Optical Fiber Distributed Data Interface (FDDI) is one of the highest transmission rates in the current mature LAN technology. This transmission rate up to 100MB/S network technology is based on the standard is ansix3t9.5. The network has the characteristics of timing token protocol, supports a variety of topologies, and transmits media as optical fiber. Using fiber as a transport medium has several advantages:
1, a longer transmission distance, the
I. The component of FDDI
Figure 1
As you can see from Figure 1, the components that make up FDDI should have at least the following parts:
1, fiber optic cable.
2, FDDI adapter.
3, FDDI adapter and fiber-connected connectors.
However, in order to make the network have strong adaptability, and can be as backbone o
(Fddi:fiber distributed Data Interface)
Optical Fiber Distributed Data Interface (FDDI) is a set of protocols that are developed by the United States National Standardization Organization (ANSI) to send digital signals on optical cables. FDDI uses a dual-loop token, with a transmission rate of up to 100Mbps. Because of its support for high-bandwidth and long-distance communication networks,
In FDDI reverse double loop or other structure, the data unit transmitted on the fiber is called the media access Control (MAC) frame.
As shown in Figure 11. PA SD FC DA SA I FCS ED FS
PA: Frame First sequence I: information
SD: Frame First delimiter FCS: Frame test sequence
FC: Frame Control (2 symbols) ED: Frame tail delimiter
DA: Endpoint address FS: Frame state
SA: Source Point Address
(a) Frame format
PA SD FC ED
(b) Token format
Frames
"WCF Technology Insider" translation 15:1th Part _ 3rd Chapter _ Message Exchange Mode, topology and choreography: Message topology, message orchestration and summary of this chapter
Message topology
The message topology describes how messages are sent between one or more senders and recipients. A message
http://storm.apache.org/releases/1.0.1/Lifecycle-of-a-topology.htmlthe life cycle of a storm topologythe content of this page is based on the 0.7.1 code, and then a lot of changes. explains in detail the life cycle of a topology: from the commit topology to the supervisor start-stop workersalso explains how Nimbus monitors how topologies and topologies are shut down when they are killed.The first is two ins
What are the features of each topology in the computer network topology? Answer: network Topology 1. A star topology is composed of a central node and a site that is connected to a central node through a point to a communication link. The star topology has the following adva
From http://www.3snews.net/bbs/viewthread.php? Tid = 3006 and http://blog.sina.com.cn/s/blog_4d0d397d0100aasm.html
Before applying data manually or automatically, check and correct various topology errors as required!Geographic Data is massive and massive. errors can occur if it is artificial or automatic vectoring. For data with a large amount of data, checking and correcting errors is a tedious and complex task with a heavy workload.
Based on the p
HT for Web list and drag-and-drop application of 3D topology components, ht Topology
Many visual editors have more or less drag functions, such as dragging a node from a List to a topology component for modeling, in addition, a thumbnail of the dragged node is attached to the mouse position during the drag and drop process, so we can achieve this drag effect toda
Implementation of a 3D topology tree based on HT for Web, ht Topology
In HT for Web, 2D and 3D Applications Support displaying tree-structured data with different display effects. The tree-structured 2D data has obvious hierarchical relationships. However, if the data volume is large, it looks less intuitive, and it is difficult to find a specified node, while the 3D tree structure is intuitive in combinati
1089. Topology sequencingDescription given a graph, if the graph is not ring, then it is sorted and output topology, otherwise output imposable. Input first behavior two integers n (1After M lines, each line of two integers A and b represents a forward edge from A to B. Output if there is a ring, outputs imposable, otherwise the output line with a space-separated topological sorting results, if there are mu
[Topology Sorting] Job Scheduling in the workshop and Topology workshop scheduling1. DFS(Deep Priority Search)
Depth-First-Search is a Search algorithm. It traverses Tree nodes in depth along the tree, and searches tree branches as deep as possible. When all the edges of node v have been explored, the search will trace back to the Start Node of the edge of node v. This process continues until all nodes that
Hdoj1285 Topology Sorting and hdoj1285 Topology Sorting
Question Link
Analysis:Obviously, Topology Sorting is the first step. It looks simple and contains hidden weapons. During the first step, their depth is marked by topological sorting. For example, the example {1 2; 2 3; 4 3} given in the question is {1 2; 2 3; 4 3 }. The depth of 1 is 1. The depth of 2 and 4
Topological sorting-Topological Sort;
To sort the topology of a directed acyclic graph (DAG) g, all vertices in G are arranged in a linear sequence so that any pair of vertices u and v in the graph, if
The above is the definition of the gray-Abstract topological sorting;
In fact, topological sorting is simply about some events, some of which must be before others, such as wearing so and shoes;
The general question may give some events and some order
Display hierarchical and organizational relationships with a topology diagram (4). A Topology diagram shows hierarchical organizations.
Recently, ice and ice are very popular. There are all kinds of emotions in "growth of everything", and you dare to compete in "running male". In order to relieve the pressure on all the lions, we have specially created an organizational structure for the appearance burst ta
A manual or automatic vectorization of data, before the formal application of data, should be required to check and correct the various topological errors!Based on the experience of the past few years, we summarize several methods and discuss with you, and welcome everyone to participate in the discussion and correction.1. Under the workstation Workstation, edit the inspection data, this method requires that the source data is a coverage, and is in the dark interface to operate, although you can
, so that no city can return to itself through a certain path.
Now the King wants to rename the city and set the new number of the city I to a [I]. The new numbers of all cities are different, and the numbers are [1, an integer between N. The King thinks that a numbering scheme is beautiful. If I can reach J only for any two cities, a [I] should be
There are many beautiful numbering schemes. The King wants to make the number of city 1 as small as possible. On this premise, the number of city 2
switches can be divided into Ethernet switches, licensing ring switches, FDDI switches, ATM switches, and fast Ethernet switches. Due to the simplicity and ease of use of Ethernet, most of the currently used Ethernet switches and Fast Ethernet switches as their own network switching devices. The link layer topology discovery in this article is targeted at two-layer Ethernet devices. The Research on
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.