Copyright © 2000 John Wiley & Sons, Inc. All rights reserved Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of information contained herein.
Figure 2-1 OSI Model-A Conceptual View
Figure 2-2 OSI Model- An Architectural View
Figure 2-3 Token Passing Access Methodology
Figure 2-4 LAN Physical Topology Choices
Figure 2-5 Ethernet and IEEE 802.3 Standards
Figure 2-6 IEEE 802.2 and Ethernet SNAP
Figure 2-8 IEEE 802.5 Token Ring Token and MAC sub-layer Frame Layout
Figure 2-9 Address Bit-Order Reversal in Ethernet and Token Ring
Figure 2-10 FDDI Network Architecture & Technology
Figure 2-11 FDDI’s Self-Healing Ability
Figure 2-12 FDDI Token and Data Frame Layouts
Figure 2-13 Alternative Applications of the FDDI Network Architecture
Figure 2-14 100BaseT Network Architecture Implementation
Figure 2-15 IEEE 802.3, IEEE 802.5, and 100VG-AnyLAN Network Architectures
Figure 2-16 Cascading Hubs and the Round Robin Polling Scheme
Figure 2-17 Isochronus Ethernet Network Architecture
Figure 2-18 Isochronus Ethernet Bandwidth Profile