What is a Protocol? the communications between computers on a network

Written by Gianfranco Fracassi

Continued from page 1
Token Ring The Token Ring protocol was developed by IBM inrepparttar mid-1980s. The access method used involves token-passing. In Token Ring,repparttar 146210 computers are connected so thatrepparttar 146211 signal travels aroundrepparttar 146212 network from one computer to another in a logical ring. A single electronic token moves aroundrepparttar 146213 ring from one computer torepparttar 146214 next. If a computer does not have information to transmit, it simply passesrepparttar 146215 token on torepparttar 146216 next workstation. If a computer wishes to transmit and receives an empty token, it attaches data torepparttar 146217 token. The token then proceeds aroundrepparttar 146218 ring until it comes torepparttar 146219 computer for whichrepparttar 146220 data is meant. At this point,repparttar 146221 data is captured byrepparttar 146222 receiving computer. The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due torepparttar 146223 increasing popularity of Ethernet,repparttar 146224 use of Token Ring in school environments has decreased. FDDI Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. The access method used by FDDI involves token-passing. FDDI uses a dual ring physical topology. Transmission normally occurs on one ofrepparttar 146225 rings; however, if a break occurs,repparttar 146226 system keeps information moving by automatically using portions ofrepparttar 146227 second ring to create a new complete ring. A major advantage of FDDI is speed. It operates over fiber optic cable at 100 Mbps. ATM Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. ATM supports a variety of media such as video, CD-quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted pair cable. ATM is most often used to interconnect two or more local area networks. It is also frequently used by Internet Service Providers to utilize high-speed access torepparttar 146228 Internet for their clients. As ATM technology becomes more cost-effective, it will provide another solution for constructing faster local area networks. isJustFree

Real Family Freebies

free stuff fromrepparttar 146229 USA

Best Surveys for Cah Rewards

Real Free Ringtones and Logos

Win Free Prizes withrepparttar 146230 latest free contests

Gianfranco Fracassi is the webmaster of two popular free stuff web sites. You can find many subjects that will interest you. Check out these web sites at: http://www.isjustfree.com or http://www.freestuff4net.com isJustFree or this site at Freestuff4net

How To Survive An Operating System Crash

Written by Patty Gale

Continued from page 1

2. Back up your hard-drive as necessary for how often you have new updates that you cannot afford to lose or rebuild.

** Important! If you have to completely reinstall your operating system,repparttar "My Documents" folder is usually lost. Make sure you don't forget this folder when you dorepparttar 146131 back up.

3. Make sure all of your .exe, zip and software install files are on a disk. This is easily done by backing them up or burning them onto a CD. You should already haverepparttar 146132 system restoration and any other store-bought software disks handy.

The actual repair or reinstall of your operating system may simple or it may be complicated. If you are well versed in this area, you may be able to restorerepparttar 146133 system yourself. If you're like most of us, you may have to call a computer repair professional.

When your p.c. is restored, you will be able to simply reinstall your software and documents files fromrepparttar 146134 disks you created. If you have access to a secondary p.c., you can install your programs onrepparttar 146135 backup computer inrepparttar 146136 interim.

Regardless, you will rest much easier knowing that you have taken some basic steps necessary to prepare yourself and protect your business.

This very same scenario happened to me just recently. It could have been a disaster for my business, but it wasn't. I was prepared and was back up and running within 24 hours.

Don't wait until it's too late.

To Your Success!

Patty Gale

Patty Gale is a successful entrepreneur who specializes in personalization and customer care for all her clients. She exchanged her suits, hose and heels for working at home in her "jammies" and is on a mission to empower other women to do the same. She can be reached at http://www.Home-Office-Recovery-Plan.com

    <Back to Page 1
ImproveHomeLife.com © 2005
Terms of Use