“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved “Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information contained herein”
Figure 5-1 OSI Model - A Conceptual View
Figure 5-2 OSI Model - An Architectural View
Figure 5-5 Coax Cable: Cross-Section
Figure 5-6 Fiber Optic Cable: Cross Section
Figure 5-7 LAN Media Technology Analysis
Figure 5-8 Token-Passing Access Methodology
Figure 5-9 CSMA/CD vs. Token Passing
Figure 5-10 LAN Physical Topology Choices
Figure 5-11 Ethernet and IEEE 802.3 Standards
Figure 5-12 IEEE 802.2 and Ethernet SNAP
Figure 5-14 IEEE 802.5 Token Ring and MAC Sublayer Frame Layout
Figure 5-15 Address Bit-Order Reversal in Ethernet and Token Ring
Figure 5-16 FDDI Network Architecture and Technology
Figure 5-17 FDDI’s Self-Healing Ability
Figure 5-18 FDDI Token and Data Frame Layouts
Figure 5-19 Alternative Applications of the FDDI Network Architecture
Figure 5-20 100BaseT Network Architecture Implementation
Figure 5-22 HPNA Implementation