Download presentation
Presentation is loading. Please wait.
1
Communication Networks
Chapter 11 Communication Networks
2
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.1a Multiplexing: (a) frequency-division multiplexing, (b) synchronous time-division multiplexing, (c) asynchronous time-division multiplexing, and d) wavelength-division multiplexing. Copyright © 2016 Elsevier Inc. All rights reserved.
3
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.1bc Multiplexing: (a) frequency-division multiplexing, (b) synchronous time-division multiplexing, (c) asynchronous time-division multiplexing, and d) wavelength-division multiplexing. Copyright © 2016 Elsevier Inc. All rights reserved.
4
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.1d Multiplexing: (a) frequency-division multiplexing, (b) synchronous time-division multiplexing, (c) asynchronous time-division multiplexing, and d) wavelength-division multiplexing. Copyright © 2016 Elsevier Inc. All rights reserved.
5
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.2 Communication modes: (a) simplex communication, (b) half-duplex communication, and (c) full-duplex communication. Copyright © 2016 Elsevier Inc. All rights reserved.
6
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.3 Duplexing: (a) frequency-division duplexing and (b) time-division duplexing. Copyright © 2016 Elsevier Inc. All rights reserved.
7
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.4a Multiple access: (a) frequency-division multiple access, (b) time-division multiple access, and (c) code-division multiple access. Copyright © 2016 Elsevier Inc. All rights reserved.
8
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.4b Multiple access: (a) frequency-division multiple access, (b) time-division multiple access, and (c) code-division multiple access. Copyright © 2016 Elsevier Inc. All rights reserved.
9
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.4c Multiple access: (a) frequency-division multiple access, (b) time-division multiple access, and (c) code-division multiple access. Copyright © 2016 Elsevier Inc. All rights reserved.
10
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.5a Vulnerable time: (a) unslotted ALOHA and (b) slotted ALOHA. Copyright © 2016 Elsevier Inc. All rights reserved.
11
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.5b Vulnerable time: (a) unslotted ALOHA and (b) slotted ALOHA. Copyright © 2016 Elsevier Inc. All rights reserved.
12
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.6 Behavior of persistence methods: (a) 1-persistent, (b) nonpersistent, and (c) p-persistent. Copyright © 2016 Elsevier Inc. All rights reserved.
13
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.7 Topology: (a) star, (b) mesh, (c) bus, (d) ring, and (e) tree. Copyright © 2016 Elsevier Inc. All rights reserved.
14
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.8 Spectrum allocation: (a) ADSL and (b) CATV. Copyright © 2016 Elsevier Inc. All rights reserved.
15
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure 11.9 Private-key: (a) cryptography and (b) authentication. Copyright © 2016 Elsevier Inc. All rights reserved.
16
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure Public-key: (a) cryptography and (b) authentication. Copyright © 2016 Elsevier Inc. All rights reserved.
17
Copyright © 2016 Elsevier Inc. All rights reserved.
Figure Digital-signature signing and verification processes. Copyright © 2016 Elsevier Inc. All rights reserved.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.