Top Banner
1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected
38

1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

Jan 03, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

1Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

Computer Networks, 5th Edition

Getting Connected

Page 2: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

2Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.1 An end-user’s view of the Internet.

Page 3: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

3Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.2 Electromagnetic spectrum.

Page 4: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

4Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.3 Signals travel between signalling components; bits flow between adaptors.

Page 5: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

5Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.4 NRZ encoding of a bit stream.

Page 6: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

6Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.5 Different encoding strategies.

Page 7: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

7Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.6 Bits flow between adaptors, frames between hosts.

Page 8: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

8Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.7 BISYNC frame format.

Page 9: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

9Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.8 PPP frame format.

Page 10: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

10Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.9 DDCMP frame format.

Page 11: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

11Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.10 HDLC frame format.

Page 12: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

12Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.11 A SONET STS-1 frame.

Page 13: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

13Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.12 Three STS-1 frames multiplexed onto one STS-3c frame.

Page 14: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

14Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.13 SONET frames out of phase.

Page 15: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

15Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.14 Two-dimensional parity.

Page 16: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

16Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.15 CRC calculation using polynomial long division.

Page 17: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

17Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.16 CRC calculation using shift register.

Page 18: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

18Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.17 Timeline showing four different scenarios for the stop-and-wait algorithm. (a) The ACK is received before the timer expires; (b) the original frame is lost; (c) the ACK is lost; (d) the timeout fires too soon.

Page 19: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

19Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.18 Timeline for stop-and-wait with 1-bit sequence number.

Page 20: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

20Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.19 Timeline for the sliding window algorithm.

Page 21: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

21Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.20 Sliding window on sender.

Page 22: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

22Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.21 Sliding window on receiver.

Page 23: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

23Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.22 Ethernet transceiver and adaptor.

Page 24: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

24Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.23 Ethernet repeater.

Page 25: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

25Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.24 Ethernet hub.

Page 26: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

26Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.25 Ethernet frame format.

Page 27: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

27Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.26 Worst-case scenario: (a) A sends a frame at time t; (b) A’s frame arrives at B at time t + d; (c) B begins transmitting at time t + d and collides with A’s frame; (d) B’s runt (32-bit) frame arrives at A at time t + 2d.

Page 28: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

28Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.27 Example 4-bit chipping sequence.

Page 29: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

29Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.28 A wireless network using a base station.

Page 30: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

30Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.29 A wireless ad hoc or mesh network.

Page 31: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

31Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.30 The hidden node problem. Although A and C are hidden from each other, their signals can collide at B. (B’s reach is not shown.)

Page 32: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

32Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.31 The exposed node problem. Although B and C are exposed to each other’s signals, there is no interference if B transmits to A while C transmits to D. (A and D’s reaches are not shown.)

Page 33: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

33Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.32 Access points connected to a distribution system.

Page 34: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

34Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.33 Node mobility.

Page 35: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

35Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.34 802.11 frame format.

Page 36: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

36Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.35 A Bluetooth piconet.

Page 37: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

37Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.36 Diagram for Exercise 1.

Page 38: 1 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 Computer Networks, 5th Edition Getting Connected.

38Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 2

FIGURE 2.37 Diagram for Exercises 36 to 38.