Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Exploring a modern NIC: An introduction to programming the Intel 82573L gigabit ethernet network interface controller is Token Ring, Ethernet, Ethernet LAN, Ethernet Versus Token Ring, Hardware Features, External Architecture. | Exploring a modern NIC An introduction to programming the Intel 82573L gigabit ethernet network interface controller Token Ring host-1 host-2 host-3 Token Ring Media Access Unit Technology developed by IBM in the 1960s host-4 Ethernet Technology designed by Bob Metcalf in 1973 Ethernet LAN host-1 host-2 host-3 HUB “Collision Domain” CSMA/CD = “Carrier Sense Multiple Access/Collision Detection” host-4 Ethernet Versus Token Ring ETHERNET Ethernet is the most widely used data sending protocol. Each computer listens to the cable before sending data over the network. If the network is clear, the computer will transmit. If another PC is already transmitting data, the computer will wait and try again when the line is clear. If two computers transmit at the same time a collision occurs. Each computer then waits a random amount of time before attempting to retransmit. The delay caused by collisions and retransmitting is minimal and does not normally affect the speed of transmission on the network. TOKEN RING The Token Ring protocol was developed by IBM but it has become obsolete in the face of ethernet technology. The computers are connected so that data travels around the network from one computer to another in a logical ring. If a computer does not have information to transmit, it simply passes the a token on to the next workstation. If a computer wishes to transmit and receives an empty token, it attaches data to the token. The token then proceeds around the ring until it comes to the computer for which the data is meant. Posted by Heather C Moll (Last Updated March 24 .