SlideShare a Scribd company logo
1 of 19
Chapter 12 Local Area Networks ,[object Object],[object Object],[object Object],[object Object],WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
Figure 12-1 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 OSI Model and Project 802
Figure 12-2 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Project 802
Figure 12-3 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 PDU Format
Figure 12-4 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 PDU Control Field
Figure 12-5 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
Figure 12-6 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Evolution of CSMA/CD
Figure 12-7 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 MAC Frame
Figure 12-8 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Ethernet Segments
Figure 12-9 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
Figure 12-9-continued WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 10BASE5
Figure 12-10 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Transceiver
Figure 12-11 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
Figure 12-11-continued WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 10BASE2
Figure 12-12 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
Figure 12-12-continued WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 10BASET
Figure 12-13 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998
Figure 12-13-continued WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 1BASE5
Figure 12-14 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998

More Related Content

What's hot

What's hot (15)

Data Link Control in Data Communication DC20
Data Link Control in Data Communication DC20Data Link Control in Data Communication DC20
Data Link Control in Data Communication DC20
 
Telephone Networn in Data Communication DC17
Telephone Networn in Data Communication DC17Telephone Networn in Data Communication DC17
Telephone Networn in Data Communication DC17
 
Multiplexing in Data Communication DC15
Multiplexing in Data Communication DC15Multiplexing in Data Communication DC15
Multiplexing in Data Communication DC15
 
Transmission Media in Data Communication DC13
Transmission Media in Data Communication DC13Transmission Media in Data Communication DC13
Transmission Media in Data Communication DC13
 
Radio Communication Band(Data Communication) DC14
Radio Communication Band(Data Communication) DC14Radio Communication Band(Data Communication) DC14
Radio Communication Band(Data Communication) DC14
 
Ch08 3
Ch08 3Ch08 3
Ch08 3
 
Ch12 2
Ch12 2Ch12 2
Ch12 2
 
CRC
CRCCRC
CRC
 
Ch09 2
Ch09 2Ch09 2
Ch09 2
 
Ch14
Ch14Ch14
Ch14
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Ch08 2
Ch08 2Ch08 2
Ch08 2
 
Ch06 1
Ch06 1Ch06 1
Ch06 1
 
X.25
X.25X.25
X.25
 
Ch03 2
Ch03 2Ch03 2
Ch03 2
 

Viewers also liked

17. Recovery System in DBMS
17. Recovery System in DBMS17. Recovery System in DBMS
17. Recovery System in DBMS
koolkampus
 
Analog to Digital Encoding in Data Communication DC9
Analog to Digital Encoding in Data Communication DC9Analog to Digital Encoding in Data Communication DC9
Analog to Digital Encoding in Data Communication DC9
koolkampus
 
Network Management Security NS8
Network Management Security NS8Network Management Security NS8
Network Management Security NS8
koolkampus
 
20. Parallel Databases in DBMS
20. Parallel Databases in DBMS20. Parallel Databases in DBMS
20. Parallel Databases in DBMS
koolkampus
 
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMS
koolkampus
 
14. Query Optimization in DBMS
14. Query Optimization in DBMS14. Query Optimization in DBMS
14. Query Optimization in DBMS
koolkampus
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
koolkampus
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
koolkampus
 
Software Engineering - Ch12
Software Engineering - Ch12Software Engineering - Ch12
Software Engineering - Ch12
Siddharth Ayer
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26
koolkampus
 
Signal with DC Component(Data Communication) DC7
Signal with DC Component(Data Communication) DC7Signal with DC Component(Data Communication) DC7
Signal with DC Component(Data Communication) DC7
koolkampus
 

Viewers also liked (20)

17. Recovery System in DBMS
17. Recovery System in DBMS17. Recovery System in DBMS
17. Recovery System in DBMS
 
Analog to Digital Encoding in Data Communication DC9
Analog to Digital Encoding in Data Communication DC9Analog to Digital Encoding in Data Communication DC9
Analog to Digital Encoding in Data Communication DC9
 
Network Management Security NS8
Network Management Security NS8Network Management Security NS8
Network Management Security NS8
 
20. Parallel Databases in DBMS
20. Parallel Databases in DBMS20. Parallel Databases in DBMS
20. Parallel Databases in DBMS
 
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMS
 
14. Query Optimization in DBMS
14. Query Optimization in DBMS14. Query Optimization in DBMS
14. Query Optimization in DBMS
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
 
Legacy systems
Legacy systemsLegacy systems
Legacy systems
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
 
Cost Estimation
Cost EstimationCost Estimation
Cost Estimation
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Problemas
ProblemasProblemas
Problemas
 
Laboratorio de sistemas Schwoch
Laboratorio de sistemas SchwochLaboratorio de sistemas Schwoch
Laboratorio de sistemas Schwoch
 
Practica de laboratorio de sistema de dirección
Practica de laboratorio de sistema de direcciónPractica de laboratorio de sistema de dirección
Practica de laboratorio de sistema de dirección
 
Software Engineering - Ch12
Software Engineering - Ch12Software Engineering - Ch12
Software Engineering - Ch12
 
Diffrence between dbms and rdbms
Diffrence between dbms and rdbmsDiffrence between dbms and rdbms
Diffrence between dbms and rdbms
 
Problemas
ProblemasProblemas
Problemas
 
Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26Legacy Systems in Software Engineering SE26
Legacy Systems in Software Engineering SE26
 
Problemas de Fund. Eléctricos
Problemas de Fund. EléctricosProblemas de Fund. Eléctricos
Problemas de Fund. Eléctricos
 
Signal with DC Component(Data Communication) DC7
Signal with DC Component(Data Communication) DC7Signal with DC Component(Data Communication) DC7
Signal with DC Component(Data Communication) DC7
 

Similar to Local Area Networks in Data Communication DC24 (20)

13 ethernet
13 ethernet13 ethernet
13 ethernet
 
Ch13
Ch13Ch13
Ch13
 
Ch13
Ch13Ch13
Ch13
 
Man
ManMan
Man
 
Application layer diagram
Application layer diagramApplication layer diagram
Application layer diagram
 
Ch06 1
Ch06 1Ch06 1
Ch06 1
 
SONET/SDH
SONET/SDHSONET/SDH
SONET/SDH
 
Ch08 3
Ch08 3Ch08 3
Ch08 3
 
Ch02 2
Ch02 2Ch02 2
Ch02 2
 
3
33
3
 
Ch02 2
Ch02 2Ch02 2
Ch02 2
 
Ch02 1
Ch02 1Ch02 1
Ch02 1
 
2
22
2
 
Ch02 1
Ch02 1Ch02 1
Ch02 1
 
Transmission Of Digital Data
Transmission Of Digital DataTransmission Of Digital Data
Transmission Of Digital Data
 
Ch11 1
Ch11 1Ch11 1
Ch11 1
 
Ch11 1
Ch11 1Ch11 1
Ch11 1
 
Ch03 2
Ch03 2Ch03 2
Ch03 2
 
5
55
5
 
Ch07 1
Ch07 1Ch07 1
Ch07 1
 

More from koolkampus

Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11
koolkampus
 
Layer Examples in Data Communication CD4
Layer Examples in Data Communication CD4Layer Examples in Data Communication CD4
Layer Examples in Data Communication CD4
koolkampus
 
OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3
koolkampus
 
Basic Concepts in Data Communication DC1
Basic Concepts in Data Communication DC1Basic Concepts in Data Communication DC1
Basic Concepts in Data Communication DC1
koolkampus
 
Analog to Analog Modulation in Data Communication DC10
Analog to Analog Modulation in Data Communication DC10Analog to Analog Modulation in Data Communication DC10
Analog to Analog Modulation in Data Communication DC10
koolkampus
 
Encoding in Data Communication DC8
Encoding in Data Communication DC8Encoding in Data Communication DC8
Encoding in Data Communication DC8
koolkampus
 
Signal Phases in Data Communication DC6
Signal Phases in Data Communication DC6Signal Phases in Data Communication DC6
Signal Phases in Data Communication DC6
koolkampus
 
Transmission Modes in Data Communication DC2
Transmission Modes in Data Communication DC2Transmission Modes in Data Communication DC2
Transmission Modes in Data Communication DC2
koolkampus
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
koolkampus
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
koolkampus
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
koolkampus
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
koolkampus
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
koolkampus
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
koolkampus
 

More from koolkampus (14)

Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11Transmission of Digital Data(Data Communication) DC11
Transmission of Digital Data(Data Communication) DC11
 
Layer Examples in Data Communication CD4
Layer Examples in Data Communication CD4Layer Examples in Data Communication CD4
Layer Examples in Data Communication CD4
 
OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3OSI Model (Data Communication) DC3
OSI Model (Data Communication) DC3
 
Basic Concepts in Data Communication DC1
Basic Concepts in Data Communication DC1Basic Concepts in Data Communication DC1
Basic Concepts in Data Communication DC1
 
Analog to Analog Modulation in Data Communication DC10
Analog to Analog Modulation in Data Communication DC10Analog to Analog Modulation in Data Communication DC10
Analog to Analog Modulation in Data Communication DC10
 
Encoding in Data Communication DC8
Encoding in Data Communication DC8Encoding in Data Communication DC8
Encoding in Data Communication DC8
 
Signal Phases in Data Communication DC6
Signal Phases in Data Communication DC6Signal Phases in Data Communication DC6
Signal Phases in Data Communication DC6
 
Transmission Modes in Data Communication DC2
Transmission Modes in Data Communication DC2Transmission Modes in Data Communication DC2
Transmission Modes in Data Communication DC2
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Local Area Networks in Data Communication DC24