SlideShare a Scribd company logo
The Basics 
By:- 
TUBA FALAK
 The NIC is a Hardware device that installs in a 
pc. 
 It provide an interface from pc to the 
Transmission media. 
 Most pc networks for EX- Ethernet, Token Ring 
& ARCNet use NIC. 
 A NIC links a Computer with the Network 
cabling system. 
 The NIC fits into one of the PC’s Expansion 
Slots.
 The card has one or more user accessible ports 
to which the network cabling medium is 
connected. 
 The NIC’s are responsible for Translating data 
from a device on the network & converting this 
data into some form of signals that can be 
Transmitted across the Transmission media. 
 All Network Interface Cards perform the 
function of Preparing & sending data.
 This data ,when it is inside the Computer 
,Travels in parallel from on the Bus. 
 This data can moves at 8,16 or 32 bits at a 
time. 
 The NIC must convert these signals into a Serial 
signals that can travels across the transmission 
medium. 
 When data is received , this serial form of data 
must be converted into parallel form for 
matching the bus type of the Computer. 

 The mechanism of this data conversion is 
handled in two ways : 
 1) When data is coming from the 
computer to send out on the network, 
the NIC driver or software is responsible 
for converting this data into the format 
that can be understood by NIC. 
 2) the second part of data conversion is 
perform by physical NIC itself. 
 In NIC card data is converted into a serial 
format using either digital, analog or 
light signals.
 The details of how to install NIC might 
depend on the Nic Card, Operating System or 
a hardware platform. 
 But some Basic Steps are some. 
 The following are steps to install NIC : 
 1) Plug the card into Expansion Slots, 
Configure Jumpers & DIP switches as required. 
 2) Install NIC driver Or software. 
 3) configure the O.S so that the NIC doesn't 
conflict with other devices.
 4) Bind NIC to the required Protocol. 
 5) Attach the network cable to the card. 
 The NIC is Plug n Play hardware device , O.S 
itself asked the further process of using NIC 
when it is plugged. 

 The O.S must configure so that it can 
communicate with NIC. 
 In many cases, you must manually configure 
the NIC. 
 These settings are configured through Jumpers 
or DIP switch settings or by using some form of 
software. 
 To communicate the O.S & NIC they must agree 
on certain important parameters called 
resource setting.
 Some common resource setting for NIC are as 
follows : 
 1) IRQ 
 2) Base IO port address 
 3) Base memory address 
 4)DMA channel 
 5) Boot PROM 
 6) MAC address 
 7) Ring Speed (Token Ring Cards) 
 8) Connector Type
 1) IRQ : 
 The IRQ (Interrupt Request Line) setting 
reserves a IRQ for the NIC to use when 
contacting the CPU. 
 Devices makes a request to CPU using a 
signal called an interrupt. 
 2) Base I/O Port Address : 
 Base I/O Port Address defines a memory 
address through which data flows to & from 
the NIC. 
 Base I/O Port Address function like a port & it 
defines a channel between Processor & NIC.
 3) Base memory address : 
 Base memory address is the place in the 
computers memory that indicate the beginning 
of Buffers area reserved for NIC. 
 All NIC cards use computers RAM, therefore not 
all NIC requires Base memory address settings. 
 4)DMA channel : 
 DMA (Direct Memory Access) channel is an 
address used for quicker access to the CPU by 
the NIC.
 5) Boot PROM : 
 Some NIC cards are equipped with Boot 
PROM. 
 This Boot PROM enables the NIC to Boot Up 
& connect over the network. 
 This feature is often used by diskless 
workstations because they don’t have hard 
drives to store connection software. 
 6) MAC address : 
 The IEEE is responsible for assigning these 
address to each NIC during manufacturing. 
 In some cases you can reassign a new MAC 
address for NIC.
 7) Ring Speed (Token Ring Cards) : 
 In Token Ring networks the ring speed must be 
set on the token ring card. 
 The possible values for this are either 4 Mbps or 
16 Mbps. 
 8) Connector Type : 
 Some network cards have different connectors 
from which you can choose. 
 A common example is an Ethernet card with 
both a BNC connector & RJ45.
Nic -cst

More Related Content

What's hot (20)

Serial Data Communication
Serial Data CommunicationSerial Data Communication
Serial Data Communication
 
Serial Data Communication
Serial Data CommunicationSerial Data Communication
Serial Data Communication
 
Usb protocol
Usb protocol Usb protocol
Usb protocol
 
Network devices
Network devicesNetwork devices
Network devices
 
USB protocol
USB protocolUSB protocol
USB protocol
 
Nic card presentation by : AsP
Nic card presentation by : AsPNic card presentation by : AsP
Nic card presentation by : AsP
 
Networking Hardware Concepts
Networking Hardware ConceptsNetworking Hardware Concepts
Networking Hardware Concepts
 
Universal Serial Bus (USB)
Universal Serial Bus (USB)Universal Serial Bus (USB)
Universal Serial Bus (USB)
 
Switch & hub
Switch & hubSwitch & hub
Switch & hub
 
ROUTER PPT
ROUTER PPTROUTER PPT
ROUTER PPT
 
interface
interfaceinterface
interface
 
Computer ports
Computer portsComputer ports
Computer ports
 
Computer hardware and networking components
Computer hardware and networking componentsComputer hardware and networking components
Computer hardware and networking components
 
Network Devices
Network  DevicesNetwork  Devices
Network Devices
 
Network devices
Network devicesNetwork devices
Network devices
 
Communication protocols
Communication protocolsCommunication protocols
Communication protocols
 
Io devies
Io deviesIo devies
Io devies
 
Computer hardware, and network
Computer hardware, and networkComputer hardware, and network
Computer hardware, and network
 
Computer Ports
Computer PortsComputer Ports
Computer Ports
 
USB Universal Serial Bus
USB Universal Serial BusUSB Universal Serial Bus
USB Universal Serial Bus
 

Similar to Nic -cst

Training & development in industry
Training & development in industryTraining & development in industry
Training & development in industryDinesh Dwivedi
 
Network Interface Card.pdf
Network Interface Card.pdfNetwork Interface Card.pdf
Network Interface Card.pdfKurtGardy
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
ETHERNET PACKET PROCESSOR FOR SOC APPLICATION
ETHERNET PACKET PROCESSOR FOR SOC APPLICATIONETHERNET PACKET PROCESSOR FOR SOC APPLICATION
ETHERNET PACKET PROCESSOR FOR SOC APPLICATIONcscpconf
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSijngnjournal
 
Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...eSAT Journals
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networkingRameesh Paul
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Serious_SamSoul
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardwareisma ishak
 
How to configure a router
How to configure a router How to configure a router
How to configure a router IT Tech
 
Computer Networks 3
Computer Networks 3Computer Networks 3
Computer Networks 3Mr Smith
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardwareRaja Waseem Akhtar
 
Pc to pc optical fibre communication mini project
Pc to pc optical fibre communication mini projectPc to pc optical fibre communication mini project
Pc to pc optical fibre communication mini projectPadmakar Mangrule
 
Network Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC MicrocontrollerNetwork Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC MicrocontrollerCSCJournals
 

Similar to Nic -cst (20)

Training & development in industry
Training & development in industryTraining & development in industry
Training & development in industry
 
NETWORK INTERFACE CARD
NETWORK INTERFACE CARDNETWORK INTERFACE CARD
NETWORK INTERFACE CARD
 
Network Interface Card.pdf
Network Interface Card.pdfNetwork Interface Card.pdf
Network Interface Card.pdf
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
ETHERNET PACKET PROCESSOR FOR SOC APPLICATION
ETHERNET PACKET PROCESSOR FOR SOC APPLICATIONETHERNET PACKET PROCESSOR FOR SOC APPLICATION
ETHERNET PACKET PROCESSOR FOR SOC APPLICATION
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
 
Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networking
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
nic.pptx
nic.pptxnic.pptx
nic.pptx
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
 
How to configure a router
How to configure a router How to configure a router
How to configure a router
 
Computer Networks 3
Computer Networks 3Computer Networks 3
Computer Networks 3
 
Tcp
TcpTcp
Tcp
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
 
H n q & a
H n q & aH n q & a
H n q & a
 
Pc to pc optical fibre communication mini project
Pc to pc optical fibre communication mini projectPc to pc optical fibre communication mini project
Pc to pc optical fibre communication mini project
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 
Network Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC MicrocontrollerNetwork Based Data Acquisition and Logging System using PIC Microcontroller
Network Based Data Acquisition and Logging System using PIC Microcontroller
 

Recently uploaded

A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationHelp Desk Migration
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisNeo4j
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareinfo611746
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownloadvrstrong314
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with StrimziStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzisteffenkarlsson2
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfMeon Technology
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabbereGrabber
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfmbmh111980
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesNeo4j
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Soroosh Khodami
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfVictor Lopez
 
Benefits of Employee Monitoring Software
Benefits of  Employee Monitoring SoftwareBenefits of  Employee Monitoring Software
Benefits of Employee Monitoring SoftwareMera Monitor
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1KnowledgeSeed
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandIES VE
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignNeo4j
 

Recently uploaded (20)

A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data Migration
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with StrimziStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
 
Benefits of Employee Monitoring Software
Benefits of  Employee Monitoring SoftwareBenefits of  Employee Monitoring Software
Benefits of Employee Monitoring Software
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by Design
 

Nic -cst

  • 1. The Basics By:- TUBA FALAK
  • 2.  The NIC is a Hardware device that installs in a pc.  It provide an interface from pc to the Transmission media.  Most pc networks for EX- Ethernet, Token Ring & ARCNet use NIC.  A NIC links a Computer with the Network cabling system.  The NIC fits into one of the PC’s Expansion Slots.
  • 3.  The card has one or more user accessible ports to which the network cabling medium is connected.  The NIC’s are responsible for Translating data from a device on the network & converting this data into some form of signals that can be Transmitted across the Transmission media.  All Network Interface Cards perform the function of Preparing & sending data.
  • 4.  This data ,when it is inside the Computer ,Travels in parallel from on the Bus.  This data can moves at 8,16 or 32 bits at a time.  The NIC must convert these signals into a Serial signals that can travels across the transmission medium.  When data is received , this serial form of data must be converted into parallel form for matching the bus type of the Computer. 
  • 5.  The mechanism of this data conversion is handled in two ways :  1) When data is coming from the computer to send out on the network, the NIC driver or software is responsible for converting this data into the format that can be understood by NIC.  2) the second part of data conversion is perform by physical NIC itself.  In NIC card data is converted into a serial format using either digital, analog or light signals.
  • 6.  The details of how to install NIC might depend on the Nic Card, Operating System or a hardware platform.  But some Basic Steps are some.  The following are steps to install NIC :  1) Plug the card into Expansion Slots, Configure Jumpers & DIP switches as required.  2) Install NIC driver Or software.  3) configure the O.S so that the NIC doesn't conflict with other devices.
  • 7.  4) Bind NIC to the required Protocol.  5) Attach the network cable to the card.  The NIC is Plug n Play hardware device , O.S itself asked the further process of using NIC when it is plugged. 
  • 8.  The O.S must configure so that it can communicate with NIC.  In many cases, you must manually configure the NIC.  These settings are configured through Jumpers or DIP switch settings or by using some form of software.  To communicate the O.S & NIC they must agree on certain important parameters called resource setting.
  • 9.  Some common resource setting for NIC are as follows :  1) IRQ  2) Base IO port address  3) Base memory address  4)DMA channel  5) Boot PROM  6) MAC address  7) Ring Speed (Token Ring Cards)  8) Connector Type
  • 10.  1) IRQ :  The IRQ (Interrupt Request Line) setting reserves a IRQ for the NIC to use when contacting the CPU.  Devices makes a request to CPU using a signal called an interrupt.  2) Base I/O Port Address :  Base I/O Port Address defines a memory address through which data flows to & from the NIC.  Base I/O Port Address function like a port & it defines a channel between Processor & NIC.
  • 11.  3) Base memory address :  Base memory address is the place in the computers memory that indicate the beginning of Buffers area reserved for NIC.  All NIC cards use computers RAM, therefore not all NIC requires Base memory address settings.  4)DMA channel :  DMA (Direct Memory Access) channel is an address used for quicker access to the CPU by the NIC.
  • 12.  5) Boot PROM :  Some NIC cards are equipped with Boot PROM.  This Boot PROM enables the NIC to Boot Up & connect over the network.  This feature is often used by diskless workstations because they don’t have hard drives to store connection software.  6) MAC address :  The IEEE is responsible for assigning these address to each NIC during manufacturing.  In some cases you can reassign a new MAC address for NIC.
  • 13.  7) Ring Speed (Token Ring Cards) :  In Token Ring networks the ring speed must be set on the token ring card.  The possible values for this are either 4 Mbps or 16 Mbps.  8) Connector Type :  Some network cards have different connectors from which you can choose.  A common example is an Ethernet card with both a BNC connector & RJ45.