Help


[permalink] [id link]
+
Page "LocalTalk" ¶ 0
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

LocalTalk and system
These included updates to EtherTalk and TokenTalk, AppleTalk software and LocalTalk hardware for the IBM PC, EtherTalk for Apple's A / UX operating system allowing it to use LaserPrinters and other network resources, and the Mac X. 25 and MacX products.
Stanford University pioneered development of a system, MacIP, that allowed IP packets to be routed over LocalTalk networks with the support of a suitable " gateway " machine.
LocalTalk is a particular implementation of the physical layer of the AppleTalk networking system from Apple Computer.
Apple often makes use of new or unusual hardware systems ; they were the first vendor to make widespread use of Sony's 3. 5 " floppy drive, and they devised their own Apple Desktop Bus system for keyboards and mice, their own LocalTalk networking system, the high-speed FireWire serial interface for storage and video transfer, the 30-pin iPod dock connector, and non-standard display interfaces such as ADC, Mini-DVI, and Mini DisplayPort.
Early installations used mainly LocalTalk and more recently Ethernet but any physical medium could be used which could be directly or indirectly connected to an AppleShare server system.

LocalTalk and shielded
Instead of using expensive shielded twisted pair wiring as in Apple's LocalTalk implementation, PhoneNet uses standard four-conductor telephone patch cords and modular connectors.

LocalTalk and cabling
Several other similar systems also existed with even higher performance, but these often required special cabling that was incompatible with LocalTalk / PhoneNet, and also required patches to the networking stack that often caused problems.
One common replacement for LocalTalk was PhoneNet, a 3rd party solution ( from a company called Farallon, now called Netopia ) that also used the RS-422 port and was indistinguishable from LocalTalk as far as Apple's LocalTalk port drivers were concerned, but ran over the two unused wires in standard four-wire phone cabling.
The IIGS also supported booting from an AppleShare server, via the AppleTalk protocol, over LocalTalk cabling.

LocalTalk and plugged
A similar solution was the 850 kbit / s DaynaTalk, a separate box which plugged in between the computer and a normal LocalTalk / PhoneNet box, and also offered as a PC expansion card that ran up to 1. 7 Mbit / s.
The LaserWriter was also the first peripheral to use the LocalTalk connector and Apple ’ s unified round AppleTalk Connector Family, which allowed any variety of mechanical networking systems to be plugged into the ports on the computers or printers.

LocalTalk and at
The initial default hardware implementation for AppleTalk was a high-speed serial protocol known as LocalTalk that used the Macintosh's built-in RS-422 ports at 230. 4 kbit / s.

LocalTalk and rate
When the SCC's internal PLL was used to lock to the clock embedded in the LocalTalk serial data stream ( using its FM0 encoding method ) a divide-by-16 setting on the PLL yielded the fastest rate available, namely 230. 4 kbit / s.

LocalTalk and 230
At 230. 4 kbit / s LocalTalk was slower than the Centronics PC parallel interface, but allowed several computers to share a single LaserWriter.
Like LocalTalk, the theoretical maximum speed for data transfer was 230 kbit / s, and it is generally used in a daisy chain topology.

LocalTalk and .
With its release, AppleTalk Personal Network was renamed LocalTalk.
As with LocalTalk, a number of 3rd party adaptors quickly appeared.
Each node dynamically chose its own node number, according to a protocol ( originally the LocalTalk Link Access Protocol LLAP and later the AppleTalk Address Resolution Protocol, AARP ) which handled contention between different nodes accidentally choosing the same number.
LocalTalk used a splitter box in the RS-422 port to provide an upstream and downstream cable from a single port.
The topology was a bus: cables were daisy-chained from each connected machine to the next, up to the maximum of 32 permitted on any LocalTalk segment.
* Apple's LocalTalk implemented CSMA / CA on an electrical bus using a three-byte jamming signal.
Marathon network games can be played over AppleTalk Remote, LocalTalk, TokenTalk, Ethernet, and more recently, a LAN network or the Internet.
LANs were complex and expensive, so Apple developed its own networking scheme, LocalTalk.
Based on the AppleTalk protocol stack, LocalTalk connected the LaserWriter to the Mac over an RS-422 serial port.

LocalTalk and /
| AppleTalk / LocalTalk

specifies and system
This system specifies the latitude and longitude of any location in terms of angles subtended at the centre of the Earth, using the equator and ( usually ) the Greenwich meridian as references.
A Cartesian coordinate system specifies each point uniquely in a plane by a pair of numerical coordinates, which are the signed distances from the point to two fixed perpendicular directed lines, measured in the same unit of length.
If we view the DFT as just a coordinate transformation which simply specifies the components of a vector in a new coordinate system, then the above is just the statement that the dot product of two vectors is preserved under a unitary DFT transformation.
The complexity of such a system is specified by its order N. N is often a constraint on the design of a transfer function since it specifies the number of reactive components in an analog circuit ; in a digital IIR filter the number of computations required is proportional to N.
A number representation ( called a numeral system in mathematics ) specifies some way of storing a number that may be encoded as a string of digits.
The first byte specifies the area of the system affected.
* See also International Color Consortium, which specifies its color management system.
UMTS specifies a complete network system which uses, covering the radio access network ( UMTS Terrestrial Radio Access Network, or UTRAN ), the core network ( Mobile Application Part, or MAP ) and the authentication of users via SIM cards ( Subscriber Identity Module ).
The Single UNIX Specification specifies vi, so every conforming system must have it.
The noise factor specifies the increase in noise power ( referred to the input of an amplifier ) due to a component or system when its input noise temperature is.
Priority level or priority, in the Telecommunications Service Priority system, is the level that may be assigned to an NS / EP telecommunications service, which level specifies the order in which provisioning or restoration of the service is to occur relative to other NS / EP or non-NS / EP telecommunication services.
Although the title supply chain is included, this Standard specifies the requirements for a security management system, including those aspects critical to security assurance for any organisation or enterprise wishing to management the security of the organisation and its activities.
The Red Book specifies the physical parameters and properties of the CD, the optical " stylus " parameters, deviations and error rate, modulation system ( eight-to-fourteen modulation, EFM ) and error correction facility ( cross-interleaved Reed – Solomon coding, CIRC ), and the eight subcode channels.
Similar to the terrestrial longitude and latitude, the equatorial system of right ascension and declination specifies positions relative to the celestial equator and celestial poles.
The ecliptic system of celestial longitude and celestial latitude specifies positions relative to the ecliptic.
* how an application should make system calls to the operating system and, if the ABI specifies direct system calls rather than procedure calls to system call stubs, the system call numbers
An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
Most of the positions are named roughly according to a system of polar coordinates-one word ( leg, cover, mid-wicket ) specifies the angle from the batsman, and is optionally preceded by an adjective describing the distance from the batsman ( silly, short, deep or long ).
In 2007, the BSI published BS 25999-2 " Specification for Business Continuity Management ", which specifies requirements for implementing, operating and improving a documented business continuity management system ( BCMS ).
The design of the microprocessor architecture on practically all modern systems ( except some embedded systems ) involves a security model ( such as the rings model ) which specifies multiple privilege levels under which software may be executed ; for instance, a program is usually limited to its own address space so that it cannot access or modify other running programs or the operating system itself, and a program is usually prevented from directly manipulating hardware devices ( e. g. the frame buffer or network devices ).

0.125 seconds.