SlideShare ist ein Scribd-Unternehmen logo
1 von 21
RJ45         LC           BNC

            Wired     Fiber optic   Coaxial
Dongles     netcard
In 1973 Robert Metcalfe needed something that was fast, could
connect hundreds of computers, and span a whole building. To
solve this problem, Metcalfe developed a rudimentary form of
LAN and dubbed it Ethernet. The original Ethernet sent
roughly a paragraph of data over thick coaxial cable and could
handle a distance of one kilometer.
In 1975 Xerox filed a patent listing Metcalf, David Boggs,
Chuck Thacker and Butler Lampson as inventors. In 1976
Metcalf wrote a seminal paper that stated the transfer rate was 3
Mbits/second. Metcalf left Xerox in 79 to start the company
3com.
In 1981, 3COM built the first 10 Mbits/sec Ethernet adapter.


In mid 1980s, Tim Rock, Richard Bennett, Pat Thaler, and
others develop StarLAN, the basis for 1BASE5 ethernet



                         In late 1980s the twisted pair
                         design started to replace the
                         coaxial cables.
How the NIC transfers data
•   The app you are using generates the data you
    would like to send to another computer.
•   Your NIC accepts the data from your
    motherboard and transfers it to a small buffer on
    the card.
•   The NIC adds its address (set by the
    manufacturer) plus the destination address and
    the type of data to the buffer.
•   Your NIC calculates the checksum, or CRC, for
    the data in the buffer.
How the NIC transfers data
• The information is arranged into a frame.
• The NIC “listens” to the network for other transmissions.
  If a transmission is heard, it will wait until the
  transmission is complete.
• The NIC begins to serially transmit the frame over the
  network.
• The receiving NIC calculates the checksum for the
  received frame, then compares it to the checksum it
  received.
• If there are no errors, the receiving station acknowledges
  the received data.
Translated into 5 steps
• The network application retrieves the data being
  sent.
• The NIC puts the address of the other computer
  onto the data.
• The NIC calculates for errors.
• The data is arranged into a packet and sent over
  the network.
• The receiving card checks for errors, if there are
  none, it acknowledges the data.
The Network interface cards use differing amounts of
voltage to transport the 1s and 0s of binary across the
cable.
For fiber optic cable, different wavelengths of light are
passed along.
Application
               This layer supports application and end-user processes.
 (Layer 7)

Presentation
                This layer translates the data so it can be sent along the network. It is
  (Layer 6)
                sometimes called the syntax layer.
  Session       This layer establishes, manages and terminates connections between applications.
  (Layer 5)     The session layer sets up, coordinates, and terminates connections at each end. It
                deals with session and connection coordination.

 Transport     This layer provides transparent transfer of data between end systems, or hosts, and
  (Layer 4)    is responsible for end-to-end error recovery and flow control. It ensures complete
               data transfer.
               This layer provides routing technologies, creating paths, known as virtual circuits,
  Network      for transmitting data from computer to computer. Routing and forwarding are
  (Layer 3)    functions of this layer, as well as addressing, internetworking, error handling,
               congestion control and packet sequencing.
               At this layer, data packets are encoded and decoded into bits. The data link layer is
 Data Link     divided into two sub layers: The Media Access Control (MAC) layer and the
               Logical Link Control (LLC) layer. The MAC layer controls how a computer on the
 (Layer 2)
               network gains access to the data and permission to transmit it. The LLC layer
               controls frame synchronization, flow control and error checking.

  Physical     This layer conveys the bit stream - electrical impulse, light or radio signal -- through the
               network at the electrical and mechanical level. It provides the hardware means of sending and
  (Layer 1)
               receiving data on a carrier, including defining cables, cards and physical aspects. Fast
               Ethernet, RS232, and ATM are protocols with physical layer components.
Token Ring Process
•   Phase 0 (Lobe Check) —The station checks to ensure it can receive these frames without
    error.
•   Phase 1 (Physical Insertion) — A station then sends a 5 volt signal to the MSAU to open
    the relay.
•   Phase 2 (Address Verification) — A station then transmits MAC frames with its own
    MAC address in the destination address field of a token ring frame. When the frame
    returns and if the address copied , the station must participate in the periodic (every 7
    seconds) ring poll process. This is where stations identify themselves on the network as
    part of the MAC management functions.
•   Phase 3 (Participation in ring poll) — A station learns the address of its Nearest Active
    Upstream Neighbor (NAUN) and makes its address known to its nearest downstream
    neighbor, leading to the creation of the ring map. Station waits until it receives an AMP
    or SMP frame with the ARI and FCI bits set to 0. When it does, the station flips both bits
    (ARI and FCI) to 1, if enough resources are available, and queues an SMP frame for
    transmission. If no such frames are received within 18 seconds, then the station reports a
    failure to open and de-inserts from the ring. If the station successfully participates in a
    ring poll, it proceeds into the final phase of insertion, request initialization.
•   Phase 4 (Request Initialization) — Finally a station sends out a special request to a
    parameter server to obtain configuration information. This frame is sent to a special
    functional address, typically a token ring bridge, which may hold timer and ring number
    information with which to tell the new station abort
How the procedure works.
    Simpler than a token ring, the procedure for coaxial
    is as following:
•   Main procedure, it states and asks
•   Asks: is the frame ready for transmission.
•   Is medium idle? If not, wait until it becomes ready and wait the interframe
    period
•   Starts transmitting.
•   Asks: did a collision occur? If so, it goes to collision detected procedure.
•   Resets retransmission counters and end frame transmission.
•   If a collision is detected it:
•   Continues the transmission until minimum packet time is reached to ensure
    that all receivers detect the collision.
•   Counts how many times it retransmitted
•   Asks: was the maximum number of transmission attempts reached? If so, abort
    transmission.
•   Calculates and wait random back off period based on number of collision
•   Re-enters main procedure at stage 1.
How long the card waits
           between retransmission
 The card counts how many collisions occurred.
  Then, back-off algorithms determine when the
  colliding stations retransmit.

       2^n -1                    Action                          N = number of
       2^0 - 1                   Transmits immediately
                                                                 collisions
                                 Waits 0, 1, 2, or three slots
       2^2 - 1
       2^3 - 1                   Waits 0 to 7 slots

The card can wait up to 16 collisions, anything higher and it quits.
Slot Time: Twice the time it takes for an electronic pulse to travel the
length of the maximum theoretical distance between two nodes.
The Frames




A runt frame is a packet smaller than the 64
bytes. This usually occurs because of a collision
or an error.
Differences in the cards
• The major difference between the cards are the
  way the data is converted to transmit over the
  network. Each type of network has its own type of
  transceiver (transmitter + receiver). 10baseT
  networks have a specialized transceiver that
  translates the data into 10baseT Ethernet
  standards, then transmits it. It also receives
  information from the network and translates it
  back into a form the NIC card can use.
Differences in the cards (continued)

• 10base2 Ethernet networks have almost the
  same NIC except for the transceiver. Some
  NICs have two transceivers, normally
  10baseT and 10base2. These dual type
  cards are known as combo NICs.
Major Manufacturers
•   ZTE
•   Cisco Systems
•   Hewlett-Packard
•   3Com
•   Linksys
•   Belkin
•   Dlink
Fiber Distributed Data Interface

Can support thousands of users
Uses duel token ring setup
Due to their speed, cost and ubiquity, fast Ethernet and (since
1998) Gigabit Ethernet have largely made FDDI redundant.

Needs two Token ring supportable cards or two jacks on the
card.
Price
• The cards can range in price from $10 to
  $800. Most cards are actually around $20.
References
  • Webopedia.com
  • Howstuffworks.com
  • http://everything2.com/title/How+Network
    +Adapters+Work
  • Wikipedia.com
  • Bestbuy.com

http://www.eflnet.com/networking/acrolist.php?firstletter=F

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Ports
Computer PortsComputer Ports
Computer PortsNetwax Lab
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)howare
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansLiving Online
 
Bridges and gateways 52
Bridges and gateways 52Bridges and gateways 52
Bridges and gateways 52myrajendra
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)Siddique Ibrahim
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKMarvin Bronoso
 
Physical Layer Port
Physical Layer PortPhysical Layer Port
Physical Layer PortNetwax Lab
 
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSCSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSMarvin Bronoso
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Serious_SamSoul
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf Vignesh kumar
 

Was ist angesagt? (20)

Computer Ports
Computer PortsComputer Ports
Computer Ports
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
NETWORK INTERFACE CARD
NETWORK INTERFACE CARDNETWORK INTERFACE CARD
NETWORK INTERFACE CARD
 
Nic -cst
Nic -cstNic -cst
Nic -cst
 
Ethernet
EthernetEthernet
Ethernet
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
Network devices
Network devicesNetwork devices
Network devices
 
Bridges and gateways 52
Bridges and gateways 52Bridges and gateways 52
Bridges and gateways 52
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
CSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORKCSS L12 STRUCTURE OF COMPUTER NETWORK
CSS L12 STRUCTURE OF COMPUTER NETWORK
 
Computer ports
Computer portsComputer ports
Computer ports
 
Physical Layer Port
Physical Layer PortPhysical Layer Port
Physical Layer Port
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 
Memory Unit
Memory UnitMemory Unit
Memory Unit
 
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKSCSS L11 - INTRODUCTION TO COMPUTER NETWORKS
CSS L11 - INTRODUCTION TO COMPUTER NETWORKS
 
Basics of Computer Networks
Basics of Computer NetworksBasics of Computer Networks
Basics of Computer Networks
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
 

Ähnlich wie A427 nic card

Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switchesBhavik Vashi
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxPondinesh2
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits typesgjeyasriitaamecnew
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2Programmer
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtapVikas Jagtap
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routingMd. Mashiur Rahman
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notesIndrajaMeghavathula
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
CN-Module-I (1).pptx
CN-Module-I (1).pptxCN-Module-I (1).pptx
CN-Module-I (1).pptxAllen138499
 

Ähnlich wie A427 nic card (20)

Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
lecture 2.pptx
lecture 2.pptxlecture 2.pptx
lecture 2.pptx
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Unit 2 ppt 3.ppt
Unit 2 ppt 3.pptUnit 2 ppt 3.ppt
Unit 2 ppt 3.ppt
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 
Frame relay
Frame relayFrame relay
Frame relay
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Data link layer
Data link layerData link layer
Data link layer
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtap
 
Ppt on networking
Ppt on networkingPpt on networking
Ppt on networking
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notes
 
WirelessB06.ppt
WirelessB06.pptWirelessB06.ppt
WirelessB06.ppt
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
CN-Module-I (1).pptx
CN-Module-I (1).pptxCN-Module-I (1).pptx
CN-Module-I (1).pptx
 

Kürzlich hochgeladen

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

A427 nic card

  • 1.
  • 2. RJ45 LC BNC Wired Fiber optic Coaxial Dongles netcard
  • 3. In 1973 Robert Metcalfe needed something that was fast, could connect hundreds of computers, and span a whole building. To solve this problem, Metcalfe developed a rudimentary form of LAN and dubbed it Ethernet. The original Ethernet sent roughly a paragraph of data over thick coaxial cable and could handle a distance of one kilometer.
  • 4. In 1975 Xerox filed a patent listing Metcalf, David Boggs, Chuck Thacker and Butler Lampson as inventors. In 1976 Metcalf wrote a seminal paper that stated the transfer rate was 3 Mbits/second. Metcalf left Xerox in 79 to start the company 3com.
  • 5. In 1981, 3COM built the first 10 Mbits/sec Ethernet adapter. In mid 1980s, Tim Rock, Richard Bennett, Pat Thaler, and others develop StarLAN, the basis for 1BASE5 ethernet In late 1980s the twisted pair design started to replace the coaxial cables.
  • 6. How the NIC transfers data • The app you are using generates the data you would like to send to another computer. • Your NIC accepts the data from your motherboard and transfers it to a small buffer on the card. • The NIC adds its address (set by the manufacturer) plus the destination address and the type of data to the buffer. • Your NIC calculates the checksum, or CRC, for the data in the buffer.
  • 7. How the NIC transfers data • The information is arranged into a frame. • The NIC “listens” to the network for other transmissions. If a transmission is heard, it will wait until the transmission is complete. • The NIC begins to serially transmit the frame over the network. • The receiving NIC calculates the checksum for the received frame, then compares it to the checksum it received. • If there are no errors, the receiving station acknowledges the received data.
  • 8. Translated into 5 steps • The network application retrieves the data being sent. • The NIC puts the address of the other computer onto the data. • The NIC calculates for errors. • The data is arranged into a packet and sent over the network. • The receiving card checks for errors, if there are none, it acknowledges the data.
  • 9. The Network interface cards use differing amounts of voltage to transport the 1s and 0s of binary across the cable. For fiber optic cable, different wavelengths of light are passed along.
  • 10. Application This layer supports application and end-user processes. (Layer 7) Presentation This layer translates the data so it can be sent along the network. It is (Layer 6) sometimes called the syntax layer. Session This layer establishes, manages and terminates connections between applications. (Layer 5) The session layer sets up, coordinates, and terminates connections at each end. It deals with session and connection coordination. Transport This layer provides transparent transfer of data between end systems, or hosts, and (Layer 4) is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. This layer provides routing technologies, creating paths, known as virtual circuits, Network for transmitting data from computer to computer. Routing and forwarding are (Layer 3) functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. At this layer, data packets are encoded and decoded into bits. The data link layer is Data Link divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC layer controls how a computer on the (Layer 2) network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. Physical This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and (Layer 1) receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.
  • 11.
  • 12. Token Ring Process • Phase 0 (Lobe Check) —The station checks to ensure it can receive these frames without error. • Phase 1 (Physical Insertion) — A station then sends a 5 volt signal to the MSAU to open the relay. • Phase 2 (Address Verification) — A station then transmits MAC frames with its own MAC address in the destination address field of a token ring frame. When the frame returns and if the address copied , the station must participate in the periodic (every 7 seconds) ring poll process. This is where stations identify themselves on the network as part of the MAC management functions. • Phase 3 (Participation in ring poll) — A station learns the address of its Nearest Active Upstream Neighbor (NAUN) and makes its address known to its nearest downstream neighbor, leading to the creation of the ring map. Station waits until it receives an AMP or SMP frame with the ARI and FCI bits set to 0. When it does, the station flips both bits (ARI and FCI) to 1, if enough resources are available, and queues an SMP frame for transmission. If no such frames are received within 18 seconds, then the station reports a failure to open and de-inserts from the ring. If the station successfully participates in a ring poll, it proceeds into the final phase of insertion, request initialization. • Phase 4 (Request Initialization) — Finally a station sends out a special request to a parameter server to obtain configuration information. This frame is sent to a special functional address, typically a token ring bridge, which may hold timer and ring number information with which to tell the new station abort
  • 13. How the procedure works. Simpler than a token ring, the procedure for coaxial is as following: • Main procedure, it states and asks • Asks: is the frame ready for transmission. • Is medium idle? If not, wait until it becomes ready and wait the interframe period • Starts transmitting. • Asks: did a collision occur? If so, it goes to collision detected procedure. • Resets retransmission counters and end frame transmission. • If a collision is detected it: • Continues the transmission until minimum packet time is reached to ensure that all receivers detect the collision. • Counts how many times it retransmitted • Asks: was the maximum number of transmission attempts reached? If so, abort transmission. • Calculates and wait random back off period based on number of collision • Re-enters main procedure at stage 1.
  • 14. How long the card waits between retransmission The card counts how many collisions occurred. Then, back-off algorithms determine when the colliding stations retransmit. 2^n -1 Action N = number of 2^0 - 1 Transmits immediately collisions Waits 0, 1, 2, or three slots 2^2 - 1 2^3 - 1 Waits 0 to 7 slots The card can wait up to 16 collisions, anything higher and it quits. Slot Time: Twice the time it takes for an electronic pulse to travel the length of the maximum theoretical distance between two nodes.
  • 15. The Frames A runt frame is a packet smaller than the 64 bytes. This usually occurs because of a collision or an error.
  • 16. Differences in the cards • The major difference between the cards are the way the data is converted to transmit over the network. Each type of network has its own type of transceiver (transmitter + receiver). 10baseT networks have a specialized transceiver that translates the data into 10baseT Ethernet standards, then transmits it. It also receives information from the network and translates it back into a form the NIC card can use.
  • 17. Differences in the cards (continued) • 10base2 Ethernet networks have almost the same NIC except for the transceiver. Some NICs have two transceivers, normally 10baseT and 10base2. These dual type cards are known as combo NICs.
  • 18. Major Manufacturers • ZTE • Cisco Systems • Hewlett-Packard • 3Com • Linksys • Belkin • Dlink
  • 19. Fiber Distributed Data Interface Can support thousands of users Uses duel token ring setup Due to their speed, cost and ubiquity, fast Ethernet and (since 1998) Gigabit Ethernet have largely made FDDI redundant. Needs two Token ring supportable cards or two jacks on the card.
  • 20. Price • The cards can range in price from $10 to $800. Most cards are actually around $20.
  • 21. References • Webopedia.com • Howstuffworks.com • http://everything2.com/title/How+Network +Adapters+Work • Wikipedia.com • Bestbuy.com http://www.eflnet.com/networking/acrolist.php?firstletter=F