Location via proxy:
[ UP ]
[Report a bug]
[Manage cookies]
No cookies
No scripts
No ads
No referrer
Show this form
Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Loading...
User Settings
close menu
Welcome to Scribd!
Upload
Read for free
FAQ and support
Language (EN)
Sign in
0 ratings
0% found this document useful (0 votes)
19 views
IEEE 802 Architecture
Uploaded by
rash
IEEE 802 Architecture
Copyright:
© All Rights Reserved
Available Formats
Download
as PDF or read online from Scribd
Download
Save
Save IEEE 802 Architecture For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
IEEE 802 Architecture
Uploaded by
rash
0 ratings
0% found this document useful (0 votes)
19 views
7 pages
Document Information
click to expand document information
IEEE 802 Architecture
Copyright
© © All Rights Reserved
Available Formats
PDF or read online from Scribd
Share this document
Share or Embed Document
Sharing Options
Share on Facebook, opens a new window
Facebook
Share on Twitter, opens a new window
Twitter
Share on LinkedIn, opens a new window
LinkedIn
Share with Email, opens mail client
Email
Copy link
Copy link
Did you find this document useful?
0%
0% found this document useful, Mark this document as useful
0%
0% found this document not useful, Mark this document as not useful
Is this content inappropriate?
Report
IEEE 802 Architecture
Copyright:
© All Rights Reserved
Available Formats
Download
as PDF or read online from Scribd
Download now
Download as pdf
Save
Save IEEE 802 Architecture For Later
0 ratings
0% found this document useful (0 votes)
19 views
7 pages
IEEE 802 Architecture
Uploaded by
rash
IEEE 802 Architecture
Copyright:
© All Rights Reserved
Available Formats
Download
as PDF or read online from Scribd
Save
Save IEEE 802 Architecture For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download as pdf
Jump to Page
You are on page 1
of 7
Search inside document
orking group, Wi he veloped by the 7 standards and then at the specifics of IERE #.11 : architecture of TE] Pesto ese The architecture of a LAN is best described in terms of organize the basic functions of a LAN ‘This sect ene standardized protocol architecture for LANs, which encommurce eet i access control, and logical link control layers We then look ty ee pth medium access control and logical link control, snore deal st medium Jay ‘ering of protocols that ith a description of the Protocol Architecture Protocols defined specifically for LAN and MAN (metropolitan area network) trans- mission address issues relating to the transmission of blocks of data over the network In OSI terms, higher-layer protocols (layer 3 or 4 and above) are independent of net. work architecture and are applicable to LANs, MANs, and WANs. Thus, a discussion of LAN protocols is concerned principally with lower layers of the OSI model. Figure 14.1 relates the LAN protocols to the OSI architecture (Figure 4.3). This architecture was developed by the IEEE 802 committee and has been adopted by all organizations working on the specification of LAN standards. It is generally referred to as the IEEE 802 reference model.’ Working from the bottom up, the lowest layer of the IEEE 802 reference model corresponds to the physical layer of the OSI model and includes such functions as + Encoding/decoding of signals (e.g., PSK, QAM. etc.) + Preamble gencration/removal (for synchronization) «© Bit transmission/reception hysical layer of the 802 model includes a specification of the trans- mission medium and the topology. Generally, this is considered “below the lowest layer of the OSI model. However, the choice of transmission medium and topology is critical in LAN design, and so a specification of the medium is jneluded For oe of the IEEE 802 standards. the physical layer is further subdivided into sublayers. In players are defined: the case of IEEE 802.11, two sul . : Defines a method of mapping . i ye vergence procedure (PLCP): Det i n weit} MAC layer protocol data units (MPDUs) into a framing format suit- Tease dine and receiving user data and management information erent ‘or more stations using the associated PMD sublayer eet MD): Defines the characteristics of, i jum dependent sublayer (PM . ond caine of rating and receiving, user data through a wireless and metho medium betwcen two or more stations In addition, the pI ganizations involved i ww of the key 0 rovides an overvie Oar. ———_— is book's Web site pi A supporting document — ead road ‘standards, including the IEEE 802 Stan cat in developing communi Scanned by CamScannerFP ww ‘ OSI Reference Model _ Apptication Prewetation IEEE 802 I Reference Senses Model Trampert | Upper-layer | “prota Lc service ‘access point Network (LSAP) Fi gure 14.1 IEEE 802 Protocol Layers Compared to OSI Model ‘Above the physical layer are the functions associated with providing service to LAN users. These include * On transmission, assemble data into a frame with address and error detec- tion fields. * On reception, disassemble frame, and perform address recognition and error detection. * Govern access to the LAN transmission medium, * Provide an interface to higher layers and perform flow and error control. These are functions typically associated with OSI layer 2. The set of functions in the last bullet item is grouped into a logical link control (LLC) layer. The func- ons in the first three bullet items are treated as a separate layer, called medium “ecess control (MAC). The separation is done for the following reasons: * ‘The logic required to manage acce traditional layer 2 data link control, * For the same a . fi in so a shared-access medium is not found everal MAC options may be provided. Scanned by CamScannerTP segment ————~ PP datagram ————~ LLC protocol data unit —————~ —— MA frt9e Figure 14.2. IEEE 802 Protocols in Context Figure 14.2, which reproduces Figure 11.14, illustrates the relationship between the levels of the architecture. Higher-level data are passed down to LLC, which appends control information as a header, creating an LLC protocol data unit (PDU). Tis control information is used in the operation of the LLC protocol. The entire LLC PDUs then passed down to the MAC layer. which appends control information at the front and back of the packet, forming a MAC frame. Again, the control information in the frame is needed for the operation of the MAC protocol. For context, the figure also shows the use of TCP/IP and an application layer above the LAN protocols - MAC Frame Format “The MAC layer receives a block of data from the LLC layer and is responsible for performing functions related to medium access and for transmitting the data. As Pith other protocol layers, MAC implements these functions making use of a proto- this case, the PDU is referred to as a MAC frame. ‘The exact format of the MAC frame differs somewhat for the various MAC protocols in use. In general, all of the MAC frames have @ format similar to that of Figure 14.3. The fields of this frame are as follows: + MAC Controk This field contains any protocol control information needed for the functioning of the MAC protocol. For example, a priority level could be indicated here. + Destination MAC Address: TB: LAN for this frame. col data unit at its layer. In « destination physical attachment point on the Scanned by CamScanner6 LAN STANDAIND bay WHEELS! WEE AND THE TELE at 462, curren scan | Sours Data MAC mae Tne [MAC wddress fp frame |_controt_| MAC adress? 7 2 Variable xtc tor 5 Soe + Information ] LLC Ppsar [scar LLC contro! ah PDU f : z LLC ue DSAP value cm) SsAR gabe address fields i vl DSAP = destination verve access pit Oe = commande settee ces poi rommand/response SAP Figure 14.3 LLC PDU in a Generic MAC Frame Format + Source MAC Address: The source physical attachment point on the LAN for this frame. © Data: The body of the MAC frame. This may be LLC data from the next higher layer or control information relevant to the operation of the MAC protocol. © CRC: The cyclic redundancy check field (also known as the frame check sequence, FCS, field), This is an error-detecting code, as described in Section 8.1. The CRC is used in virtually all data link protocols, such as HDLC (Appendix C). In most data link control protocols, the data link protocol entity is responsible not only for detecting errors using the CRC but for recovering from those errors by retrans- mitting damaged frames. In the LAN protocol architecture, these two functions are split between the MAC and LLC layers. The MAC layer is responsible for detecting errors and discarding any frames that are in error. The LLC layer optionally keeps track of which frames have been successfully received and retransmits unsuccessful frames Logical Link Control ‘The LLC layer for LANS is similar in many respects t ink Ia use, Like all link lay with the tranemiston cts between two stati has two characteristi ‘$s in common LLCis concerned with the transmission of a link-level PDU without the necessity of an intermediate switching node. LLC not shared by most other link control protocols: I sl C ii Itrmus support the multiaccess, shared-medium nature of the link (this differs m a multidrop line in that there is no primary node). othe : 2. Itis relieved of some details of link access by the MAC layer. Scanned by CamScannerAddressing in LLC invoty cs , , seris shew: Specit ppieally.a USEF iS a higher-ayer cet ayer pene EINE the 9 ion. These LLC ser addresses ane et eter ° gecping With OST terminology for the wee neat ncn We look first at the services that authe LLC protocol, a high herd evel user r and then LLC Services LLC specities the mechan anedium and for controlling the exchange of data: ad format of this standard is based on MDL e services for attached devices: M « Unacknowledged coi m ctionless service: Th cigrnieigeiane his is a datap a ven meen ‘ice that docs not involve any flow 7 nisms. Thus, the delivery of data i vert Te ll bee ee of data is not guaranteed. However. in mos. de ee eceae her layer of software that deals with reliability soe e Connection-mo ‘ice: This Hap i f ity 7 A losical sc ontiecti cee This service is similar to that offered iy gical n is set up between two users cx Shiri controland errarcontrolare provided. saan eta am serve and €rror-comtro} te e Acknowledged i is i Ack owledged conne fionless service: This is a cross between the previous ) . It provides that datagrams are to be acknowledged, but n logical connection is set up. m er ‘Typically,a vendor will provide these services as options that the customer can select when purchasing the equipment, Alternatively, the customer can purchase equipment that provides two or all tree services and select a specific service based on application. The unacknowledged connectionless service requires minimum logic and is useful in two contexts. First, it will often be the case that higher layers of software will provide the necessary reliability and flow-control mechanism, and itis efficient ro avoid duplicating them, For example, TCP could provide the mechanisms needed to ensure that data are delivered reliably. Second, there are instances in which the over- head of connection establishment and maintenance is unjustified or even counter productive (for example, data collection activities that involve the periodic sampling ‘of data sources, such as sensors and automatic self-test reports from security equip- ment or network components). In a monitoring application, the loss of an occasional data unit would not cause distress, as the next report should arrive shortly. Thus, in most cases, the unacknowledged connectionless service is the preferred option. The connection-mode service could be us .d in very simple devices, such 3 that have little software operating ‘above this level. In these eases it ‘ol and reliability mechanisms normally implemented cations software. is useful in sever : ‘oftware must maintain some sort of that connection. Hf the nations for data, farge number of ‘environment remote sensors, would provide the flow contr at higher layers of the communi The acknowledged connectionless service cal link control s sion-mode service, the logical link conto» to keep tal of the status of ren ge number of dest user needs guaranteed delivery but there * a larg ae the then the connection-mode service may De impract nh reamed E8108 tables required. An example is a proces control or au al contents With the conn table for each active connection, Scanned by CamScanner1 WIRELESS LAN STANDARD werent AND) THE AEE sunicate with a large number of processors ang the handling, of important and time factory. Because Of their tmportaney sured that the signal gop {nol want LO Lake the tinye J to comm atrollers. Another use cof this ‘ Mergen com signals ia HCLOEY sted se that the sender ean Be of the sig i then send the dat where a central site may 1 programmable con critical alarm or er an acknowledgment is Ne through, Because of the urge’ first to establish a logical connection LLC Protocol The basic LLC proto s. The differences col is modeled after HDLC and has simitay hetween the two protocols can be surnam functions and forma rized as follows: chronous balanced mode of operation of HDLC tg service: this is referred to as type 2 operation «© LLC makes use of th support connection-mode 1 The other HDLC modes are not employed. «LLC supports an unacknowledged connectiontess servi bored information PDU: this is known as type 1 operation. © LLC supports an acknowledged connectionless service by using two ney unnumbered PDUs; this is known as type 3 operation. © LLC permits multiplexing by the use of LLC service access points (SAPs), using the unnum. All three LLC protocols employ the same PDU format (Figure 14.3), which con. sists of four fields. The DSAP and SSAP fields each contain a 7-bit address, which specify the destination and source users of LLC, respectively. One bit of the DSAP indicates whether the DSAP is an individual or group address. One bit of the SSAP indicates whether the PDU is a command or response PDU. The format of the LLC control field is identical to that of HDLC (Figure C1, Appendix C), using extended (7-bit) sequence numbers. For type 1 operation, which supports the unacknowledged connectionless ser- vice, the unnumbered information (UI) PDU is used to transfer user data. There is no acknowledgment, flow control, or error control. However, there is error detec- tion and discard at the MAC level. __ Two other PDU types, XID and TEST, are used to support management func: tions associated with all three types of operation. Both PDU types are used in the following fashion. An LLC entity may issue a command (C/R bit = 0) XID or TES T. The receiving LLC entity issues a corresponding XID or TEST in response. The XID PDU is used to exchange two types of information: types of operation sup- ported and window size. The TEST PDU is used to conduct a loopback test of the Sapamison path between two LLC entities. Upon receipt of a TEST command ‘Wine onerat entity issues a TEST response PDU as soon as possible. SAPs priorte daeen ion, a data link connection is established between two LLC lata exchange, Connection establishment is attempted by the type? protocol in response to a request fr or A ite iewues 8 SABME PDU? to request a logieal quest from a user. The LLC entity issues a SABM ‘quest 4 logical connection with the other LLC entity. If the connection This stands for set async ! wsynchronous balanced mode extended, Wis used in HDLC to choose ABM and select extended sequence type Doperation Ne numbers of 7 bits Both ABM and 7-bit sequenve numbers are mandatory Scanned by CamScannerMav 10.02.11 ANCIENT FAND SUIEVICES 465 _ceepted by the LLC user desi js aceeP ser designated . isfy returns am unnumbered laden es DSAR then the gforth uniquely identified by the 4 © pair of user $A SAP: ene cre rejects the connection re yser rejects 4 clion request, its LLC 's Hf the destinati . LO en re inatic + (pM) PDU. nity returns a disconnected ined le (Once the connection is established data are ppUsasin HDLC. Information PDUs include send ed ae tsing information sequencing and flow control. The supervisory PDUs wre tac ae nen timbers pws conrol and error contol Pe catty cam ear act 8 DLC for nection bY ising ‘a disconnect (DISC) PDU. hinate a logical LLC con- th type 3 operation, euch transmitted PDU is found in HDLC) unnumbered PDU, the scnowindged saad A now (not jnformation PDU, is defined. User data are sen AC com aa Pt (acy be acknowledged using an AC response PDU.To guard ay inst lost Pons abil Raquence number is used. The sender alternates the use of 0 ind | ints AC seainand PDU, and the receiver responds with an AC PDU with the o poste number of the corresponding command. Only one PDU in each direction iar outstanding at any time. fo! AND SERVICES EEE 802-11 ARCHITEC In 1990, the IEEE 802 Committee formed a new working group, IE 802.11, specificall devoted to wi LANs, with a charter to develop a MAC protocol and physical medium sp al interest was in developing a wire- jess LAN operating, in the ISM (industrial, scientific, and medical) band. Since that time, the demand for WLANS, at different frequencies and data rates, has exploded. Keeping pace with this demand, the 802.11 working group has issued an ever-expanding list of standards (Table 14.1). fable 14.2 briefly defines key terms used in the IEEE 802.11 standard. (The Wi-Fi Alliance weptance was 802.11b, Although ‘The first 802.11 standard to gain broad industry acc 802.11b products are all based on the same standard, there is always @ concern whether products from different vendors will successfully i “To meet this bility Alliance (WECA), an industry con- reless Ethernet Compati med in 1999. This organization, subsequently renamed the Wi liance, created a le suite to certify interoperability for £2004, products from over 120 vendors have been certified, fied 802.11b products is Wi-Fi, Wi-Fi Cl nlification has been ducts, and 57 vendors have 50 far been qua fied. The Wi-Fi ped a certification pre for 802.114 products, called alified for Wi certification. auened with a range ‘of market areas for WLANS, hot spots. concern, the Wi sortium, was for (Wireless Fidelity) Al 802.11b products. As o} The term used for certi extended to 802.11g pro’ Alliance has also develo Wi-Fi5. So far, 32 vendors have __ The Wi-Fi Alliance is con! including enterprise, home, andh Scanned by CamScanner
You might also like
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
From Everand
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
Mark Manson
Rating: 4 out of 5 stars
4/5 (5978)
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
From Everand
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
Brené Brown
Rating: 4 out of 5 stars
4/5 (1110)
Principles: Life and Work
From Everand
Principles: Life and Work
Ray Dalio
Rating: 4 out of 5 stars
4/5 (622)
Never Split the Difference: Negotiating As If Your Life Depended On It
From Everand
Never Split the Difference: Negotiating As If Your Life Depended On It
Chris Voss
Rating: 4.5 out of 5 stars
4.5/5 (893)
The Glass Castle: A Memoir
From Everand
The Glass Castle: A Memoir
Jeannette Walls
Rating: 4.5 out of 5 stars
4.5/5 (1737)
Sing, Unburied, Sing: A Novel
From Everand
Sing, Unburied, Sing: A Novel
Jesmyn Ward
Rating: 4 out of 5 stars
4/5 (1217)
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
From Everand
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
Margot Lee Shetterly
Rating: 4 out of 5 stars
4/5 (932)
Grit: The Power of Passion and Perseverance
From Everand
Grit: The Power of Passion and Perseverance
Angela Duckworth
Rating: 4 out of 5 stars
4/5 (619)
The Perks of Being a Wallflower
From Everand
The Perks of Being a Wallflower
Stephen Chbosky
Rating: 4.5 out of 5 stars
4.5/5 (2119)
Shoe Dog: A Memoir by the Creator of Nike
From Everand
Shoe Dog: A Memoir by the Creator of Nike
Phil Knight
Rating: 4.5 out of 5 stars
4.5/5 (546)
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
From Everand
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
Ben Horowitz
Rating: 4.5 out of 5 stars
4.5/5 (356)
Her Body and Other Parties: Stories
From Everand
Her Body and Other Parties: Stories
Carmen Maria Machado
Rating: 4 out of 5 stars
4/5 (831)
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
From Everand
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
Ashlee Vance
Rating: 4.5 out of 5 stars
4.5/5 (476)
Bad Feminist: Essays
From Everand
Bad Feminist: Essays
Roxane Gay
Rating: 4 out of 5 stars
4/5 (1058)
The Emperor of All Maladies: A Biography of Cancer
From Everand
The Emperor of All Maladies: A Biography of Cancer
Siddhartha Mukherjee
Rating: 4.5 out of 5 stars
4.5/5 (275)
Steve Jobs
From Everand
Steve Jobs
Walter Isaacson
Rating: 4.5 out of 5 stars
4.5/5 (814)
Angela's Ashes: A Memoir
From Everand
Angela's Ashes: A Memoir
Frank McCourt
Rating: 4.5 out of 5 stars
4.5/5 (443)
Brooklyn: A Novel
From Everand
Brooklyn: A Novel
Colm Toibin
Rating: 3.5 out of 5 stars
3.5/5 (2029)
The Little Book of Hygge: Danish Secrets to Happy Living
From Everand
The Little Book of Hygge: Danish Secrets to Happy Living
Meik Wiking
Rating: 3.5 out of 5 stars
3.5/5 (424)
The World Is Flat 3.0: A Brief History of the Twenty-first Century
From Everand
The World Is Flat 3.0: A Brief History of the Twenty-first Century
Thomas L. Friedman
Rating: 3.5 out of 5 stars
3.5/5 (2272)
A Man Called Ove: A Novel
From Everand
A Man Called Ove: A Novel
Fredrik Backman
Rating: 4.5 out of 5 stars
4.5/5 (4851)
The Outsider: A Novel
From Everand
The Outsider: A Novel
Stephen King
Rating: 4 out of 5 stars
4/5 (1953)
The Yellow House: A Memoir (2019 National Book Award Winner)
From Everand
The Yellow House: A Memoir (2019 National Book Award Winner)
Sarah M. Broom
Rating: 4 out of 5 stars
4/5 (99)
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
From Everand
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
Gilbert King
Rating: 4.5 out of 5 stars
4.5/5 (270)
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
From Everand
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
Viet Thanh Nguyen
Rating: 4.5 out of 5 stars
4.5/5 (125)
Yes Please
From Everand
Yes Please
Amy Poehler
Rating: 4 out of 5 stars
4/5 (1941)
A Tree Grows in Brooklyn
From Everand
A Tree Grows in Brooklyn
Betty Smith
Rating: 4.5 out of 5 stars
4.5/5 (1934)
The Art of Racing in the Rain: A Novel
From Everand
The Art of Racing in the Rain: A Novel
Garth Stein
Rating: 4 out of 5 stars
4/5 (4255)
Team of Rivals: The Political Genius of Abraham Lincoln
From Everand
Team of Rivals: The Political Genius of Abraham Lincoln
Doris Kearns Goodwin
Rating: 4.5 out of 5 stars
4.5/5 (235)
The Woman in Cabin 10
From Everand
The Woman in Cabin 10
Ruth Ware
Rating: 3.5 out of 5 stars
3.5/5 (2587)
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
From Everand
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
Dave Eggers
Rating: 3.5 out of 5 stars
3.5/5 (232)
Fear: Trump in the White House
From Everand
Fear: Trump in the White House
Bob Woodward
Rating: 3.5 out of 5 stars
3.5/5 (805)
Wolf Hall: A Novel
From Everand
Wolf Hall: A Novel
Hilary Mantel
Rating: 4 out of 5 stars
4/5 (4042)
On Fire: The (Burning) Case for a Green New Deal
From Everand
On Fire: The (Burning) Case for a Green New Deal
Naomi Klein
Rating: 4 out of 5 stars
4/5 (75)
Rise of ISIS: A Threat We Can't Ignore
From Everand
Rise of ISIS: A Threat We Can't Ignore
Jay Sekulow
Rating: 3.5 out of 5 stars
3.5/5 (139)
John Adams
From Everand
John Adams
David McCullough
Rating: 4.5 out of 5 stars
4.5/5 (2411)
Manhattan Beach: A Novel
From Everand
Manhattan Beach: A Novel
Jennifer Egan
Rating: 3.5 out of 5 stars
3.5/5 (883)
The Constant Gardener: A Novel
From Everand
The Constant Gardener: A Novel
John le Carré
Rating: 3.5 out of 5 stars
3.5/5 (108)
The Unwinding: An Inner History of the New America
From Everand
The Unwinding: An Inner History of the New America
George Packer
Rating: 4 out of 5 stars
4/5 (45)
The Light Between Oceans: A Novel
From Everand
The Light Between Oceans: A Novel
M.L. Stedman
Rating: 4.5 out of 5 stars
4.5/5 (789)
Python Tutorial1
Document
1 page
Python Tutorial1
rash
No ratings yet
UED MAY-19 (CBCGS) (E-Next - In)
Document
1 page
UED MAY-19 (CBCGS) (E-Next - In)
rash
No ratings yet
Processor Organization: CPU Must
Document
9 pages
Processor Organization: CPU Must
rash
No ratings yet
CG Viva I
Document
8 pages
CG Viva I
rash
No ratings yet
Assignment-1: MCA204 Financial Accounting and Management
Document
4 pages
Assignment-1: MCA204 Financial Accounting and Management
rash
No ratings yet
L29 MicroOperations
Document
21 pages
L29 MicroOperations
rash
No ratings yet
Assignment-2: MCA204 Financial Accounting and Management
Document
6 pages
Assignment-2: MCA204 Financial Accounting and Management
rash
No ratings yet
Python - Tuples: Accessing Values in Tuples
Document
5 pages
Python - Tuples: Accessing Values in Tuples
rash
No ratings yet
Python - Numbers: Var1 1 Var2 10
Document
6 pages
Python - Numbers: Var1 1 Var2 10
rash
No ratings yet
Python - Dictionary: Accessing Values in Dictionary
Document
5 pages
Python - Dictionary: Accessing Values in Dictionary
rash
No ratings yet
Python Exceptions Handling18
Document
11 pages
Python Exceptions Handling18
rash
No ratings yet
Python Decision Making7
Document
2 pages
Python Decision Making7
rash
No ratings yet
Python - Strings: Accessing Values in Strings
Document
10 pages
Python - Strings: Accessing Values in Strings
rash
No ratings yet
2 C Language Overview
Document
2 pages
2 C Language Overview
rash
No ratings yet
Python Date and Time14
Document
8 pages
Python Date and Time14
rash
No ratings yet
Case Study
Document
12 pages
Case Study
rash
No ratings yet
Protection N Security
Document
4 pages
Protection N Security
rash
No ratings yet
C - Basic Syntax C - Basic Syntax
Document
2 pages
C - Basic Syntax C - Basic Syntax
rash
No ratings yet
3 C Environment Setup
Document
2 pages
3 C Environment Setup
rash
No ratings yet
Little Women
From Everand
Little Women
Louisa May Alcott
Rating: 4 out of 5 stars
4/5 (105)