Beruflich Dokumente
Kultur Dokumente
Networking
and
Internetworking
Devices
McGraw-Hill
Figure 21-1
Connecting Devices
McGraw-Hill
Figure 21-2
McGraw-Hill
Figure 21-3
McGraw-Hill
Figure 21-4
A Repeater
McGraw-Hill
Figure 21-5
Function of a Repeater
McGraw-Hill
Figure 21-6
McGraw-Hill
Figure 21-7
A Bridge
McGraw-Hill
Figure 21-8
Function of a Bridge
McGraw-Hill
Figure 21-9
Multiport Bridge
McGraw-Hill
Figure 21-10
McGraw-Hill
Figure 21-11
Routers in an Internet
McGraw-Hill
Figure 21-12
McGraw-Hill
Figure 21-13
A Gateway
McGraw-Hill
Figure 21-14
McGraw-Hill
Single-Protocol versus
Multiprotocol Router
Figure 21-15
McGraw-Hill
Brouter
Figure 21-16
Switch
McGraw-Hill
Figure 21-17
Example of an Internet
McGraw-Hill
Figure 21-18
McGraw-Hill
Figure 21-19
McGraw-Hill
Figure 21-20
McGraw-Hill
Figure 21-21
McGraw-Hill
Figure 21-22
McGraw-Hill
Figure 21-23
McGraw-Hill
Example 21.1
Figure 21-24
McGraw-Hill
Figure 21-25
McGraw-Hill
Figure 21-26
McGraw-Hill
Figure 21-27
Flooding of As LSP
McGraw-Hill
Figure 21-28
McGraw-Hill
Figure 21-29
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
McGraw-Hill
Figure 21-32
McGraw-Hill
Chapter 23
Upper
OSI
Layers
McGraw-Hill
Figure 23-1
McGraw-Hill
Figure 23-2
McGraw-Hill
Figure 23-3
Synchronization Points
McGraw-Hill
Figure 23-4
SPDU
McGraw-Hill
Figure 23-5
McGraw-Hill
Figure 23-6
McGraw-Hill
Figure 23-7
McGraw-Hill
Figure 23-8
Encryption/Decryption Methods
McGraw-Hill
Figure 23-9
Monoalphabetic Substitution
McGraw-Hill
Figure 23-10
Polyalphabetic Substitution
McGraw-Hill
Figure 23-11
Transpositional Encryption
McGraw-Hill
Figure 23-12
Encoding/Decoding
McGraw-Hill
Figure 23-13
Permutation
McGraw-Hill
Figure 23-14
Substitution
McGraw-Hill
Figure 23-15
Product
McGraw-Hill
Figure 23-16
Exclusive OR
McGraw-Hill
Figure 23-17
Rotation
McGraw-Hill
Figure 23-18
DES
McGraw-Hill
Figure 23-19
McGraw-Hill
Figure 23-20
One of the 16
Steps in DES
McGraw-Hill
Figure 23-21
McGraw-Hill
Figure 23-22
RSA
McGraw-Hill
Figure 23-23
McGraw-Hill
Figure 23-24
Security of RSA
McGraw-Hill
Figure 23-25
Signature Authentication
McGraw-Hill
Figure 23-26
McGraw-Hill
Figure 23-27
Run-Length Encoding
McGraw-Hill
Figure 23-28
MHS
McGraw-Hill
Figure 23-29
McGraw-Hill
Figure 23-30
McGraw-Hill
Figure 23-31
Local Access
McGraw-Hill
Figure 23-32
Remote Access
McGraw-Hill
Figure 23-33
Virtual Terminal
McGraw-Hill