Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Network Interface Cards PPT
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Network Interface Cards


[attachment=35424]

History of NIC

In 1973 Robert Metcalfe needed something that was fast, could connect hundreds of computers, and span a whole building. To solve this problem, Metcalfe developed a rudimentary form of LAN and dubbed it Ethernet. The original Ethernet sent roughly a paragraph of data over thick coaxial cable and could handle a distance of one kilometer. A
In 1975 Xerox filed a patent listing Metcalf, David Boggs, Chuck Thacker and Butler Lampson as inventors. In 1976 Metcalf wrote a seminal paper that stated the transfer rate was 3 Mbits/second. Metcalf left Xerox in 79 to start the company 3com.

How the NIC transfers data

The app you are using generates the data you would like to send to another computer.
Your NIC accepts the data from your motherboard and transfers it to a small buffer on the card.
The NIC adds its address (set by the manufacturer) plus the destination address and the type of data to the buffer.
Your NIC calculates the checksum, or CRC, for the data in the buffer.
The information is arranged into a frame.
The NIC “listens” to the network for other transmissions. If a transmission is heard, it will wait until the transmission is complete.
The NIC begins to serially transmit the frame over the network.
The receiving NIC calculates the checksum for the received frame, then compares it to the checksum it received.
If there are no errors, the receiving station acknowledges the received data.

Translated into 5 steps

The network application retrieves the data being sent.
The NIC puts the address of the other computer onto the data.
The NIC calculates for errors.
The data is arranged into a packet and sent over the network.
The receiving card checks for errors, if there are none, it acknowledges the data.

Token Ring Process

Phase 0 (Lobe Check) —The station checks to ensure it can receive these frames without error.
Phase 1 (Physical Insertion) — A station then sends a 5 volt signal to the MSAU to open the relay.
Phase 2 (Address Verification) — A station then transmits MAC frames with its own MAC address in the destination address field of a token ring frame. When the frame returns and if the address copied , the station must participate in the periodic (every 7 seconds) ring poll process. This is where stations identify themselves on the network as part of the MAC management functions.
Phase 3 (Participation in ring poll) — A station learns the address of its Nearest Active Upstream Neighbor (NAUN) and makes its address known to its nearest downstream neighbor, leading to the creation of the ring map. Station waits until it receives an AMP or SMP frame with the ARI and FCI bits set to 0. When it does, the station flips both bits (ARI and FCI) to 1, if enough resources are available, and queues an SMP frame for transmission. If no such frames are received within 18 seconds, then the station reports a failure to open and de-inserts from the ring. If the station successfully participates in a ring poll, it proceeds into the final phase of insertion, request initialization.
Phase 4 (Request Initialization) — Finally a station sends out a special request to a parameter server to obtain configuration information. This frame is sent to a special functional address, typically a token ring bridge, which may hold timer and ring number information with which to tell the new station abort

How the procedure works.

Main procedure, it states and asks
Asks: is the frame ready for transmission.
Is medium idle? If not, wait until it becomes ready and wait the interframe period
Starts transmitting.
Asks: did a collision occur? If so, it goes to collision detected procedure.
Resets retransmission counters and end frame transmission.
If a collision is detected it:
Continues the transmission until minimum packet time is reached to ensure that all receivers detect the collision.
Counts how many times it retransmitted
Asks: was the maximum number of transmission attempts reached? If so, abort transmission.
Calculates and wait random back off period based on number of collision
Re-enters main procedure at stage 1.
A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter, or physical network interface and similar terms) is a hardware component that connects a computer to a computer network.

The first network interface drivers were commonly implemented on expansion cards that were plugged into a computer bus. The low cost and ubiquity of the Ethernet standard means that most newer computers have a built-in network interface on the motherboard.

Modern network interface controllers offer advanced functions such as interrupt and DMA interfaces for host processors, support for multiple queues of reception and transmission, partitioning into multiple logical interfaces and processing of network traffic in controller, such as the download TCP.

The network controller implements the electronic circuitry required to communicate using a specific physical layer and a data link layer standard, such as Ethernet, Fiber Channel or Wi-Fi (in the past: Token Ring, FDDI, ATM, ARCNET). This provides a basis for a complete network protocol stack, allowing communication between small groups of computers on the same local area network (LAN) and large-scale network communications over routable protocols such as Internet Protocol ).

The NIC allows computers to communicate over a computer network, either using cables or wirelessly. The NIC is both a physical layer and a data link layer device because it provides physical access to a network medium and, for IEEE 802 and similar networks, provides a low level addressing system by using MAC addresses assigned exclusively to the network interfaces.

Although other network technologies exist, Ethernet (IEEE 802.3) and Wi-Fi (IEEE 802.11) have achieved near-ubiquity as LAN technologies since the mid-1990s.