SNMP&lt;/strong&gt; (&lt;em&gt;Secure-SNMP&lt;/em&gt;) e poi nell’&lt;strong&gt;SNMPv2&lt;/strong&gt;.&lt;br/&gt;&lt;br/&gt;Limitazione SNMPv1 e v2: &lt;span style=&quot;text-decoration:underline;&quot;&gt;community name in chiaro&lt;/span&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;à soggetti al packet sniffing&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;SNMPv3 ha tanti vantaggi:&lt;br/&gt;&lt;br/&gt;- il controllo dell’integrità dei pacchetti&lt;br/&gt;&lt;br/&gt;-autenticazione forte:trasmissione dei dati via un canale sicuro(crittografatto)&lt;br/&gt;&lt;br/&gt;-il criptaggio dei pacchetti&lt;br/&gt;&lt;h2&gt;Conclusione&lt;/h2&gt;&lt;br/&gt;Perche usare SNMP?&lt;br/&gt;&lt;br/&gt;-è semplice&lt;br/&gt;&lt;br/&gt;-richiede un insieme minimo di risorse per una sua efficiente implementazione&lt;br/&gt;&lt;br/&gt;-tutti gli apparati TCP/IP sono venduti con un Agente SNMP integrato&lt;br/&gt;&lt;br/&gt;-Si puo usare SNMP anche in una rete con dei nodi non-SNMP (introduzione di un “Proxy Agent”, ossia si utilizza un sistema separato che ospita un agente SNMP ed il MIB dell’apparato da gestire, e agisce per conto di questo nelle relazioni con il supervisore, trasformando le operazioni SNMP in comandi comprensibili dall’apparato e generando Trap verso il sistema di gestione in corrispondenza delle segnalazioni proprietarie che riceve. )&lt;br/&gt;&lt;br/&gt;Spero che ti è piaciuto l’articolo.</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/6304015185304111928/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/10/tutto-quello-che-devi-sapere-su-snmp.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6304015185304111928'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/6304015185304111928'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/10/tutto-quello-che-devi-sapere-su-snmp.html' title='Tutto quello che devi sapere su SNMP'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-7699157599277442144</id><published>2010-10-20T02:34:00.000+02:00</published><updated>2010-12-29T23:19:04.319+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="guasto"/><category scheme="http://www.blogger.com/atom/ns#" term="problema"/><category scheme="http://www.blogger.com/atom/ns#" term="rete"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><category scheme="http://www.blogger.com/atom/ns#" term="trouble ticket"/><title type='text'>Cosa sono i Trouble ticket?</title><content type='html'>[caption id=&quot;&quot; align=&quot;aligncenter&quot; width=&quot;225&quot; caption=&quot;&quot;]&lt;img title=&quot;tt&quot; src=&quot;http://t0.gstatic.com/images?q=tbn:bnhQnKaeo7E6yM:http://auto.linearcontrols.net:81/LinearTickets/images/trouble_ticket_button.jpg&amp;amp;t=1&quot; alt=&quot;tt1&quot; width=&quot;225&quot; height=&quot;224&quot; /&gt;[/caption]&lt;br/&gt;&lt;br/&gt;I  &lt;strong&gt;trouble ticket&lt;/strong&gt; sono un insieme di documenti che riportino tutte le informazioni utili relative a ciascun guasto verificatosi in una rete:  apparato, tipo di guasto, persona che lo ha gestito, soluzione adottata.&lt;br/&gt;&lt;br/&gt;Più imprese oggi usano dei servizi internet collegati  al cliente per riportare i guasti nei Trouble ticket.  Questi ticket quando non sono risolti entrano in una coda con priorità che viaggia nel sistema finche non viene assegnato ad un operatore abbastanza esperto per risolverlo.&lt;br/&gt;&lt;br/&gt;Nel RFC 1297 delL’IETF il  &lt;strong&gt;trouble ticket&lt;/strong&gt; viene paragonato alla scheda del paziente in un ospedale. Infatti tutti e due definiscono un problema e aiuta a coordinare il lavoro di piu persone che ci lavoreranno sopra in tempi diversi.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/7699157599277442144/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/10/cosa-sono-i-trouble-ticket.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/7699157599277442144'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/7699157599277442144'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/10/cosa-sono-i-trouble-ticket.html' title='Cosa sono i Trouble ticket?'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-4159499322293531470</id><published>2010-10-18T23:35:00.000+02:00</published><updated>2010-12-29T23:19:04.304+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="iso/osi"/><category scheme="http://www.blogger.com/atom/ns#" term="management"/><category scheme="http://www.blogger.com/atom/ns#" term="rete"/><category scheme="http://www.blogger.com/atom/ns#" term="Reti di Telecommunicazione"/><title type='text'>Organizzazione delle aree di management ISO/OSI</title><content type='html'>.Lo scopo principale del Network management ISO/OSI è riuscire a gestire oggetti che rappresentano i sette strati del modello di riferimento OSI e i servizi di comunicazione forniti dalla rete che si basi su tale famiglia di protocolli.Nell’ambito della standardizzazione OSI sulla gestione di rete sono descritte cinque aree funzionali. Tali settori riassumono le principali attività in cui  si esplicitano le funzionalità di Network Management.In alternativa ci sono standard di gestione proprietari oppure il protocollo di gestione SNMP, definito nell’ambito della famiglia di protocolli TCP/IP.&lt;br/&gt;&lt;br/&gt;&amp;nbsp;&lt;br/&gt;&lt;br/&gt;&lt;span style=&quot;font-size:26px;font-weight:bold;&quot;&gt;1.Fault Management&lt;/span&gt;&lt;br/&gt;&lt;br/&gt;Tra i principali compiti della gestione di rete centralizzata c’è certamente la &lt;strong&gt;rapida ed efficace individuazione dei guasti&lt;/strong&gt;, e tale è l’obiettivo della funzionalità di &lt;strong&gt;&lt;em&gt;gestione dei guasti&lt;/em&gt;&lt;/strong&gt;. E’ di fondamentale importanza in proposito “&lt;strong&gt;localizzare&lt;/strong&gt;” il guasto identificando con esattezza l’elemento di rete che ha generato il problema. La principale difficoltà nell’effettuare questa operazione è legata, come si è già detto, alla grande quantità di “sintomi” generati da un singolo problema. I guasti vengono normalmente segnalati sotto la forma di &lt;strong&gt;&lt;em&gt;allarmi&lt;/em&gt;&lt;/strong&gt; sulla &lt;em&gt;console&lt;/em&gt; d&#39;operatore. Una volta identificato l’elemento guasto, la rete deve essere &lt;strong&gt;riconfigurata&lt;/strong&gt;, sfruttando la presenza di eventuali ridondanze, per consentire il recupero della propria funzionalità. La riconfigurazione conseguente ad un guasto è spesso un’operazione molto critica. E’ infatti abbastanza frequente che nell’effettuare modifiche di configurazione ad un dispositivo tali modifiche non siano riportate anche su quello di riserva la cui messa in servizio potrebbe generare quindi altri problemi sulla rete.&lt;br/&gt;&lt;br/&gt;Fa parte delle funzionalità di gestione dei guasti anche la produzione di documenti (&lt;strong&gt;trouble ticket&lt;/strong&gt;) che riportino tutte le informazioni utili relative a ciascun guasto verificatosi:  apparato, tipo di guasto, persona che lo ha gestito, soluzione adottata.&lt;br/&gt;&lt;br/&gt;Tali dati possono essere utilizzati sia per motivi statistici e sia per essere di ausilio nella soluzione di problemi futuri.&lt;br/&gt;&lt;h1&gt;2.Configuration management:&lt;/h1&gt;&lt;br/&gt;Le funzionalità di &lt;strong&gt;&lt;em&gt;gestione della configurazione&lt;/em&gt;&lt;/strong&gt; forniscono all&#39;operatore una conoscenza in tempo reale della rete e dei parametri operativi degli elementi che la compongono. Tale conoscenza può essere acquisita attraverso l&#39;uso di strumenti di apprendimento automatico della struttura della rete e della configurazione dei suoi apparati (&lt;em&gt;Auto discovery)&lt;/em&gt; e di disegno automatico della mappa corrispondente (&lt;em&gt;Auto topology &lt;/em&gt;).&lt;br/&gt;&lt;br/&gt;La gestione della configurazione consiste inoltre nel fornire gli strumenti per modificare i parametri operativi di ciascuna risorsa gestibile nella rete: lo stato di un’interfaccia di un router (up/down), un indirizzo di una porta, i percorsi dei flussi di traffico sulla rete, etc..&lt;br/&gt;&lt;h1&gt;3.Accounting Management&lt;/h1&gt;&lt;br/&gt;La &lt;strong&gt;&lt;em&gt;gestione dell’ “accounting”&lt;/em&gt;&lt;/strong&gt; consiste fondamentalmente nel misurare l’impegno delle risorse di rete da parte dei diversi utilizzatori. Questo è fondamentale sia per un eventuale tariffazione degli utenti, nel caso di rete pubblica, sia per ripartire i costi di rete sui diversi settori di un’azienda, nel caso di rete privata.&lt;br/&gt;&lt;h1&gt;4.Performance Management&lt;/h1&gt;&lt;br/&gt;Lo scopo della &lt;strong&gt;&lt;em&gt;gestione delle prestazioni&lt;/em&gt;&lt;/strong&gt; è quello di poter valutare il comportamento e l’efficienza della rete e dei suoi singoli componenti. Ciò si ottiene attraverso il controllo di parametri indicatori (traffico sulle interfacce, tassi di errore, tempi di ritardo, etc.), i quali, registrati in opportuni archivi (log), costituiscono un utile mezzo per valutare la &lt;strong&gt;qualità del servizio&lt;/strong&gt; fornito dalla rete e per identificare potenziali situazioni critiche (ad esempio la congestione di nodi o di rami di rete.)&lt;br/&gt;&lt;br/&gt;Il &lt;strong&gt;&lt;em&gt;monitoring&lt;/em&gt;&lt;/strong&gt; delle prestazioni è anche essenziale per ottimizzare l’utilizzo delle risorse di rete attraverso una loro riallocazione dinamica in funzione delle reali esigenze di traffico.&lt;br/&gt;&lt;h1&gt;5.Security Management&lt;/h1&gt;&lt;br/&gt;La &lt;strong&gt;&lt;em&gt;gestione della sicurezza&lt;/em&gt;&lt;/strong&gt; è senza dubbio di importanza fondamentale: attraverso un sistema di gestione l&#39;operatore è infatti in grado di effettuare operazioni che possono avere un impatto enorme sull’efficienza di un’azienda, ed in caso di errori o di manovre fraudolente, è addirittura possibile, in molti casi, paralizzare completamente l’intera attività aziendale. E&#39; quindi indispensabile proteggere l&#39;accesso alle funzionalità più “delicate” del sistema di gestione mediante la definizione di differenti “viste” della rete e l’impiego di &lt;em&gt;password &lt;/em&gt;differenti per accedere alle diverse viste avendo quindi &lt;strong&gt;diversi livelli di accesso alle informazioni&lt;/strong&gt;. Oltre a tutti gli aspetti legati all’accesso del sistema di gestione, le funzionalità di gestione della sicurezza consistono anche, più in generale, nel gestire i &lt;strong&gt;diritti di accesso alla rete dall’esterno&lt;/strong&gt;, controllando la distribuzione delle password e monitorando i tentativi di ingresso nella rete, e nel controllare i meccanismi di protezione delle informazioni (distribuzione e verifica delle chiavi di crittografazione, etc.).&lt;br/&gt;&lt;br/&gt;PS: articolo ispirato da Wikipedia e dai slide  del Prof Peccorella</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/4159499322293531470/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/10/organizzazione-delle-aree-di-management.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/4159499322293531470'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/4159499322293531470'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/10/organizzazione-delle-aree-di-management.html' title='Organizzazione delle aree di management ISO/OSI'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-9209055069177209535</id><published>2010-07-25T20:53:00.000+02:00</published><updated>2010-12-29T23:19:04.288+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="potenza"/><category scheme="http://www.blogger.com/atom/ns#" term="potenza attiva"/><category scheme="http://www.blogger.com/atom/ns#" term="Teoria dei Circuiti"/><title type='text'>Massimo trasferimento della potenza attiva</title><content type='html'>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;h2&gt;Teorema:&lt;/h2&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image62.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;131&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb62.png&quot; width=&quot;461&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Quali devono essere le condizioni sul carico ZL affinché il generatore trasferisce su di esso la massima potenza attiva?&lt;/p&gt;  &lt;p&gt;Calcolo della potenza trasferita sul carico:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image63.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;64&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb63.png&quot; width=&quot;508&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Per quale valore di R e X la funzione f è massima??&lt;/p&gt;  &lt;p&gt;1.Sapendo che X di thevenin e del carico possono prendere valori positivi o negativi,si deduce che P sara massimo quando loro saranno opposti cioè:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image64.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;41&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb64.png&quot; width=&quot;135&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;2.Sapendo questo ora deriviamo la nostra funzione rispetto a R. Annullando la derivata calcolata ,si trova il valore di R che corrisponde al massimo P:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image65.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;85&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb65.png&quot; width=&quot;485&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Dopo un po&#39; di conti,abbiamo:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image66.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;40&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb66.png&quot; width=&quot;119&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;&lt;em&gt;Conclusione del teorema:&lt;/em&gt;&lt;/p&gt;  &lt;p&gt;Si ha la massima potenza trasferita sul carico quando :&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image67.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;52&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb67.png&quot; width=&quot;496&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Valore della potenza massima:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image68.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;166&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb68.png&quot; width=&quot;497&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;h3&gt;Caso particolare:il carico è una resistenza pura:&lt;/h3&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image69.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;128&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb69.png&quot; width=&quot;240&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Calcolo della potenza trasferita sul carico:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image70.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;70&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb70.png&quot; width=&quot;496&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Per quale valore di R&amp;#160; la funzione f è massima??&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image71.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;88&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb71.png&quot; width=&quot;514&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image72.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;81&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb72.png&quot; width=&quot;186&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;h2&gt;Rendimento e utilità:&lt;/h2&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image73.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;142&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb73.png&quot; width=&quot;426&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Il rendimento è del 50 % il che non è un rendimento soddisfacente.&lt;/p&gt;  &lt;p&gt;Quindi non si può usare il massimo trasferimento di potenza attiva per sistemi elettrici per l’energia.&lt;/p&gt;  &lt;p&gt;Nonostante questo ,il massimo trasferimento risulta una buona scelta per i sistemi elettrici per l’informazione.&lt;/p&gt;  &lt;h2&gt;Applicazione&lt;/h2&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image74.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;235&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb74.png&quot; width=&quot;494&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;1.Usiamo il metodo di Thevenin che ci permetterà di applicare il teorema di trasferimento massimo della potenza.&lt;/p&gt;  &lt;p&gt;Scelgo due punti A e B:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image75.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;147&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb75.png&quot; width=&quot;440&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Ora mi calcolo L’impedenza equivalente di Thevenin Zth:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image76.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;499&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb76.png&quot; width=&quot;464&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image77.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;110&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb77.png&quot; width=&quot;398&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;2.Ora mi calcolo&amp;#160; Vth:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image78.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;299&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb78.png&quot; width=&quot;481&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&amp;#160; &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;Ora applico la formula:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image79.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;96&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb79.png&quot; width=&quot;226&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Risultato:&amp;#160; P= 8 W.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image80.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;254&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb80.png&quot; width=&quot;477&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;1.Usiamo il metodo di Thevenin che ci permetterà di applicare il teorema di trasferimento massimo della potenza.&lt;/p&gt;  &lt;p&gt;Scelgo due punti A e B:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image81.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;201&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb81.png&quot; width=&quot;463&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Ora mi calcolo L’impedenza equivalente di Thevenin Zth:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image82.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;467&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb82.png&quot; width=&quot;489&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;IL nostro carico è formato da una resistenza R e un induttore L,quindi:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image83.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;72&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb83.png&quot; width=&quot;249&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;2.Ora mi calcolo&amp;#160; Vth:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image84.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;298&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb84.png&quot; width=&quot;508&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Ora applico la formula:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image79.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;display:inline;border-width:0;&quot; height=&quot;96&quot; alt=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb79.png&quot; width=&quot;226&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;Risultato:&amp;#160; P= 2,5&amp;#160; mW.&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/avatar1.jpg&quot;&gt;&lt;img title=&quot;avatar&quot; style=&quot;border-right:0;border-top:0;display:inline;margin-left:0;border-left:0;margin-right:0;border-bottom:0;&quot; height=&quot;232&quot; alt=&quot;avatar&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/avatar_thumb1.jpg&quot; width=&quot;244&quot; align=&quot;left&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/9209055069177209535/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/07/massimo-trasferimento-della-potenza.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/9209055069177209535'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/9209055069177209535'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/07/massimo-trasferimento-della-potenza.html' title='Massimo trasferimento della potenza attiva'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-7042769721168467145</id><published>2010-07-09T01:17:00.000+02:00</published><updated>2010-12-29T23:19:04.266+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bug"/><category scheme="http://www.blogger.com/atom/ns#" term="fault tollerance"/><category scheme="http://www.blogger.com/atom/ns#" term="Informatica Industriale"/><category scheme="http://www.blogger.com/atom/ns#" term="recovery block"/><category scheme="http://www.blogger.com/atom/ns#" term="routine"/><category scheme="http://www.blogger.com/atom/ns#" term="test di accetazione"/><title type='text'>Come funziona la block recovery?</title><content type='html'>Nella progettazione di software,ci sono a volte errori (bug) inevitabili all’interno del codice. Bisogna quindi trovare tecniche in grado di far comunque funzionare il programma gestendo bene questi errori. Una di queste tecniche è la &lt;strong&gt;block recovery.&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;E una tecnica che si basa su tre elementi software:&lt;br/&gt;&lt;br/&gt;&lt;span style=&quot;text-decoration:underline;&quot;&gt;&lt;br/&gt;-Routine primaria&lt;/span&gt;: esegue una funzione software critica;&lt;br/&gt;&lt;br/&gt;-&lt;span style=&quot;text-decoration:underline;&quot;&gt;Test di accettazione&lt;/span&gt;: controlla le uscite della routine primaria dopo ogni esecuzione;&lt;br/&gt;&lt;br/&gt;-&lt;span style=&quot;text-decoration:underline;&quot;&gt;Routine alternativa&lt;/span&gt;: realizza la stessa funzione della routine primaria.&lt;br/&gt;&lt;br/&gt;Come mai funziona ?&lt;br/&gt;&lt;br/&gt;La routine primaria può essere progettata in modo che sia la più veloce possibile, mentre la routine alternativa può essere più lenta (viene usata un minor numero di volte), implementata in modo semplice in modo da implementare correttamente le specifiche.&lt;br/&gt;&lt;br/&gt;(&lt;br/&gt;&lt;h2&gt;piccola parentesi per farvi capire meglio con un esempio&lt;/h2&gt;&lt;br/&gt;:&lt;br/&gt;&lt;br/&gt;Uno studente deve fare l’esame di informatica industriale.&lt;br/&gt;&lt;br/&gt;Decide di fare una preparazione veloce (Routine primaria)&lt;br/&gt;&lt;br/&gt;Cosi tenta il primo appello dopo una settimana di studio.&lt;br/&gt;&lt;br/&gt;Il prof valuto il Compito del nostro studente e decide che voto darlo-questo è il  &lt;span style=&quot;text-decoration:underline;&quot;&gt;Test di accettazione&lt;/span&gt; del nostro esempio.&lt;br/&gt;&lt;br/&gt;Se supera l’esame anche con un 18 accetterà comunque (ormai è l’ultimo esame prima di laurearsi e lui ha molto fretta oppure non ne può più dell’università)&lt;br/&gt;&lt;br/&gt;&lt;span style=&quot;color:#7a7a7a;&quot;&gt;ma se invece viene bocciato dovrà per forza rifare l’esame. Ora per essere sicuro di passare,decide di dedicare 3 settimane con un preparazione più lenta e impegnativa (senza cibo ne acqua no scherzo) -&lt;span style=&quot;text-decoration:underline;&quot;&gt;Routine alternativa&lt;/span&gt;&lt;/span&gt;&lt;br/&gt;&lt;blockquote&gt;&lt;span style=&quot;color:#7a7a7a;&quot;&gt;Si capisce che La routine alternativa in questo caso vera ripetuta finche lo studente non supera l’Esame oppure molla L’università (Errore peggiore???)&lt;/span&gt; )&lt;/blockquote&gt;&lt;br/&gt;&lt;h2&gt;Struttura della Block recovery&lt;/h2&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image60.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb60.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;136&quot; height=&quot;98&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;La clausola Ensure specifica il test di accettazione T, la clausola by indica la routine primaria P e la clausola else by individua la routine alternativa S da utilizzare se quella primaria fornisce dei risultati non corretti, si può inserire un numero arbitrario di clausole else by prima di del caso peggiore in cui bisogna accettare l’errore.&lt;br/&gt;&lt;h2&gt;Esempio di implementazione in Java&lt;/h2&gt;&lt;br/&gt;Se abbiamo due versioni diverse della stessa funzione:&lt;br/&gt;int fvers1(int x,y);&lt;br/&gt;int fvers2(int x,y);&lt;br/&gt;e un acceptance test :&lt;br/&gt;boolean acceptable(int x);&lt;br/&gt;Un recovery block si può realizzare come:&lt;br/&gt;int fsafe(int x,y);&lt;br/&gt;{&lt;br/&gt;int res;&lt;br/&gt;res = fvers1(x,y);&lt;br/&gt;if acceptable(res) return res;&lt;br/&gt;else {&lt;br/&gt;res = fvers2(x,y);&lt;br/&gt;if acceptable(res) return res;&lt;br/&gt;else failsafestate();&lt;br/&gt;}&lt;br/&gt;}&lt;br/&gt;&lt;br/&gt;failsafestate() è una funzione che ci permette di passare dallo stato di errore ad uno stato sicuro  (per esempio scrivendo un messaggio di errore con la possibilità di tornare indietro )&lt;br/&gt;&lt;h2&gt;Applicazione:&lt;/h2&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image61.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb61.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;482&quot; height=&quot;486&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Spero che hai imparato qualcosa leggendo questo articolo. Se hai dei dubbi o suggerimenti,lasca un commento qui sotto.&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/avatar_thumb.jpg&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;avatar&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/avatar_thumb.jpg&quot; border=&quot;0&quot; alt=&quot;avatar&quot; width=&quot;187&quot; height=&quot;178&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/firma_thumb.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;firma&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/firma_thumb.png&quot; border=&quot; alt=&quot; alt=&quot;&quot; width=&quot;171&quot; height=&quot;178&quot; /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/7042769721168467145/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/07/come-funziona-la-block-recovery.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/7042769721168467145'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/7042769721168467145'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/07/come-funziona-la-block-recovery.html' title='Come funziona la block recovery?'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-8142733395748667034</id><published>2010-07-08T04:02:00.000+02:00</published><updated>2010-12-29T23:19:04.248+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="amplificatore operazionale"/><category scheme="http://www.blogger.com/atom/ns#" term="amplificatore operazionale ideale"/><category scheme="http://www.blogger.com/atom/ns#" term="amplificatore operazionale reale"/><category scheme="http://www.blogger.com/atom/ns#" term="buffer"/><category scheme="http://www.blogger.com/atom/ns#" term="configurazione invertente ad operazionale"/><category scheme="http://www.blogger.com/atom/ns#" term="inseguitore di tensione"/><category scheme="http://www.blogger.com/atom/ns#" term="Teoria dei Circuiti"/><title type='text'>Amplificatore operazionale</title><content type='html'>Un amplificatore è una rete due porte con la quale  è possibile realizzare &lt;a href=&quot;http://it.wikipedia.org/wiki/Circuiti_elettronici&quot;&gt;circuiti elettronici&lt;/a&gt; in grado di effettuare numerose operazioni matematiche: la &lt;a href=&quot;http://it.wikipedia.org/wiki/Somma&quot;&gt;somma&lt;/a&gt;, la &lt;a href=&quot;http://it.wikipedia.org/wiki/Sottrazione&quot;&gt;sottrazione&lt;/a&gt;, la &lt;a href=&quot;http://it.wikipedia.org/wiki/Derivata&quot;&gt;derivata&lt;/a&gt;, l&#39;&lt;a href=&quot;http://it.wikipedia.org/wiki/Integrale&quot;&gt;integrale&lt;/a&gt;, il calcolo di &lt;a href=&quot;http://it.wikipedia.org/wiki/Logaritmo&quot;&gt;logaritmi&lt;/a&gt; e di &lt;a href=&quot;http://it.wikipedia.org/wiki/Antilogaritmo&quot;&gt;antilogaritmi&lt;/a&gt;.&lt;br/&gt;&lt;br/&gt;Ora vediamo come si presenta un amplificatore operazionale ideale :&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image51.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb51.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;193&quot; height=&quot;128&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Per un amplificatore operazionale ideale  abbiamo queste condizioni sulle variabili della figura :&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image52.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb52.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;206&quot; height=&quot;100&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Ecco una rappresentazione equivalente dell’amplificatore operazionale reale:&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image53.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb53.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;401&quot; height=&quot;199&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Caratteristiche per un amplificatore reale:&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image54.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb54.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;240&quot; height=&quot;100&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Cosi Notiamo due cose :&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image55.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb55.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;260&quot; height=&quot;31&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Io e Vo hanno un valore qualsiasi che dipende da quant’è grande Av.&lt;br/&gt;&lt;br/&gt;Vediamo qualche configurazioni standard dell’Amplificatore operazionale:&lt;br/&gt;&lt;h2&gt;Configurazione Invertente&lt;/h2&gt;&lt;br/&gt;Secondo Wikipedia,un amplificatore invertente con operazionale si ottiene applicando la tensione di ingresso Vs sul morsetto contraddistinto dal segno &quot;-&quot;, mentre l&#39;altro morsetto è a massa. Nell&#39;amplificatore invertente il segnale periodico uscente viene sfasato di 180º rispetto all&#39;ingresso (per questo il circuito è chiamato amplificatore &quot;invertente&quot;), ovvero il guadagno è negativo.&lt;br/&gt;&lt;br/&gt;Ora cercheremo di dimostrare che il guadagno è negativo.&lt;br/&gt;&lt;br/&gt;La figura dell’amplificatore invertente (caso ideale):&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image56.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb56.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;434&quot; height=&quot;284&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Usiamo il metodo ai nodi sul nodo x colorato in rosso:&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image57.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb57.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;430&quot; height=&quot;451&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h2&gt;Inseguitore di tensione o Buffer:&lt;/h2&gt;&lt;br/&gt;Si tratta di un amplificatore di tensione di guadagno unitario (&lt;em&gt;voltage follower&lt;/em&gt; in English ).Si ottiene un buffer applicando la tensione di ingresso Vs sul morsetto contraddistinto dal segno &quot;+&quot;, mentre l&#39;altro morsetto è a massa.&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image58.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb58.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;402&quot; height=&quot;283&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Usando il metodo ai nodi su x come prima si ottiene:&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image59.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb59.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;365&quot; height=&quot;476&quot; /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/8142733395748667034/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/07/amplificatore-operazionale.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/8142733395748667034'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/8142733395748667034'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/07/amplificatore-operazionale.html' title='Amplificatore operazionale'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-575861395615269794</id><published>2010-07-06T05:51:00.000+02:00</published><updated>2010-12-29T23:19:04.233+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="banda di conduzione"/><category scheme="http://www.blogger.com/atom/ns#" term="banda di valenza"/><category scheme="http://www.blogger.com/atom/ns#" term="conduttore"/><category scheme="http://www.blogger.com/atom/ns#" term="elettrone"/><category scheme="http://www.blogger.com/atom/ns#" term="Elettronica 1"/><category scheme="http://www.blogger.com/atom/ns#" term="isolante"/><category scheme="http://www.blogger.com/atom/ns#" term="lacuna"/><category scheme="http://www.blogger.com/atom/ns#" term="semiconduttore"/><title type='text'>Domande per capire isolanti,conduttori e semiconduttori</title><content type='html'>Isolanti:&lt;br/&gt;&lt;br/&gt;1.Com’è la banda di conduzione di un isolante ?&lt;br/&gt;&lt;br/&gt;-vuota&lt;br/&gt;&lt;br/&gt;Spiegazione: la &lt;a href=&quot;http://it.wikipedia.org/wiki/Banda_energetica_proibita&quot;&gt;banda energetica proibita&lt;/a&gt; essendo molto ampia, l&#39;energia termica non basta ad eccitare gli elettroni a sufficienza per andare oltre tale banda e poter arrivare alla banda di conduzione&lt;br/&gt;&lt;br/&gt;Conduttori:&lt;br/&gt;&lt;br/&gt;2.Com’è la banda di valenza rispetto a quella di conduzione in un conduttore?&lt;br/&gt;&lt;br/&gt;-In stretta contiguità, o addirittura sovrapposta&lt;br/&gt;&lt;br/&gt;Spiegazione. Gli elettroni liberi della banda di valenza possono facilmente passare da un livello di energia della banda di conduzione&lt;br/&gt;&lt;br/&gt;Semiconduttori:&lt;br/&gt;&lt;br/&gt;3.Com’è la struttura interna ad un semiconduttore?&lt;br/&gt;&lt;br/&gt;-Cristallina (Disposizione regolare)&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Spiegazione:&lt;/strong&gt; Ogni atomo ha 4 elettroni di valenza  e stabilisce quindi 4 legami covalenti con i 4 atomi adiacenti.&lt;br/&gt;&lt;br/&gt;4. All’aumentare della temperatura che succede nel semiconduttore?&lt;br/&gt;&lt;br/&gt;-Creazione copia LACUNA-ELETTRONE&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Spiegazione:&lt;/strong&gt; L’energia termica permette la rottura di un legame covalente nel reticolo cristallino&lt;br/&gt;&lt;br/&gt;5.La conducibilità  di un semiconduttore può aumentare quando viene drogato?&lt;br/&gt;&lt;br/&gt;-Si&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Spiegazione:&lt;/strong&gt;A temperatura ambiente , il quinto elettrone portato dall’atomo del drogaggio che non partecipa a nessun legame covalente diventa un elettrone di conduzione</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/575861395615269794/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/07/domande-per-capire-isolanticonduttori-e.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/575861395615269794'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/575861395615269794'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/07/domande-per-capire-isolanticonduttori-e.html' title='Domande per capire isolanti,conduttori e semiconduttori'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8242280512173556289.post-1355289333066700068</id><published>2010-07-04T17:43:00.000+02:00</published><updated>2010-12-29T23:19:04.206+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="capacita diagnostica"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="code-word"/><category scheme="http://www.blogger.com/atom/ns#" term="codici aritmetici"/><category scheme="http://www.blogger.com/atom/ns#" term="codici binari"/><category scheme="http://www.blogger.com/atom/ns#" term="codici ciclici"/><category scheme="http://www.blogger.com/atom/ns#" term="codici di parita"/><category scheme="http://www.blogger.com/atom/ns#" term="codifica"/><category scheme="http://www.blogger.com/atom/ns#" term="controllo"/><category scheme="http://www.blogger.com/atom/ns#" term="correzione errori"/><category scheme="http://www.blogger.com/atom/ns#" term="dati"/><category scheme="http://www.blogger.com/atom/ns#" term="decodifica"/><category scheme="http://www.blogger.com/atom/ns#" term="distanza di Hamming"/><category scheme="http://www.blogger.com/atom/ns#" term="Informatica Industriale"/><category scheme="http://www.blogger.com/atom/ns#" term="informazione"/><category scheme="http://www.blogger.com/atom/ns#" term="ridondanza"/><category scheme="http://www.blogger.com/atom/ns#" term="rilevamento errori"/><category scheme="http://www.blogger.com/atom/ns#" term="separabilita"/><category scheme="http://www.blogger.com/atom/ns#" term="sistemi affidabili"/><title type='text'>Codici binari nel progetto dei sistemi affidabili.</title><content type='html'>&lt;h2&gt;Definizione&lt;/h2&gt;&lt;br/&gt;Una codifica – code – e una maniera di rappresentare l’informazione o i dati, secondo un insieme di regole predefinito.&lt;br/&gt;&lt;br/&gt;Un code-word `e un insieme di simboli, digits se il sistema `e numerico, utilizzato per rappresentare una porzione di dati secondo una codifica specificato. Un code-word viene chiamato valido se rispetta tutte le regole definite dalla codifica,altrimenti viene chiamato non valido.&lt;br/&gt;&lt;br/&gt;Un code ha 2 parametri: n e k dove k sta per la lunghezza di un qualsiasi code-word e n sta per la sua dimensione.&lt;br/&gt;&lt;br/&gt;Il processo di codifica consiste nel prendere il dato originale e trovare il code-word corrispondente secondo la codifica scelta, cioè rappresentare il dato originale secondo le regole della codifica utilizzata.&lt;br/&gt;&lt;br/&gt;Il processo di decodifica consiste nel recuperare, a partire dal code-word in questione, il dato originale che esso rappresenta.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Dettaglio in immagine:&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image32.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb32.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;472&quot; height=&quot;305&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Può accadere pero che se in un code-word binario uno dei suoi bit viene alterato da vari disturbi durante il trasferimento, il code-word stesso rimanga sempre nell’insieme dei codici validi pur essendo incorretto per il dato originale che rappresenta.&lt;br/&gt;&lt;br/&gt;Per questo ci sono  &lt;strong&gt;tecniche  di rilevamento di errori&lt;/strong&gt;:che si basano su una codifica particolare.&lt;br/&gt;&lt;br/&gt;Cosi,se la codifica e stata&lt;br/&gt;progettata correttamente, l’alterazione di un singolo bit comporta, come risultato, un code-word che appartiene all’insieme&lt;br/&gt;dei codici illegali o non validi.&lt;br/&gt;&lt;h2&gt;Proprietà&lt;/h2&gt;&lt;br/&gt;&lt;h3&gt;1.Distanza di Hamming di un codice&lt;/h3&gt;&lt;br/&gt;&lt;h4&gt;Definizione&lt;/h4&gt;&lt;br/&gt;Per definire questo concetto ci serve prima definire il termine &lt;strong&gt;distanza di Hamming.&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;la distanza di Hamming tra due code-word `e data dal numero delle posizioni dei bit nelle quali le due parole differiscono.In altri termini, la distanza di Hamming misura il numero di &lt;em&gt;sostituzioni&lt;/em&gt; necessarie per convertire un code-word nell’altro. (Grazie Wiki)&lt;br/&gt;&lt;br/&gt;Si definisce &lt;strong&gt;distanza di Hamming di una codifica&lt;/strong&gt; come la minima distanza di Hamming calcolata tra tutte le possibili coppie di code-word della codifica.&lt;br/&gt;&lt;h4&gt;Conseguenze sulla rilevamento e la correzione di errori&lt;/h4&gt;&lt;br/&gt;&lt;strong&gt;Fatto1&lt;/strong&gt;:Si osservi che se due code-word hanno distanza di Hamming pari a 1 e sempre possibile, alterando un bit ad uno dei due, farlo coincidere con l’altro.&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Fatto2&lt;/strong&gt;:Se invece due code-word hanno distanza di Hamming pari a 2, non e&lt;br/&gt;assolutamente possibile, a partire da una delle due parole, recuperare l’altra alterando solo un bit in quanto i bit nei quali differiscono sono 2.&lt;br/&gt;&lt;h5&gt;rilevamento degli errori.&lt;/h5&gt;&lt;br/&gt;Questi fatti mostrano come la distanza di Hamming sia utile ai fini del rilevamento degli errori. Infatti,se una codifica e caratterizzata da una distanza di Hamming pari a 2, tutti gli errori su singolo bit sono rilevabili. Allo stesso modo, se una codifica e caratterizzata da una distanza di Hamming pari a 3, tutti gli errori su singolo bit e tutti gli errori su doppio bit sarebbero rilevabili. Inoltre si noti che per una codifica con distanza di Hamming pari a 3,&lt;br/&gt;&lt;h5&gt;correzione di errori&lt;/h5&gt;&lt;br/&gt;Per una codifica caratterizzata da una distanza di Hamming pari a 3,questi fatti mostrano che sarebbe possibile anche una correzione dell’errore su singolo bit in quanto il code-word risultante da un errore su singolo bit avrebbe una distanza di Hamming pari ad 1 rispetto ad uno solo dei code-word validi – cioè quello corretto – e almeno pari a 2 rispetto a tutti gli&lt;br/&gt;altri.&lt;br/&gt;&lt;br/&gt;Vediamo un esempio per capire meglio queste due conseguenze:&lt;br/&gt;&lt;br/&gt;Per il nostro esempio il code ha dimensione k=3 e viene rappresentato con un cubo dove ogni vertice è un code-word. I code-word validi sono colorati in azzurro.&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image33.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb33.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;488&quot; height=&quot;220&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h3&gt;2.La separabilità&lt;/h3&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image34.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb34.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;475&quot; height=&quot;105&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Una codifica separabile consiste nel conservare intatta l’informazione&lt;br/&gt;alla quale vengono concatenate le informazioni di controllo. Quindi, l’informazione originale concatenata con le informazioni di controllo aggiuntive forma la code-word. In questo modo, in fase di decodifica, l’unica cosa da fare e eliminare le informazioni di controllo e mantenere solo quelle di interesse. D’altra parte una codifica non separabile non possiede la proprietà della separabilità. Per questo motivo il recupero dell’informazione originale deve essere eseguito mediante una decodifica più complicata.&lt;br/&gt;&lt;h3&gt;3.ridondanza&lt;/h3&gt;&lt;br/&gt;La ridondanza si può definire come il costo aggiuntivo richiesto rispetto ad una codifica minima.&lt;br/&gt;&lt;br/&gt;La ridondanza può essere espressa come il rapporto tra il numero&lt;br/&gt;di bit della codifica e il numero di bit strettamente necessario a rappresentare tutte le informazioni codificate. La ridondanza può essere direttamente usata per determinare il costo della codifica. Di solito, una codifica con maggiore&lt;br/&gt;distanza di Hamming, e quindi migliore copertura di errori, ha ridondanza, e quindi costo maggiore.&lt;br/&gt;D’altra parte, il costo della codifica può essere anche limitato dalla semplicità della codifica e decodifica (cioè dal fatto che sia separabile o no).&lt;br/&gt;&lt;br/&gt;&lt;strong&gt;Formula matematica:&lt;/strong&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image35.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb35.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;215&quot; height=&quot;77&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h3&gt;4.la  capacità diagnostica&lt;/h3&gt;&lt;br/&gt;la sua capacita diagnostica è la capacita non solo di rilevare la presenza di un errore (e quindi di un guasto che ha provocato l’errore) ma anche di localizzare il guasto,indicare cioè quale componente e guasto. In generale, per avere capacita diagnostica occorre maggiore ridondanza, e quindi costo maggiore. Inoltre, la capacita diagnostica può essere utilizzata non soltanto per guidare la manutenzione del sistema, ma direttamente per correggere l’errore: se la capacita diagnostica e tale da fornire il vettore di errore,&lt;br/&gt;sommandolo (bit a bit, in modulo 2 - cioè con una batteria di XOR) alla parola errata si ottiene la parola corretta.&lt;br/&gt;Un codice con tale capacita e quindi &lt;strong&gt;un codice correttore di errore&lt;/strong&gt;.&lt;br/&gt;&lt;h2&gt;Tipologie&lt;/h2&gt;&lt;br/&gt;&lt;h3&gt;1.Codici di parità&lt;/h3&gt;&lt;br/&gt;La codifica più semplice consiste nel controllo della parità. E&#39; un codice per la rilevazione d&#39;errore.  Esistono molte variazioni rispetto all’idea che sta alla base&lt;br/&gt;di questa codifica. Esistono due tipi di parità: parità pari e parità dispari:&lt;br/&gt;&lt;br/&gt;La codifica di parità viene eseguita aggiungendo al word-code un bit con valore dipendente dal tipo di parità scelta in modo da avere un numero di bit “1” pari o dispari a seconda della parità in uso:&lt;br/&gt;&lt;br/&gt;- in una codifica con parità pari, il numero di tutti i bit “1” compreso il bit di parità è pari.Esempio:&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image36.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb36.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;136&quot; height=&quot;32&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;- in una codifica a parità dispari, il numero di tutti i bit “1” compreso il bit di parità è dispari.Esempio:&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image37.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb37.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;138&quot; height=&quot;26&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Si noti che, poiché la distanza da un code-word valido e l’altro, in entrambe le tipologie e pari ad 2, questa tecnica e in grado di rilevare gli errori su singolo bit, ma non e in grado di correggerli.&lt;br/&gt;&lt;br/&gt;Dato il modo in cui viene costruita la code-word: aggiunta del bit di controllo, la codifica di parità  e una codifica separabile.&lt;br/&gt;Un’applicazione comune che utilizza questa tecnica e rappresentata dalle memorie dei computer.&lt;br/&gt;&lt;br/&gt;La codifica/decodifica della parola, anche con questa semplice tecnica, comporta un hardware aggiuntivo, inoltre e necessario che la memoria abbia la capacita di contenere il bit aggiuntivo. L’hardware deve essere progettato quindi per la creazione e controllo dell’extra-bit. L’hardware è una batteria di XOR&lt;br/&gt;&lt;br/&gt;Si noti pero che il controllo di parità con singolo bit può non rilevare alcuni errori su più bit.&lt;br/&gt;state proposte quindi alcune varianti rispetto all’idea fondamentale, ne vedremo alcune:&lt;br/&gt;&lt;h4&gt;Bit-per-word&lt;/h4&gt;&lt;br/&gt;questa tecnica e stata appena discussa: aggiungere un bit di parità alla parola.&lt;br/&gt;&lt;br/&gt;Il principale svantaggio consiste nel fatto che alcuni errori possono non essere rilevabili. Ad esempio un fallimento completo, di un bus&lt;br/&gt;o dei buffer, che porta tutti i bit a 1 può essere rilevato da una parità dispari solo se il numero di bit e pari, lo stesso fallimento viene rilevato da una parità pari solo se il numero di bit della parola, compreso il bit di parità,&lt;br/&gt;e dispari. D’altra parte il fallimento che porta tutti i bit a 0 non può essere mai rilevato dalla parità pari in quanto una parola che vale zero viene considerata con un numero pari di 1. Viceversa questo fallimento viene sempre rilevato dalla parità dispari.&lt;br/&gt;&lt;h4&gt;Bit-per-byte&lt;/h4&gt;&lt;br/&gt;Questa tecnica consiste nell’utilizzare due bit di controllo e suddividere quindi la parola in due byte, un bit controlla un byte, l’altro bit controlla l’altro byte. Sebbene la tecnica si chiami bit-per-byte non e necessario che i gruppi siano esattamente di 8−bit.&lt;br/&gt;&lt;br/&gt;Per raggiungere completamente i vantaggi offerti da questa tecnica e necessario che il numero di bit di un gruppo sia pari e che un byte venga controllato con parità pari e l’altro con parità dispari. In questo modo entrambi gli errori con tutti i bit a 0 e a 1 vengono rilevati. Inoltre questa tecnica `e in grado di rilevare tutti gli errori su due bit purché un errore avvenga in un byte e l’altro errore avvenga nell’altro.&lt;br/&gt;&lt;br/&gt;Lo svantaggio di entrambe le tecniche: bit-per-word e bit-per-byte consiste nel fatto che gli errori multipli non sono sempre rilevabili. Considerando che i bit che formano una parola sono spesso assegnati a chip separati, , il fallimento di uno dei chip non viene identificato.&lt;br/&gt;&lt;h4&gt;Bit-per-multiple-chip&lt;/h4&gt;&lt;br/&gt;Per risolvere il problema precedente viene utilizzato un numero di bit di parità pari al numero di bit contenuti in un chip. Ciascun bit viene associato ad un solo bit di ciascun chip in questo modo un bit di parità controlla un solo bit di ogni chip. Come si può facilmente notare questa tecnica di parità e in grado di&lt;br/&gt;rilevare gli errori dovuti al fallimento di un intero chip, fallimento denominato come whole-chip failure mode.&lt;br/&gt;Sebbene questa variante della codifica di parità sia in grado rilevare il fallimento di un intero chip non e pero in grado di localizzare il chip danneggiato.&lt;br/&gt;&lt;h4&gt;Bit-per-chip&lt;/h4&gt;&lt;br/&gt;questa variante e stata sviluppata per ovviare al problema appena accennato. Funziona nel modo seguente: ciascun bit di parità viene assegnato ad un singolo chip. In questo modo non solo viene rilevato il fallimento di singolo chip, ma dato che ogni bit di parità e associato ad un unico chip, il fallimento e anche&lt;br/&gt;localizzabile. Lo svantaggio primario e pero lo stesso presentato dalla tecnica bit-per-word. Infatti il semplice controllo di parità su una parola non `&lt;br/&gt;&lt;br/&gt;e in grado di rilevare errori su più bit, di conseguenza se all’interno di un&lt;br/&gt;singolo chip si verificano errori multipli, tali fallimenti potrebbero non venire rilevati.&lt;br/&gt;&lt;h4&gt;Interlaced&lt;/h4&gt;&lt;br/&gt;un altro tipo di organizzazione dei bit consiste nella parità interlacciata. E’ simile, in concetto, alla parità bit-per-multiple-chip. La differenza sostanziale consiste nel fatto che questo tipo di parità non tiene conto dell’organizzazione fisica dei bit come accade per la multiple-chip. La parola viene suddivisa in gruppi di uguale lunghezza di bit e i bit di parità vengono organizzati in modo tale che non sia possibile che due bit adiacenti del code-word appartengono allo stesso gruppo. La parità interlacciata e utile, come si può immaginare, per il&lt;br/&gt;rilevamento degli errori sui bit adiacenti, tipici dei collegamenti a bus.&lt;br/&gt;&lt;h4&gt;Overlapped parity&lt;/h4&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image38.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb38.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;416&quot; height=&quot;378&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;L’ultimo tipo di parità che esaminiamo ha come idea di base che un bit appartenga a più di un gruppo di parità. Questo permette, oltre ad una rivelazione degli errori, anche la loro localizzazione in questo&lt;br/&gt;modo, mediante un’operazione di complemento, l’errore può essere corretto.&lt;br/&gt;&lt;br/&gt;Il concetto di base di questa tecnica consiste nel porre ciascun bit di parità in modo che controlli una combinazione unica dei bit della parola. Per&lt;br/&gt;comprendere meglio quanto appena detto si osservi la figura in alto. Nella figura sono anche mostrati i bit coinvolti da un fallimento sui bit di parola e di parità. Questo tipo di parità può essere implementata mediante una serie di comparatori e un decoder con una circuiteria di controllo di parità. L’operazione di correzione dell’errore può essere fatta mediante il complemento del bit errato.&lt;br/&gt;&lt;br/&gt;Ad esempio, quando una parola viene memorizzata in una cella di memoria vengono costruiti i bit di parità aggiuntivi e memorizzati assieme alla parola. Durante l’operazione di lettura i bit di parità vengono nuovamente generati e confrontati con quelli memorizzati. Il risultato del confronto permette quindi la correzione dell’eventuale errore. Vediamo come funziona: si noti la&lt;br/&gt;tabella mostrata in figura. Tale tabella mostra i bit di parità coinvolti quando si verificano errori sui bit 3, 2,1 ecc..&lt;br/&gt;&lt;br/&gt;Ora, si supponga di memorizzare la parola 1101. I bit di parità per questa parola sono i seguenti 100 (parità dispari),per cui la parola complessiva `e 1101100. Si supponga invece di leggere la parola 1001100. Come si può notare&lt;br/&gt;si e verificato un errore sul bit 2. Vediamo come può essere corretto. Come abbiamo detto quando si recupera una parola dalla memoria i bit di parità devono essere nuovamente generati. Stando alla parola letta i nuovi bit&lt;br/&gt;di parità sono i seguenti 010. Il confronto tra i vecchi bit di parità e i nuovi appena calcolati mostra due bit in disaccordo , più precisamente P2 e P1. Dalla tabella in figura la configurazione dei bit affetti riferita alla riga&lt;br/&gt;P2, P1 si recupera il bit che causa questa combinazione – unica – e cioè`e il bit 2, proprio il bit che e effettivamente errato. A questo punto con un’operazione di complemento e possibile recuperare la parola originale. Si noti che,in questo caso, la “spesa” per la copertura su tutti e quattro i bit e molto alta:&lt;br/&gt;&lt;br/&gt;3−bit di parità per 4−bit di informazione cioè il 75% di ridondanza in più. Comunque, all’aumentare dei bit di informazione, la percentuale&lt;br/&gt;di ridondanza diminuisce. In particolare e possibile stabilire il legame tra i bit di informazione da proteggere e i bit di parità. Sia d il numero di bit di informazione e r il numero di bit di parità`a. Le combinazioni uniche&lt;br/&gt;che devono essere contemplate sono almeno d + m cioè dobbiamo proteggere d−bit di informazione e r−bit di parità. Inoltre dobbiamo contemplare anche la combinazione in cui non si sia verificato un errore. In definitiva&lt;br/&gt;dobbiamo contemplare almeno d + r + 1 combinazioni uniche. Per cui la relazione tra d ed r e data dalla seguente relazione:&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image39.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb39.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;126&quot; height=&quot;37&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h3&gt;2.codici aritmetici&lt;/h3&gt;&lt;br/&gt;Le codifiche aritmetiche sono utili quando si rende necessario controllare le operazioni aritmetiche come addizione,moltiplicazione, divisione ecc.. L’idea di fondo e la seguente: gli operandi vengono codificati prima di eseguire su di essi&lt;br/&gt;l’operazione desiderata. Il risultato viene quindi controllato per verificare se il code-word risultante dall’operazione aritmetica `e valido. Se il code-word risultante non e valido significa che si e verificata una condizione di errore. Una&lt;br/&gt;codifica aritmetica deve essere invariante rispetto ad un insieme di operazioni. In particolare una codifica aritmetica&lt;br/&gt;ha la seguente proprietà: A(b * c) = A(b) *A(c) dove b e c rappresenta gli operandi, * rappresenta una delle operazioni per le quali la codifica e invariante e A(x) rappresenta la codifica aritmetica per l’operando x. In altre parole possiamo dire che una codifica aritmetica ha la seguente proprietà: l’operazione aritmetica su operandi codificati produce lo stesso code-word rispetto alla codifica aritmetica del risultato della normale operazione. Per caratterizzare una codifica aritmetica è necessario specificare il metodo di codifica e l’insieme delle operazioni per le quali la codifica e invariante. Ora vediamo qualche codifica aritmetica:&lt;br/&gt;&lt;h4&gt;Codifica AN&lt;/h4&gt;&lt;br/&gt;Questo tipo di codifica consiste nel moltiplicare ciascuna parola dei dati, N, per una costante, A. Questa codifica e invariante alle operazioni di addizione e di sottrazione, ma non alle operazioni di moltiplicazione e divisione. Quindi la verifica che il code-word sia valido viene eseguita dividendo il code-word per A e verificando che sia divisibile quindi per A. La scelta della costante A comporta il numero di extra-bit che verranno utilizzati e la capacita di rilevare gli errori. Quindi la scelta di A `e un’operazione critica. A deve essere scelta in modo tale che non sia 2 elevato alla x. Per capire le ragioni di questa limitazione dobbiamo ricordare che in base binaria la moltiplicazione per 2 elevato alla x si traduce in una operazione di shift aritmetico verso sinistra del numero per&lt;br/&gt;cui il numero an−1, . . . , a0 diventerebbe an−1, . . . , a0, 0, . . . , 0 con esattamente x zero. La rappresentazione decimale&lt;br/&gt;quindi e data da:&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image40.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb40.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;460&quot; height=&quot;40&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Questo numero e divisibile per 2 alla x. Si può notare inoltre che in caso di un’alterazione di uno solo dei coefficienti, il numero rimane comunque divisibile per 2 elevato alla x. Quindi se A è pari a  2 elevato alla x la codifica non e in grado di rilevare gli errori su singolo bit.&lt;br/&gt;Una codifica AN corretta `e la 3N. La codifica 3N comporta, per una parola di n−bit, (n+2)−bit per rappresentare il code-word. L’implementazione della codifica 3N `e relativamente semplice: si utilizza un sommatore per eseguire la somma N + 2N dove la quantità 2N e facilmente ottenibile mediante shift binario verso sinistra di una posizione.&lt;br/&gt;&lt;h4&gt;Codifica Residuo&lt;/h4&gt;&lt;br/&gt;E’ un tipo di codifica separabile che consiste nell’aggiungere al numero da&lt;br/&gt;codificare il residuo. Supposto che il numero da codificare sia N, scelto un modulo m chiamato anche check-base, possiamo scrivere N = Im + r dove I e il quoziente intero tra N e m e r e il resto. Ad esempio supposto di dover&lt;br/&gt;codificare 14 avendo scelto un modulo pari a 3 possiamo scrivere che 14 = 3 * 4 + r da cui r = 2. Il residuo quindi e pari a 2.Il numero di extra-bit necessari con questo tipo di codifica dipende dal modulo scelto, infatti il residuo non e&lt;br/&gt;mai maggiore del modulo: 0 &amp;lt;= r &amp;lt; m. La verifica di correttezza su un risultato e data dal calcolo del residuo del dato da verificare e dal suo confronto con il residuo concatenato con il dato. La codifica con residuo e invariante rispetto&lt;br/&gt;all’addizione. Quindi supposto di avere due numeri D1 e D2, rispettivamente con i residui r1 e r2, la somma verrà creata come S = D1 + D2 con residuo rs = r1 + r2. Durante il controllo quindi si esegue il calcolo del residuo di S e lo si controlla con rs. Se i due residui differiscono significa che si e verificato un errore. I residui vengono addizionati con un sommatore modulo−m. Il vantaggio primario di questa codifica consiste nel fatto che e separabile. Se il valore del&lt;br/&gt;modulo per il calcolo del residuo viene scelto in un modo particolare la codifica prende il nome di low-cost residue.&lt;br/&gt;In particolare scegliendo&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image41.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb41.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;190&quot; height=&quot;28&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;il numero di extra-bit per la codifica low-cost e pari a b. Il vantaggio&lt;br/&gt;primario di questa tecnica consiste nel fatto che il procedimento di codifica viene semplificato. Si ricordi infatti che per eseguire una codifica con residue dobbiamo calcolare un resto e quindi dobbiamo eseguire una divisione. La&lt;br/&gt;codifica low-cost permette di sostituire l’operazione di divisione con un’operazione di addizione. I bit dell’informazione vengono prima suddivisi in gruppi di b−bit, ciascun gruppo quindi viene addizionato all’altro mediante un addizione  modulo&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image42.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb42.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;66&quot; height=&quot;25&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;Il risultato di questa operazione rappresenta il residue dell’informazione.&lt;br/&gt;&lt;h4&gt;Codici ciclici&lt;/h4&gt;&lt;br/&gt;La caratteristica dei codici ciclici e data dal fatto che lo shift con riporto di un code-word genera sempre un altro code-word. Un codice ciclico e univocamente, e completamente, identificato dal suo polinomio generatore&lt;br/&gt;&lt;br/&gt;G(X) che e un polinomio di grado (n−k) o superiore dove n rappresenta il numero di bit complessivo cioè bit di informazione più bit di controllo – e k e il numero di bit di cui e formata l’informazione originale. Un codice ciclico con polinomio generatore di grado (n−k) viene chiamato codice (n−k) e (n−k) rappresenta la sua caratteristica. Un codice di questo tipo e in&lt;br/&gt;grado di rilevare errori sui singoli bit e tutti gli errori multipli e adiacenti con lunghezza non superiore a (n − k)−bit.&lt;br/&gt;Supponendo che un code-word sia formato da n−bit possiamo affermare che ogni code-word e rappresentato da un polinomio V (X). Supposto di avere un code-word del tipo v = v0, . . . , vn−1, il polinomio che lo rappresenta e dato da&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image43.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb43.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;291&quot; height=&quot;25&quot; /&gt;&lt;/a&gt;&lt;br/&gt;Quindi, ogni code-word e rappresentato da un polinomio di grado n−1 o inferiore chiamato code-polynomial. Quindi, dato il polinomio dei dati D(X), ad esempio per la parola di 4−bit 1101 il polinomio dei dati e&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image44.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb44.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;183&quot; height=&quot;21&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;,il code-polynomial viene composto moltiplicando il polinomio dei dati con il polinomio generatore (che abbiamo già introdotto), per cui V (X) = D(X)G(X). Si osservi pero che ogni addizione richiesta durante la moltiplicazione&lt;br/&gt;dei due polinomi deve essere eseguita in modulo 2.&lt;br/&gt;&lt;br/&gt;Ad esempio, supposto di avere un polinomio generatore pari a&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image45.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb45.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;192&quot; height=&quot;23&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;, il polinomio di codifica e quindi&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image46.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb46.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;256&quot; height=&quot;16&quot; /&gt;&lt;/a&gt; ,&lt;br/&gt;&lt;br/&gt;o meglio V (X) =&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image47.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb47.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;351&quot; height=&quot;19&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;In questo modo il code-word e dato dai coefficienti del code-polynomial,&lt;br/&gt;e in questo caso abbiamo v = 1010001.&lt;br/&gt;&lt;br/&gt;Vediamo come valutare se il code-word ricevuto sia valido o meno. Si supponga di aver ricevuto il code-word r = r0, . . . , rn−1, il polinomio del codice e R(X). Poiché il polinomio R(X) e stato ottenuto moltiplicando il polinomio dei dati per il polinomio generatore possiamo scrivere che R(X) = D(X)G(X) + S(X), dove&lt;br/&gt;&lt;br/&gt;S(X), dovrebbe essere nullo se R(X) e un multiplo del polinomio generatore, cioè se R(X) `e un code-word valido. Un metodo per verificare se R(X) sia un code-word valido consiste nel dividere R(X) per G(X) e controllare che il resto della divisione sia zero. In questo caso R(X) e un codice valido. Il polinomio&lt;br/&gt;&lt;br/&gt;S(X) viene chiamato syndrome polynomial.&lt;br/&gt;&lt;br/&gt;Lo svantaggio primario dei codici ciclici `e rappresentato dal fatto che non sono&lt;br/&gt;separabili.&lt;br/&gt;&lt;h2&gt;Applicazione&lt;/h2&gt;&lt;br/&gt;Esercizi presi sul &lt;a href=&quot;http://www.dsi.unifi.it/~fantechi/&quot;&gt;sito&lt;/a&gt; del Professore Alessandro Fantechi&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image48.png&quot;&gt;&lt;img style=&quot;display:inline;border:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb48.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;498&quot; height=&quot;66&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image49.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb49.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;487&quot; height=&quot;55&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h3&gt;Soluzione&lt;/h3&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/image50.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;image&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/image_thumb50.png&quot; border=&quot;0&quot; alt=&quot;image&quot; width=&quot;503&quot; height=&quot;195&quot; /&gt;&lt;/a&gt;&lt;br/&gt;&lt;h2&gt;Grazie per l’attenzione&lt;/h2&gt;&lt;br/&gt;&lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/avatar.jpg&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;avatar&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/avatar_thumb.jpg&quot; border=&quot;0&quot; alt=&quot;avatar&quot; width=&quot;165&quot; height=&quot;157&quot; /&gt;&lt;/a&gt; &lt;a href=&quot;http://studiconme.files.wordpress.com/2010/07/firma.png&quot;&gt;&lt;img style=&quot;display:inline;border-width:0;&quot; title=&quot;firma&quot; src=&quot;http://studiconme.files.wordpress.com/2010/07/firma_thumb.png&quot; border=&quot;0&quot; alt=&quot;firma&quot; width=&quot;155&quot; height=&quot;162&quot; /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://studiconme.blogspot.com/feeds/1355289333066700068/comments/default' title='Commenti sul post'/><link rel='replies' type='text/html' href='http://studiconme.blogspot.com/2010/07/codici-binari-nel-progetto-dei-sistemi.html#comment-form' title='0 Commenti'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/1355289333066700068'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8242280512173556289/posts/default/1355289333066700068'/><link rel='alternate' type='text/html' href='http://studiconme.blogspot.com/2010/07/codici-binari-nel-progetto-dei-sistemi.html' title='Codici binari nel progetto dei sistemi affidabili.'/><author><name>adorateur de Jesus Christ</name><uri>http://www.blogger.com/profile/07311190882339762636</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>