Download presentation
Presentation is loading. Please wait.
Published byAmber Stokes Modified over 9 years ago
1
The Medium Access Control Sublayer Chapter 4 4.6 - 4.8
2
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Bluetooth a) Architecture b) Applications c) Protocol stack d) Radio layer e) Link layers f)Frame structure
3
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Bluetooth Architecture a)Two piconets can be connected to form a scatternet
4
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Bluetooth Protocol Stack a)The Bluetooth protocol architecture.
5
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Bluetooth Frame Structure a)Typical Bluetooth data frame at (a) basic, and (b) enhanced, data rates.
6
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 RFID a)EPC Gen 2 architecture b)EPC Gen 2 physical layer c)EPC Gen 2 tag identification layer d)Tag identification message formats
7
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 EPC Gen 2 Architecture a)RFID architecture.
8
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 EPC Gen 2 Physical Layer a)Reader and tag backscatter signals.
9
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 EPC Gen 2 Tag Identification Layer a)Example message exchange to identify a tag.
10
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Tag Identification Message Formats a)Format of the Query message.
11
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Data Link Layer Switching a)Uses of bridges b)Learning bridges c)Spanning tree bridges d)Repeaters, hubs, bridges, switches, routers, and gateways e)Virtual LANs
12
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Learning Bridges (1) a)Bridge connecting two multidrop LANs
13
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Learning Bridges (2) a)Bridges (and a hub) connecting seven point-to-point stations.
14
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Learning Bridges (3) a)Protocol processing at a bridge.
15
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Spanning Tree Bridges (1) a)Bridges with two parallel links
16
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Spanning Tree Bridges (2) a)A spanning tree connecting five bridges. The dotted lines are links that are not part of the spanning tree.
17
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Poem by Radia Perlman (1985) Algorithm for Spanning Tree (1) a)I think that I shall never see b)A graph more lovely than a tree. c)A tree whose crucial property d)Is loop-free connectivity. e)A tree which must be sure to span. f)So packets can reach every LAN. g)...
18
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Poem by Radia Perlman (1985) Algorithm for Spanning Tree (2) a)... b)First the Root must be selected c)By ID it is elected. d)Least cost paths from Root are traced e)In the tree these paths are placed. f)A mesh is made by folks like me g)Then bridges find a spanning tree.
19
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Repeaters, Hubs, Bridges, Switches, Routers, and Gateways a)(a) Which device is in which layer. (b) Frames, packets, and headers.
20
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Virtual LANs (1) a)A building with centralized wiring using hubs and a switch.
21
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Virtual LANs (2) a)Two VLANs, gray and white, on a bridged LAN.
22
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The IEEE 802.1Q Standard (1) a)Bridged LAN that is only partly VLAN-aware. The shaded symbols are VLAN aware. The empty ones are not.
23
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The IEEE 802.1Q Standard (2) a)The 802.3 (legacy) and 802.1Q Ethernet frame formats.
24
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 End a)Chapter 4
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.