Token ring

Results: 40



#Item
21IEEE 802 / Local area networks / Network topology / IEEE standards / Media Access Control / Ring network / Token bus network / Token ring / MAC address / Network architecture / OSI protocols / Computing

ROBUST TOKEN MANAGEMENT FOR UNRELIABLE NETWORKS Eric E. Johnson*, Zibin Tang*, Manikanden Balakrishnan*, Juan Rubio*, Huiyan Zhang, and Srugun Sreepuram New Mexico State University Las Cruces, NM ABSTRACT* Token passing

Add to Reading List

Source URL: tracebase.nmsu.edu

Language: English - Date: 2003-07-17 19:51:31
22Ethernet / IEEE standards / IEEE 802 / Local area networks / Network topology / Network switch / Token ring / Cut-through switching / Ethernet frame / Network architecture / Computing / OSI protocols

1003fmf.book Page 116 Friday, June 11, 2004 8:44 AM What You Will Learn On completing this chapter, you will be able to: ✔

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2004-11-03 12:32:26
23Computing / Local area network / ARCNET / 10BASE2 / Network segment / Networking cables / 5-4-3 rule / IEEE 802.3 / Token ring / Ethernet / OSI protocols / Network architecture

6 Network Planning And Design ○

Add to Reading List

Source URL: cdn.preterhuman.net

Language: English - Date: 2001-01-07 18:48:02
24Industrial automation / Automation / CAN bus / Network protocols / Cyclic redundancy check / Endianness / Transmission Control Protocol / ISO 15765-2 / Token ring / Technology / Computing / OSI protocols

YASP Yet Another Scalable Protocol (c[removed]by Jos´e Francisco Castro∗ June 14, 2003 Abstract

Add to Reading List

Source URL: yaspnet.sourceforge.net

Language: English - Date: 2003-06-15 22:23:27
25OSI protocols / Ethernet cables / IEEE standards / Network topology / Signal cables / Token ring / Ethernet / Twisted pair / Media Access Unit / Networking hardware / Computing / Network architecture

FRee 24-hour Tech support: [removed]blackbox.com © 2010. All rights reserved. Black Box Corporation. 2-Port Hub

Add to Reading List

Source URL: www.blackbox.com

Language: English - Date: 2010-06-07 12:56:05
26Computer architecture / IBM Systems Network Architecture / OSI protocols / Synchronous Data Link Control / Cisco IOS / X.25 / Network protocols / Computing / Network architecture

sna enable-host (Token Ring, Ethernet, Frame Relay, FDDI) sna enable-host (Token Ring, Ethernet, Frame Relay, FDDI) To enable Systems Network Architecture (SNA) on the interface, use the sna enable-host command in inter

Add to Reading List

Source URL: www.cisco.com

Language: English
27Network topology / Ethernet / Local area networks / IEEE standards / Network protocols / Router / Network switch / Token ring / Bridging / Network architecture / Computing / Computer architecture

Configuring Source-Route Bridging This chapter describes source-route bridging (SRB) configuration tasks. For a discussion of remote source-route bridging (RSRB) configuration tasks, refer to the “Configuring Remote So

Add to Reading List

Source URL: www.cisco.com

Language: English
28Gondor / Token coin / Counter / Stronghold / Games / War of the Ring / Collectible card games

Frequently Asked Questions, Clarifications, and Errata Last updated July 27, 2006 Combat Effects Twilight of the Third Age

Add to Reading List

Source URL: www.fantasyflightgames.com

Language: English - Date: 2012-08-28 21:33:33
29OSI protocols / Network topology / IEEE standards / Computer networking / Local area networks / Fiber Distributed Data Interface / Token ring / Ring network / Cable modem / Ethernet / Computing / Network architecture

Informatics Current issue : January 1999 LAN TECHNOLOGIES Media Access Control methods

Add to Reading List

Source URL: informatics.nic.in

Language: English - Date: 2012-08-30 07:08:25
30Security / Disk encryption / Trusted Platform Module / Trusted Execution Technology / Next-Generation Secure Computing Base / Ring / Security token / Physical Unclonable Function / Trusted computing base / Computer security / Trusted computing / Cryptography

INVITED PAPER Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. By N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas,

Add to Reading List

Source URL: rebootingcomputing.ieee.org

Language: English - Date: 2014-08-25 09:54:55
UPDATE