{"id":1183,"date":"2012-11-19T11:35:36","date_gmt":"2012-11-19T13:35:36","guid":{"rendered":"http:\/\/efagundes.com\/openclass_networking\/?page_id=1183"},"modified":"2022-01-16T17:52:34","modified_gmt":"2022-01-16T20:52:34","slug":"protocolos-de-controle-da-internet-2","status":"publish","type":"page","link":"https:\/\/efagundes.com\/networking\/protocolos-tcpip\/protocolos-de-controle-da-internet-2\/","title":{"rendered":"Protocolos de controle da Internet (II)"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide250.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2688\" data-permalink=\"https:\/\/efagundes.com\/networking\/protocolos-tcpip\/protocolos-de-controle-da-internet-2\/slide250\/\" data-orig-file=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide250.png?fit=960%2C720&amp;ssl=1\" data-orig-size=\"960,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Slide250\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide250.png?fit=960%2C720&amp;ssl=1\" class=\"alignnone size-full wp-image-2688\" src=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide250.png?resize=960%2C720\" alt=\"Slide250\" width=\"960\" height=\"720\" srcset=\"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide250.png?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide250.png?resize=300%2C225&amp;ssl=1 300w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":1138,"menu_order":139,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-1183","page","type-page","status-publish","hentry"],"jetpack_shortlink":"https:\/\/wp.me\/P8yKGp-j5","jetpack-related-posts":[{"id":1180,"url":"https:\/\/efagundes.com\/networking\/protocolos-tcpip\/protocolos-de-controle-da-internet\/","url_meta":{"origin":1183,"position":0},"title":"Protocolos de controle da Internet (I)","author":"Eduardo Fagundes","date":"19\/11\/2012","format":false,"excerpt":"","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"Slide249","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide249.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide249.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide249.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2012\/11\/Slide249.png?resize=700%2C400 2x"},"classes":[]},{"id":604,"url":"https:\/\/efagundes.com\/networking\/exemplos-de-protocolos\/high-level-data-link-control\/","url_meta":{"origin":1183,"position":1},"title":"High-level Data Link Control (I)","author":"Eduardo Fagundes","date":"17\/11\/2012","format":false,"excerpt":"O HDLC (Higher Level Data Link Control) pertence a uma classe de protocolos que diferem muito pouco entre si, como o protocolo SDLC (Synchronous Data Link Control) da IBM em sua rede SNA (System Network Architecture). O HDLC \u00e9 orientado a bit, em contraposi\u00e7\u00e3o aos protocolos orientados a caracteres. Estes\u2026","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide184.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide184.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide184.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide184.jpg?resize=700%2C400 2x"},"classes":[]},{"id":172,"url":"https:\/\/efagundes.com\/networking\/redes-geograficamente-distribuidas\/a-internet-2\/","url_meta":{"origin":1183,"position":2},"title":"A Internet 2","author":"Eduardo Fagundes","date":"16\/11\/2012","format":false,"excerpt":"O projeto da Internet2 \u00e9 um esfor\u00e7o conjunto de mais de 200 universidades norte-americanas, agencias federais americanas e empresas do setor privado para desenvolver uma nova gera\u00e7\u00e3o de Internet para pesquisas e educa\u00e7\u00e3o, incluindo tanto servi\u00e7os de redes melhorados como aplica\u00e7\u00f5es multim\u00eddia que ser\u00e3o ativadas por estes servi\u00e7os. O trabalho\u2026","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"Slide13","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide131.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide131.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide131.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide131.jpg?resize=700%2C400 2x"},"classes":[]},{"id":606,"url":"https:\/\/efagundes.com\/networking\/exemplos-de-protocolos\/high-level-data-link-control-2\/","url_meta":{"origin":1183,"position":3},"title":"High-level Data Link Control (II)","author":"Eduardo Fagundes","date":"17\/11\/2012","format":false,"excerpt":"O protocolo utiliza tr\u00eas tipos de quadros: de informa\u00e7\u00e3o, de supervis\u00e3o e n\u00e3o-numerado. O conte\u00fado do campo de controle para os tr\u00eas tipos s\u00e3o mostrados na figura acima. O quadro (a) \u201cinforma\u00e7\u00e3o\u201d tem seu bit 1 sempre em \u201c0\u201d. Os bits 2, 3 e 4 servem para indicar o n\u00famero\u2026","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide194.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide194.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide194.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide194.jpg?resize=700%2C400 2x"},"classes":[]},{"id":612,"url":"https:\/\/efagundes.com\/networking\/exemplos-de-protocolos\/ppp-point-to-point-protocol-1\/","url_meta":{"origin":1183,"position":4},"title":"PPP &#8211; Point-to-Point Protocol (II)","author":"Eduardo Fagundes","date":"17\/11\/2012","format":false,"excerpt":"\u00a0 O formato de quadro PPP foi definido de modo a ter uma apar\u00eancia semelhante ao formato de quadro HDLC. A principal diferen\u00e7a entre o PPP e o HDLC \u00e9 que o primeiro \u00e9 orientado a caracteres, e n\u00e3o a bits. Especificamente, o PPP utiliza a t\u00e9cnica de inser\u00e7\u00e3o de\u2026","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide224.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide224.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide224.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide224.jpg?resize=700%2C400 2x"},"classes":[]},{"id":156,"url":"https:\/\/efagundes.com\/networking\/redes-geograficamente-distribuidas\/protocolos-do-x-25\/","url_meta":{"origin":1183,"position":5},"title":"Protocolos do X.25","author":"Eduardo Fagundes","date":"16\/11\/2012","format":false,"excerpt":"O conjunto de protocolos X.25 especifica as tr\u00eas camadas inferiores do modelo OSI. Os seguintes protocolos s\u00e3o tipicamente usados numa implementa\u00e7\u00e3o X.25: Packet-Layer Protocol (PLP), Link Access Procedure Balanced (LAPB), e outras interfaces seriais da camada f\u00edsica (como EIA\/TIA-232, EIA\/TIA-449, EIA-530 e G.703). Figura mostra os protocolos X.25 fundamentais para\u2026","rel":"","context":"Post similar","block_context":{"text":"Post similar","link":""},"img":{"alt_text":"Slide8","src":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide81.jpg?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide81.jpg?resize=350%2C200 1x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide81.jpg?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/efagundes.com\/networking\/wp-content\/uploads\/sites\/5\/2015\/03\/Slide81.jpg?resize=700%2C400 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages\/1183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/comments?post=1183"}],"version-history":[{"count":0,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages\/1183\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/pages\/1138"}],"wp:attachment":[{"href":"https:\/\/efagundes.com\/networking\/wp-json\/wp\/v2\/media?parent=1183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}