Download presentation
Presentation is loading. Please wait.
Published bySucianty Lie Modified over 6 years ago
1
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of information contained herein.
2
Figure 2-1 OSI Model-A Conceptual View
3
Figure 2-2 OSI Model- An Architectural View
4
Figure 2-3 Token Passing Access Methodology
5
Figure 2-4 LAN Physical Topology Choices
6
Figure 2-5 Ethernet and IEEE 802.3 Standards
7
Figure 2-6 IEEE 802.2 and Ethernet SNAP
8
Figure 2-8 IEEE 802.5 Token Ring Token and MAC sub-layer Frame Layout
9
Figure 2-9 Address Bit-Order Reversal in Ethernet and Token Ring
10
Figure 2-10 FDDI Network Architecture & Technology
11
Figure 2-11 FDDI’s Self-Healing Ability
12
Figure 2-12 FDDI Token and Data Frame Layouts
13
Figure 2-13 Alternative Applications of the FDDI Network Architecture
14
Figure 2-14 100BaseT Network Architecture Implementation
15
Figure 2-15 IEEE 802.3, IEEE 802.5, and 100VG-AnyLAN Network Architectures
16
Figure 2-16 Cascading Hubs and the Round Robin Polling Scheme
17
Figure 2-17 Isochronus Ethernet Network Architecture
18
Figure 2-18 Isochronus Ethernet Bandwidth Profile
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.