02. 2 Network topologies 744 02. 3 Token ring 747 02. 4 Ethernet 749 02. 5 LAN components 752 02. 6 Cabling standards 762 02. 7 Important networking definitions 769 03 Ethernet 771 03. 1 Introduction 771 03. 2 IEEE standards 772 03. 3 Ethernet-media access control (MAC) layer 773 03. 4 IEEE 802. 2 and Ethernet SNAP 775 03. 5 OSI and the IEEE 802. 3 standard 777 03. 6 Ethernet types 780 03. 7 Twisted-pair hubs 781 03. 8 100 Mbps Ethernet 782 03. 9 Gigabit Ethernet 787 03. 10 Bridges 792 03. 11 ARP 793 03. 12 RARP 797 03. 13 Spanning-Tree Protocol 798 03. 14 Additional 799 03. 15 Network interface card design BOO 03. 16 82559-based Ethernet 804 03. 17 Comparison of fast Ethernet with other technologies 806 04 Network Design, Switches and vLANs 807 04. 1 Introduction 807 04. 2 Network design 807 04. 3 Hierarchical network design 809 04. 4 Switches and switching hubs 814 04. 5 vlANs 818 05 Token Ring 825 05. 1 Introduction 825 05. 2 Operation 825 05. 3 Token Ring-media access control (MAC) 826 05. 4 Token Ring maintenance 828 05. 5 Token Ring multistation access units (MAUs) 829 05. 6 Cabling and connectors 830 05. 7 Repeaters 830 05. 8 Jitter suppression 831 06 FDDI 833 06. 1 Introduction 833 06. 2 Operation 834 06. 3 FOOl layers 834 06. 4 SMT protocol 836 06. 5 Physical connection management 836 06.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Using an original and unprecedented multi-level analysis of access and use in low-income neighbourhoods, 'Digital Cities' tells the story of information technology use and inequality in American cities and metropolitan areas.
Prentice Hall版权所有
计算机网络
和美国西蒙与舒斯特国际出版公司合作出版
of widely separated networks , two “ half bridges ” are needed ( see Figures 14-6 and 14-7 , below ) . ... ( a ) Architecture tl , t8 User data t2 , t7 LLC - H User data t3 , t4 , 15 , to MAC - H LLC - H User data MAC - T ( b ) ...
The objective of this book is to provide an up-to-date survey of developments in computer security.
Internet and WWW 2: Internet Network Design, Implementation and Management
Companion CD-ROM The companion CD-ROM contains a test bank with over 200 practice questions and an electronic version of the text. This volume is part of the Exam Certification Guide Series from Cisco Press(r).
With link encryption, each vulnerable communications link is equipped on both ends with an encryption device.Thus,all traffic over all communications links is secured.Although this requires a lot of encryption devices in a large network ...