MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Local area networks / Behrouz A. Forouzan, with Sophia Chung Fegan.

By: Forouzan, Behrouz A.
Contributor(s): Fegan, Sophia Chung.
Material type: materialTypeLabelBookPublisher: Boston : McGraw-Hill, 2003Description: xx, 618 p. : ill. ; 24 cm.ISBN: 0072336056; 0071150803.Subject(s): Local area networks (Computer networks)DDC classification: 004.68
Contents:
Introduction -- Data Communication Models -- Data Transmission -- Transmission Media -- Error Detection -- LAN Topologies -- Flow and Error Control -- Medium Access Methods -- Logical Link Control (LLC) -- Ethernet: 10 Mbps -- Ethernet Evolution: Fast and Gigabit Ethernet -- Token Bus -- Token Ring -- ATM LANs -- Wireless LANs -- LAN Performance -- Connecting LANs -- TCP/IP -- Data Encryption -- Network Management.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 004.68 (Browse shelf(Opens below)) 1 Available 00126727
General Lending MTU Bishopstown Library Lending 004.68 (Browse shelf(Opens below)) 1 Available 00126672
Total holds: 0

Enhanced descriptions from Syndetics:

Local Area Networks (LANs) have become an integral part of communication in today's world. LAN applications are used in businesses, educational facilities, hospitals, stock exchanges, and warehouses to name a few. Forouzan's Local Area Networks offers reader-friendly, comprehensive coverage of LAN technologies, which prepares students, and the reader to use these technologies in real-world applications. Local Area Networks is ideal for students both in the classroom and later as a reference. Forouzan motivates topics by practical applications, and his liberal use of figures makes difficult technical topics easier to grasp by providing an intuitive, visual representation of concepts. Extensive practice sets are also provided at the end of each chapter, which reinforce what the student has learned. Forouzan's Local Area Networks is also up-to-date. It presents in-depth material on such current topics as Gigabit Ethernet, ATM LAN, Wireless LAN, VPN, and VLAN.

Includes index.

Introduction -- Data Communication Models -- Data Transmission -- Transmission Media -- Error Detection -- LAN Topologies -- Flow and Error Control -- Medium Access Methods -- Logical Link Control (LLC) -- Ethernet: 10 Mbps -- Ethernet Evolution: Fast and Gigabit Ethernet -- Token Bus -- Token Ring -- ATM LANs -- Wireless LANs -- LAN Performance -- Connecting LANs -- TCP/IP -- Data Encryption -- Network Management.

Table of contents provided by Syndetics

  • Chapter 1 Introduction (p. 1)
  • Networks (p. 1)
  • Local Area Network (p. 2)
  • Metropolitan Area Network (p. 2)
  • Wide Area Network (p. 3)
  • Internetworks (p. 4)
  • Lan Definition (p. 4)
  • Direct Communication (p. 4)
  • Size (p. 5)
  • Transmission Media (p. 5)
  • Data Rate (p. 5)
  • Lan Components (p. 5)
  • Hardware (p. 5)
  • Software (p. 6)
  • Lan Models (p. 6)
  • Client-Server Model (p. 6)
  • Peer-to-Peer Model (p. 8)
  • Comparison (p. 9)
  • Lan Applications (p. 9)
  • Office Networks (p. 9)
  • Industry Networks (p. 10)
  • Backbone Networks (p. 10)
  • Key Terms (p. 10)
  • Summary (p. 10)
  • Practice Set (p. 11)
  • Multiple-Choice Questions (p. 11)
  • Exercises (p. 13)
  • Chapter 2 Data Communication Models (p. 15)
  • Layered Architecture (p. 15)
  • Peer-to-Peer Communication (p. 15)
  • Protocol Data Unit (PDU) (p. 16)
  • Encapsulation/Decapsulation (p. 16)
  • Services (p. 16)
  • Service Access Points (p. 17)
  • Interfaces between Layers (p. 17)
  • OSI Model (p. 18)
  • Physical Layer (p. 18)
  • Data Link Layer (p. 19)
  • Network Layer (p. 21)
  • Transport Layer (p. 22)
  • Session Layer (p. 23)
  • Presentation Layer (p. 24)
  • Application Layer (p. 25)
  • Summary of Layer Functions (p. 25)
  • TCP/IP Protocol Suite (p. 25)
  • Physical and Data Link Layers (p. 26)
  • Network Layer (p. 26)
  • Transport Layer (p. 27)
  • Session and Presentation Layers (p. 27)
  • Application Layer (p. 27)
  • IEEE Standards (p. 27)
  • LLC Sublayer (p. 28)
  • MAC Sublayer (p. 29)
  • Physical Sublayers (p. 29)
  • Key Terms (p. 29)
  • Summary (p. 30)
  • Practice Set (p. 31)
  • Multiple-Choice Questions (p. 31)
  • Exercises (p. 34)
  • Chapter 3 Data Transmission (p. 37)
  • Analog and Digital Signals (p. 37)
  • Digital Signals (p. 37)
  • Analog Signals (p. 38)
  • Digital or Analog (p. 42)
  • Digital Transmission (p. 43)
  • Line Coding (p. 43)
  • Block Coding (p. 50)
  • Sampling and Quantization: PCM (p. 52)
  • Analog Transmission (p. 54)
  • Modulation by Digital Signals (p. 54)
  • Modulation by Analog Signals (p. 58)
  • Multiplexing (p. 58)
  • Frequency-Division Multiplexing (FDM) (p. 58)
  • Time-Division Multiplexing (TDM) (p. 59)
  • Data Rate (p. 63)
  • Noiseless Channel: Nyquist Bit Rate (p. 63)
  • Noisy Channel: Shannon Capacity (p. 64)
  • Key Terms (p. 64)
  • Summary (p. 65)
  • Practice Set (p. 66)
  • Multiple-Choice Questions (p. 66)
  • Exercises (p. 70)
  • Chapter 4 Transmission Media (p. 79)
  • Guided Media (p. 80)
  • Twisted-Pair Cable (p. 80)
  • Coaxial Cable (p. 81)
  • Optical Fiber (p. 83)
  • Unguided Media (p. 86)
  • Radio Frequency Allocation (p. 86)
  • Propagation of Radio Waves (p. 86)
  • Terrestrial Microwave (p. 91)
  • Satellite Communication (p. 91)
  • Transmission Impairment (p. 93)
  • Attenuation (p. 94)
  • Distortion (p. 95)
  • Noise (p. 95)
  • Performance (p. 96)
  • Throughput (p. 96)
  • Propagation Speed (p. 96)
  • Propagation Time (p. 97)
  • Key Terms (p. 98)
  • Summary (p. 98)
  • Practice Set (p. 99)
  • Multiple-Choice Questions (p. 99)
  • Exercises (p. 103)
  • Chapter 5 Error Detection (p. 105)
  • Types of Errors (p. 105)
  • Single-Bit Error (p. 106)
  • Burst Error (p. 106)
  • Detection (p. 107)
  • Redundancy (p. 107)
  • Vertical Redundancy Check (VRC) (p. 107)
  • Longitudinal Redundancy Check (LRC) (p. 110)
  • Cyclic Redundancy Check (CRC) (p. 111)
  • Performance (p. 115)
  • Application (p. 115)
  • Error Correction (p. 115)
  • Key Terms (p. 116)
  • Summary (p. 116)
  • Practice Set (p. 117)
  • Multiple-Choice Questions (p. 117)
  • Exercises (p. 121)
  • Chapter 6 LAN Topologies (p. 123)
  • Introduction (p. 123)
  • Definition (p. 123)
  • Framing (p. 124)
  • Addressing (p. 124)
  • Baseband Versus Broadband Transmission (p. 124)
  • Access Methods (p. 124)
  • Bus Topology (p. 125)
  • Medium Interface (p. 125)
  • Multipoint Connections (p. 125)
  • Addressing (p. 125)
  • Operation (p. 126)
  • Baseband Bus Topology (p. 127)
  • Broadband Bus Topology (p. 127)
  • Removing the Frame from the Bus (p. 127)
  • Transmission Medium (p. 128)
  • Some Characteristics of the Bus Topology (p. 128)
  • Applications (p. 129)
  • Ring Topology (p. 129)
  • Addressing (p. 129)
  • Medium Interface (p. 130)
  • Point-to-Point Connections (p. 130)
  • Unidirectional Transmission (p. 130)
  • Baseband Transmission (p. 130)
  • Transmission Medium (p. 130)
  • State of the Interface (p. 130)
  • Removing the Frame from the Ring (p. 133)
  • Some Characteristics of Ring Topology (p. 135)
  • Applications (p. 135)
  • Star Topology (p. 135)
  • Medium Interface (p. 136)
  • Point-to-Point Connection (p. 136)
  • Unidirectional Propagation (p. 136)
  • Baseband or Broadband Transmission (p. 136)
  • Transmission Medium (p. 136)
  • Passive or Active Hub (p. 136)
  • Hub or Switch (p. 136)
  • Removing the Frame from the Network (p. 138)
  • Addressing (p. 138)
  • Some Characteristics of Star Topology (p. 138)
  • Applications (p. 138)
  • Hybrid Topology (p. 138)
  • Key Terms (p. 139)
  • Summary (p. 139)
  • Practice Set (p. 140)
  • Multiple-Choice Questions (p. 140)
  • Exercises (p. 142)
  • Chapter 7 Flow and Error Control (p. 145)
  • Flow Control (p. 145)
  • Stop-and-Wait (p. 146)
  • Sliding Window (p. 146)
  • Error Control (p. 149)
  • Automatic Repeat Request (ARQ) (p. 150)
  • Key Terms (p. 158)
  • Summary (p. 158)
  • Practice Set (p. 159)
  • Multiple-Choice Questions (p. 159)
  • Exercises (p. 163)
  • Chapter 8 Medium Access Methods (p. 165)
  • Random Access (p. 165)
  • Ma or Aloha (p. 166)
  • Carrier Sense Multiple Access (CSMA) (p. 170)
  • CSMA/CD (p. 173)
  • CSMA/CA (p. 175)
  • Controlled Access (p. 176)
  • Token Passing (p. 176)
  • Key Terms (p. 177)
  • Summary (p. 177)
  • Practice Set (p. 178)
  • Multiple-Choice Questions (p. 178)
  • Exercises (p. 181)
  • Chapter 9 Logical Link Control (LLC) (p. 183)
  • Services (p. 184)
  • Unacknowledged Connectionless Service (p. 186)
  • Acknowledged Connectionless Service (p. 186)
  • Connection-Oriented Service (p. 187)
  • Llc Protocol (p. 188)
  • Protocol Data Unit (PDU) (p. 188)
  • PDU Format (p. 189)
  • More about PDUs (p. 191)
  • Service/Protocol Association (p. 192)
  • Unacknowledged Connectionless Service (p. 192)
  • Acknowledged Connectionless Service (p. 192)
  • Connection-Oriented Service (p. 193)
  • Key Terms (p. 195)
  • Summary (p. 196)
  • Practice Set (p. 196)
  • Multiple-Choice Questions (p. 196)
  • Exercises (p. 201)
  • Chapter 10 Ethernet: 10 Mbps (p. 203)
  • Access Method: CSMA/CD (p. 203)
  • Layers (p. 205)
  • Data Link Layer (p. 206)
  • Physical Layer (p. 206)
  • Mac Sublayer (p. 206)
  • Frame (p. 206)
  • Addressing (p. 207)
  • Frame Length (p. 209)
  • Slot Time (p. 210)
  • Physical Layer (p. 212)
  • PLS (p. 212)
  • AUI (p. 212)
  • MAU (Transceiver) (p. 215)
  • MDI (p. 215)
  • Implementation (p. 216)
  • 10Base5: Thick Ethernet (p. 216)
  • 10Base2: Thin Ethernet (p. 218)
  • 10Base-T: Twisted-Pair Ethernet (p. 220)
  • 10Base-FL: Fiber Link Ethernet (p. 222)
  • Key Terms (p. 223)
  • Summary (p. 224)
  • Practice Set (p. 224)
  • Multiple-Choice Questions (p. 224)
  • Exercises (p. 226)
  • Chapter 11 Ethernet Evolution: Fast and Gigabit Ethernet (p. 229)
  • Bridged Ethernet (p. 229)
  • Raising the Bandwidth (p. 229)
  • Separating Collision Domains (p. 230)
  • Switched Ethernet (p. 231)
  • Full-Duplex Ethernet (p. 232)
  • No Need for CSMA/CD (p. 232)
  • Mac Control (p. 232)
  • A New Sublayer (p. 233)
  • Pause Packet (p. 235)
  • Fast Ethernet (p. 236)
  • Data Link Layer (p. 236)
  • Physical Layer (p. 236)
  • Fast Ethernet Mac Sublayer (p. 236)
  • Slot Time (p. 237)
  • Auto Negotiation (p. 237)
  • Fast Ethernet Physical Layer (p. 239)
  • Reconciliation (p. 240)
  • MII (p. 240)
  • PHY (Transceiver) (p. 242)
  • MDI (p. 243)
  • Fast Ethernet Implementation (p. 243)
  • 100Base-TX (p. 243)
  • 100Base-FX (p. 245)
  • 100Base-T4 (p. 245)
  • Gigabit Ethernet (p. 249)
  • Data Link Layer (p. 249)
  • Physical Layer (p. 249)
  • Gigabit Ethernet Mac Sublayer (p. 249)
  • Access Method (p. 250)
  • Gigabit Ethernet Physical Layer (p. 252)
  • Reconciliation (p. 252)
  • GMII (p. 252)
  • PHY (Transceiver) (p. 253)
  • MDI (p. 253)
  • Gigabit Ethernet Implementation (p. 253)
  • 1000Base-X (p. 253)
  • 1000Base-T (p. 255)
  • Key Terms (p. 256)
  • Summary (p. 256)
  • Practice Set (p. 257)
  • Multiple-Choice Questions (p. 257)
  • Exercises (p. 259)
  • Chapter 12 Token Bus (p. 261)
  • Physical Versus Logical Topology (p. 261)
  • Token Passing (p. 262)
  • Service Classes (p. 263)
  • Timers (p. 264)
  • Ring Management (p. 264)
  • Removing Stations (p. 264)
  • Adding Stations (p. 266)
  • Token Recovery (p. 267)
  • Removing Duplicate Tokens (p. 268)
  • Ring Initialization (p. 268)
  • Layers (p. 268)
  • Mac Sublayer (p. 269)
  • Access Method (p. 269)
  • Frame Format (p. 269)
  • Physical Layer (p. 272)
  • Carrier Band, Phase Continuous (p. 272)
  • Carrier Band, Phase Coherent (p. 274)
  • Broadband (p. 275)
  • Optical Fiber (p. 276)
  • Key Terms (p. 277)
  • Summary (p. 277)
  • Practice Set (p. 278)
  • Multiple-Choice Questions (p. 278)
  • Exercises (p. 282)
  • Chapter 13 Token Ring (p. 285)
  • Access Method: Token Passing (p. 285)
  • Layers (p. 286)
  • Mac Sublayer (p. 286)
  • Frame Formats (p. 286)
  • Addressing (p. 290)
  • Physical Layer (p. 291)
  • Bit and Byte Ordering (p. 291)
  • Implementation (p. 291)
  • Combining MAUs (p. 292)
  • Coding (p. 292)
  • Cabling (p. 293)
  • Stations (p. 294)
  • Repeaters (p. 294)
  • Ring Management (p. 294)
  • Priority and Reservation Levels (p. 295)
  • Station Priority Level (p. 295)
  • Current Priority Level (p. 295)
  • Current Reservation Level (p. 295)
  • AC Field (p. 296)
  • Implementing Priorities (p. 296)
  • A Data Frame Arrives (p. 296)
  • A Token Arrives (p. 298)
  • Other Procedures (p. 298)
  • An Example (p. 301)
  • Key Terms (p. 303)
  • Summary (p. 303)
  • Practice Set (p. 304)
  • Multiple-Choice Questions (p. 304)
  • Exercises (p. 307)
  • Chapter 14 ATM LANs (p. 309)
  • ATM LAN Architecture (p. 309)
  • Pure ATM Architecture (p. 309)
  • Legacy LAN Architecture (p. 310)
  • Mixed Architecture (p. 311)
  • LAN Emulation (LANE) (p. 311)
  • Client-Server Model (p. 312)
  • LAN Emulation Client (LEC) (p. 313)
  • LAN Emulation Configuration Server (LECS) (p. 313)
  • LAN Emulation Server (LES) (p. 313)
  • Broadcasting and Unknown Server (BUS) (p. 313)
  • LANE Operation (p. 314)
  • Initialization (p. 314)
  • Configuration (p. 315)
  • Joining (p. 315)
  • Bus Initialization (p. 315)
  • Data Transfer (p. 315)
  • Frame Format (p. 316)
  • Control Frames (p. 316)
  • Data Frames (p. 318)
  • Key Terms (p. 319)
  • Summary (p. 319)
  • Practice Set (p. 320)
  • Multiple-Choice Questions (p. 320)
  • Exercises (p. 323)
  • Chapter 15 Wireless LANs (p. 325)
  • Wireless Transmission (p. 325)
  • Radio Frequency (p. 325)
  • Infrared Transmission (p. 328)
  • Ism Frequency Band (p. 329)
  • Architecture (p. 330)
  • Basic Service Set (p. 330)
  • Extended Service Set (p. 330)
  • Station Types (p. 331)
  • Mac Layer (p. 331)
  • Distributed Coordination Function (DCF) (p. 331)
  • Point Coordination Function (PCF) (p. 334)
  • Frame Format (p. 336)
  • Addressing Mechanism (p. 337)
  • Frame Types (p. 339)
  • Physical Layer (p. 342)
  • Frequency Hopping Spread Spectrum (p. 342)
  • Direct Sequence Spread Spectrum (p. 342)
  • Infrared (p. 342)
  • High Data Rate Standard (p. 342)
  • New Physical Layer (p. 343)
  • Key Terms (p. 343)
  • Summary (p. 344)
  • Practice Set (p. 344)
  • Multiple-Choice Questions (p. 344)
  • Exercises (p. 347)
  • Chapter 16 LAN Performance (p. 349)
  • Parameters (p. 349)
  • Maximum Medium Length (p. 349)
  • Medium Propagation Speed (p. 349)
  • Maximum Propagation Delay (p. 350)
  • Capacity (p. 351)
  • Average Frame Length in Bits (p. 351)
  • Average Frame Transmission Time (p. 351)
  • Bit Length of the Medium (p. 351)
  • The "a" Parameter (p. 352)
  • Case of a > 1 (p. 352)
  • Case of a = 1 (p. 353)
  • Case of a (p. 353)
  • Efficiency (p. 353)
  • Efficiency of CSMA/CD (p. 355)
  • Simplified Model (p. 356)
  • The Probability of Success (p. 356)
  • Successful Slot (p. 358)
  • Theoretical Efficiency (p. 358)
  • Actual Efficiency (p. 359)
  • Efficiency of Token Ring (p. 359)
  • Key Terms (p. 361)
  • Summary (p. 361)
  • Practice Set (p. 362)
  • Multiple-Choice Questions (p. 362)
  • Exercises (p. 365)
  • Chapter 17 Connecting LANs (p. 367)
  • Repeaters (p. 368)
  • Not an Amplifier (p. 369)
  • Bridges (p. 370)
  • Types of Bridges (p. 372)
  • Bridges Connecting Different LANs (p. 374)
  • Routers (p. 374)
  • Routing Concepts (p. 376)
  • Gateways (p. 378)
  • Other Devices (p. 379)
  • Multiprotocol Routers (p. 379)
  • Brouters (p. 379)
  • Switches (p. 381)
  • Routing Switches (p. 381)
  • Key Terms (p. 382)
  • Summary (p. 382)
  • Practice Set (p. 382)
  • Multiple-Choice Questions (p. 382)
  • Exercises (p. 384)
  • Chapter 18 TCP/IP (p. 387)
  • Overview of TCP/IP (p. 387)
  • TCP/IP and the Internet (p. 387)
  • TCP/IP and OSI (p. 388)
  • Encapsulation (p. 388)
  • Network Layer (p. 389)
  • Internetwork Protocol (IP) (p. 389)
  • Addressing (p. 392)
  • Classes (p. 392)
  • Dotted-Decimal Notation (p. 393)
  • Nodes with More Than One Address (p. 395)
  • A Sample Internet (p. 395)
  • Subnetting (p. 396)
  • Three Levels of Hierarchy (p. 398)
  • Masking (p. 398)
  • Finding the Subnetwork Address (p. 399)
  • Other Protocols in the Network Layer (p. 401)
  • Address Resolution Protocol (ARP) (p. 401)
  • Reverse Address Resolution Protocol (RARP) (p. 402)
  • Internet Control Message Protocol (ICMP) (p. 403)
  • Internet Group Message Protocol (IGMP) (p. 403)
  • Transport Layer (p. 403)
  • User Datagram Protocol (UDP) (p. 404)
  • Transmission Control Protocol (TCP) (p. 405)
  • Next Generation: IPv6 and ICMPv6 (p. 407)
  • IPv6 (p. 408)
  • ICMPv6 (p. 418)
  • Key Terms (p. 420)
  • Summary (p. 421)
  • Practice Set (p. 422)
  • Multiple-Choice Questions (p. 422)
  • Exercises (p. 425)
  • Chapter 19 Data Encryption (p. 431)
  • Conventional Methods (p. 432)
  • Character-Level Encryption (p. 432)
  • Bit-Level Encryption (p. 434)
  • Data Encryption Standard (DES) (p. 437)
  • Public Key Methods (p. 439)
  • RSA Encryption (p. 439)
  • Authentication (p. 442)
  • Key Terms (p. 443)
  • Summary (p. 443)
  • Practice Set (p. 444)
  • Multiple-Choice Questions (p. 444)
  • Exercises (p. 445)
  • Chapter 20 Network Management (p. 449)
  • Configuration Management (p. 449)
  • Reconfiguration (p. 450)
  • Documentation (p. 451)
  • Fault Management (p. 451)
  • Reactive Fault Management (p. 452)
  • Proactive Fault Management (p. 453)
  • Performance Management (p. 453)
  • Capacity (p. 453)
  • Traffic (p. 454)
  • Throughput (p. 454)
  • Response Time (p. 454)
  • Security Management (p. 454)
  • Accounting Management (p. 454)
  • Snmp (p. 455)
  • Concept (p. 455)
  • SMI (p. 456)
  • Key Terms (p. 471)
  • Summary (p. 471)
  • Practice Set (p. 472)
  • Multiple-Choice Questions (p. 472)
  • Exercises (p. 477)
  • Appendix A ASCII Code (p. 479)
  • Appendix B Numbering Systems and Transformation (p. 485)
  • Numbering Systems (p. 485)
  • Decimal Numbers (p. 486)
  • Binary Numbers (p. 486)
  • Octal Numbers (p. 487)
  • Hexadecimal Numbers (p. 488)
  • Transformation (p. 489)
  • From Other Systems to Decimal (p. 490)
  • From Decimal to Other Systems (p. 491)
  • From Binary to Octal or Hexadecimal (p. 491)
  • From Octal or Hexadecimal to Binary (p. 492)
  • Appendix C Spanning Tree (p. 493)
  • Spanning Trees and Bridges (p. 493)
  • Algorithm (p. 495)
  • Forming the Spanning Tree (p. 496)
  • Example (p. 496)
  • Spanning Trees and Multicast Routing (p. 498)
  • Appendix D Information Theory (p. 499)
  • Information Source (p. 499)
  • Message (p. 500)
  • Measuring Information (p. 500)
  • Symbol Information (p. 500)
  • Message Information (p. 501)
  • Entropy (p. 502)
  • Maximum Entropy (p. 503)
  • Source Coding (p. 504)
  • Fixed- and Variable-Length Code (p. 504)
  • Distinct Codes (p. 504)
  • Relationship (p. 506)
  • Average Code Length (p. 506)
  • Code Efficiency (p. 507)
  • Relationship Between Entropy and Average Length (p. 508)
  • Designing Codes (p. 508)
  • Shannon-Fano Encoding (p. 508)
  • Huffman Encoding (p. 509)
  • Appendix E ATM (p. 511)
  • Introduction (p. 511)
  • Packet Networks (p. 511)
  • Mixed Network Traffic (p. 512)
  • Cell Networks (p. 512)
  • Asynchronous TDM (p. 513)
  • ATM Architecture (p. 513)
  • Virtual Connection (p. 514)
  • Identifiers (p. 515)
  • Cells (p. 516)
  • Switching (p. 517)
  • VP Switch (p. 517)
  • VPC Switch (p. 518)
  • Layers (p. 519)
  • Application Adaptation Layer (AAL) (p. 519)
  • ATM Layer (p. 521)
  • Physical Layer (p. 523)
  • Appendix F DQDB (p. 525)
  • Access Method: Dual Bus (p. 525)
  • Directional Traffic (p. 525)
  • Transmission Slots (p. 526)
  • Distributed Queues (p. 528)
  • Using a Queue for Bus Access (p. 529)
  • Queue Structure (p. 530)
  • Ring Configuration (p. 530)
  • Operation: DQDB Layers (p. 530)
  • The DQDB Header (p. 531)
  • Implementation (p. 532)
  • Appendix G FDDI (p. 533)
  • Access Method: Token Passing (p. 533)
  • FDDI Layers (p. 536)
  • MAC Sublayer (p. 536)
  • Frame Format (p. 536)
  • PHY Sublayer (p. 538)
  • Data Rate (p. 538)
  • Encoding (p. 538)
  • PMD Sublayer (p. 540)
  • Dual Ring (p. 540)
  • Nodes (p. 541)
  • Appendix H Virtual Local Area Networks (VLANs) (p. 543)
  • Introduction (p. 543)
  • Membership (p. 545)
  • Port Numbers (p. 546)
  • MAC Addresses (p. 546)
  • IP Addresses (p. 546)
  • Multicast IP Addresses (p. 546)
  • Combination (p. 546)
  • Configuration (p. 546)
  • Manual Configuration (p. 546)
  • Automatic Configuration (p. 547)
  • Semiautomatic Configuration (p. 547)
  • Communication Between Switches (p. 547)
  • Table Maintenance (p. 547)
  • Frame Tagging (p. 547)
  • Time-Division Multiplexing (TDM) (p. 547)
  • IEEE Standard (p. 548)
  • Advantages (p. 548)
  • Cost and Time Reduction (p. 548)
  • Creating Virtual Workgroups (p. 548)
  • Security (p. 548)
  • Appendix I Virtual Private Networks (VPNs) (p. 549)
  • Achieving Privacy (p. 549)
  • Private Networks (p. 549)
  • Hybrid Networks (p. 550)
  • Private Virtual Networks (p. 551)
  • VPN Technology (p. 551)
  • Encryption/Authentication (p. 551)
  • Tunneling (p. 553)
  • Appendix J Probability (p. 555)
  • Definition (p. 555)
  • Axioms and Properties (p. 556)
  • Axioms (p. 556)
  • Properties (p. 556)
  • Repeated Trials (p. 557)
  • Bernoulli Trials (p. 558)
  • Appendix K 8B/6T Code (p. 561)
  • Glossary (p. 563)
  • Acronyms (p. 589)
  • Index (p. 595)

Powered by Koha