<html xmlns="http://www.w3.org/TR/REC-html40"> <head> <meta http-equiv=Content-Type content="text/html; charset=unicode"> <link href="../css/5e.css" type=text/css rel=STYLESHEET> <title>Computer Networks and Internets</title> <!-- <style> /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; } /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal { margin:0in; margin-bottom:.0001pt; font-size:12.0pt; font-family:"Times New Roman","serif"; } p { margin-right:0in; margin-left:0in; font-size:12.0pt; font-family:"Times New Roman","serif"; } p.style1, li.style1, div.style1 { margin-right:0in; margin-left:0in; font-size:19.0pt; font-family:"Times New Roman","serif"; color:#000033; font-weight:bold;} p.style2, li.style2, div.style2 { margin-right:0in; margin-left:0in; font-size:15.0pt; font-family:"Times New Roman","serif"; } p.style3, li.style3, div.style3 { margin-right:0in; margin-left:0in; font-size:16.5pt; font-family:"Times New Roman","serif"; } span.style31 { } span.style21 { } span.SpellE { } .MsoChpDefault { font-size:10.0pt; } @page Section1 {size:8.5in 11.0in; margin:1.0in 1.0in 1.0in 1.0in; } div.Section1 {page:Section1;} </style> --> <style type="text/css"> <!-- .style1 {color: #3366FF} --> </style> </head> <body> <table border=0 cellspacing=0 cellpadding=0 width=75%> <tr > <td colspan=3>&nbsp;</td> </tr> <tr > <td colspan=3><h3 align="center" class="style1">List of Animations</h3></td> </tr> <tr> <td width=63>&nbsp;</td> <td width=539>&nbsp;</td> <td width=163>&nbsp;</td> </tr> <tr bordercolor="#000000"> <td><div align="center"><strong>#</strong></div></td> <td><strong>Animation Title</strong></td> <td><div align="center"><strong>Chapter Related </strong></div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">1</div></td> <td><a href="layers.html">Packet Travelling Through Layers</a></td> <td><div align="center">[ Chapter 01 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">2</div></td> <td><a href="socket%20calls.html">Interaction in a Client-Server Architecture </a></td> <td><div align="center">[ Chapter 03 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">3</div></td> <td><a href="convert%20analog%20to%20digital.html">Converting Analog Signals to Digital Signals </a></td> <td><div align="center">[ Chapter 06 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">4</div></td> <td><a href="GEO%20final.html">Operation of GEO Communication Satellites</a></td> <td><div align="center">[ Chapter 07 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">5</div></td> <td><a href="light%20behavior%20final.html">Behavior of Light at Different Density Boundaries </a></td> <td><div align="center">[ Chapter 07 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">6</div></td> <td><a href="radiation%20effects.html">Effect of Radiation on Parallel and Twisted-Pair Wires</a></td> <td><div align="center">[ Chapter 07 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">7</div></td> <td><a href="even%20parity%20checking.html">Row and Column Parity Checking </a></td> <td><div align="center">[ Chapter 08 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">8</div></td> <td><a href="RAC%20Parity.html">Row and Column </a><a href="even%20parity%20checking.html">Parity Checking</a><a href="RAC%20Parity.html"> for Error Detection/Correction</a></td> <td><div align="center">[ Chapter 08 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">9</div></td> <td><a href="parallel%20transmission.html">Parallel Transmission </a></td> <td><div align="center">[ Chapter 09 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">10</div></td> <td><a href="serial%20transmission.html">Serial Transmission </a></td> <td><div align="center">[ Chapter 09 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">11</div></td> <td><a href="transmision%20modesMOD.html">Transmission Modes (Simplex, Half-Duplex, Full-Duplex)</a></td> <td><div align="center">[ Chapter 09 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">12</div></td> <td><a href="Amplitude%20Shift%20Keying.html">Amplitude Shift Keying (ASK) Modulation</a></td> <td><div align="center">[ Chapter 10 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">13</div></td> <td><a href="Frequency%20Shift%20Keying.html">Frequency Shift Keying (FSK) Modulation</a></td> <td><div align="center">[ Chapter 10 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">14</div></td> <td><a href="Phase%20Shift%20Keying.html">Phase Shift Keying (PSK) Modulation</a></td> <td><div align="center">[ Chapter 10 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">15</div></td> <td><a href="tdm.html">Time Division Multiplexing (TDM)</a></td> <td><div align="center">[ Chapter 11 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">16</div></td> <td><a href="fdm.html">Frequency Division Multiplexing (FDM)</a></td> <td><div align="center">[ Chapter 11 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">17</div></td> <td><a href="byte%20stuffing.html">Byte Stuffing</a></td> <td><div align="center">[ Chapter 13 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">18</div></td> <td><a href="Circuit%20Switching-half%20duplex.html">Circuit Switching-Half Duplex</a></td> <td><div align="center">[ Chapter 13 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">19</div></td> <td><a href="Circuit%20Switching-full%20duplex.html">Circuit Switching-Full Duplex</a></td> <td><div align="center">[ Chapter 13 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">20</div></td> <td><a href="token%20ring.html">Token Ring (Controlled Access)</a></td> <td><div align="center">[ Chapter 14 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">21</div></td> <td><a href="CSMA.html">Carrier Sense Multiple Access (CSMA)</a></td> <td><div align="center">[ Chapter 14 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">22</div></td> <td><a href="CSMA-CD.html">CSMA-Collision Detection (CSMA/CD)</a></td> <td><div align="center">[ Chapter 14 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">23</div></td> <td><a href="VSAT%20Satellite%20Technology.html">Reflection of Signals by a Parabolic Dish Antenna </a></td> <td><div align="center">[ Chapter 16 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">24</div></td> <td><a href="shortest%20path.html">Dijkstra's Algorithm (Shortest Path Computation in a Graph) </a></td> <td><div align="center">[ Chapter 18 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">25</div></td> <td><a href="internet%20concept.html">IP Protocol: Datagrams may Travel Through Different Routes</a></td> <td><div align="center">[ Chapter 20 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">26</div></td> <td><a href="in%20order.html">IP Protocol: Datagrams may Arrive In-Order</a></td> <td><div align="center">[ Chapter 20 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">27</div></td> <td><a href="out%20of%20order.html">IP Protocol: Datagrams may Arrive Out-of-Order </a></td> <td><div align="center">[ Chapter 20 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">28</div></td> <td><a href="lost%20packet.html">IP Protocol: Datagrams may be Lost </a></td> <td><div align="center">[ Chapter 20 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">29</div></td> <td><a href="address%20masks.html">Address Masks (Network ID Extraction)</a></td> <td><div align="center">[ Chapter 21 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">30</div></td> <td><a href="forwarding%20an%20IP%20datagram.html">Forwarding an IP Datagram </a></td> <td><div align="center">[ Chapter 22 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">31</div></td> <td><a href="IPdatagram%20travelling%20across%20net.html">IP Datagram Travelling Across Multiple Networks</a></td> <td><div align="center">[ Chapter 22 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">32</div></td> <td><a href="fragmentation.html">Datagram Fragmentation</a></td> <td><div align="center">[ Chapter 22 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">33</div></td> <td><a href="NAT%20Concept.html">Network Address Translation (NAT)</a></td> <td><div align="center">[ Chapter 23 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">34</div></td> <td><a href="Encapsulation.html">Encapsulation</a></td> <td><div align="center">[ Chapter 25 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">35</div></td> <td><a href="TCP%20Re-transmission.html">TCP Re-transmission (Packet Lost)</a></td> <td><div align="center">[ Chapter 26 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">36</div></td> <td><a href="TCP%20Re-transmission-ack.html">TCP Re-transmission (ACK Lost)</a></td> <td><div align="center">[ Chapter 26 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">37</div></td> <td><a href="TCP%203-way%20handshake.html">TCP 3-Way Handshake</a></td> <td><div align="center">[ Chapter 26 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">38</div></td> <td><a href="TCP%20Connection%20Concept.html">TCP Connection Concept</a></td> <td><div align="center">[ Chapter 26 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">39</div></td> <td><a href="AS%20Concept.html">Autonomous Systems (AS)</a></td> <td><div align="center">[ Chapter 27 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">40</div></td> <td><a href="jitter%20buffer.html">Jitter Buffer (Regulating Traffic)</a></td> <td><div align="center">[ Chapter 29 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">41</div></td> <td><a href="denial%20of%20service.html">Distributed Denial of Service Attack (DoS)</a></td> <td><div align="center">[ Chapter 30 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">42</div></td> <td><a href="man%20in%20the%20middle.html">Man-in-the-Middle Attack</a></td> <td><div align="center">[ Chapter 30 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">43</div></td> <td><a href="firewalls.html">Firewall: Packet Filtering</a></td> <td><div align="center">[ Chapter 30 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">44</div></td> <td><a href="VPN%20Concept.html">Virtual Private Networks (VPN)</a></td> <td><div align="center">[ Chapter 30 ]</div></td> </tr> <tr bordercolor="#000000"> <td><div align="center">45</div></td> <td><a href="load%20balance.html">Load Balancing</a></td> <td><div align="center">[ Chapter 32 ]</div></td> </tr> </table> </body> </html>