TokenTalk Programmers Guide
TokenTalk Programmers Guide
Macintosh · PDF
| Filename | TokenTalk_Programmers_Guide_198903.pdf |
|---|---|
| Size | 7.30 MB |
| Subsection | developer / Networking |
| Downloads | 3 |
Contents
(
Medusa
Programmer's Guide
Beta Draft
Apple Confidential
Medusa Programmer's Guide, Beta Draft
S APPLE COMP'Ulll, INC.
This manual is cq>yrighted by Apple
or by Apple's suppliers, with all rights
reserved. Under the cop)'!ight laws,
this manual may !10l be copied, in
whole or in part, without the
written consent of Apple Computer,
Inc. This exception does !lC( allow
copies to be made for OOiers,
whether or ncx sold, but all ci the
material purchased may be sold,
given, or lent to another person.
Under the law, copying includes
translating into another language.
C Apple Computer, Inc., 1989
20525 Mariani Avenue
Cupertino, CA 95014
(~)996-1010
Apple, the Apple logo, and Macintosh
are registered trademarks of Apple
Computer, Inc.
TokenTalk, Macinta;h Coprocessor
Platform, and MR-DOS are
trademarks of Apple Computer, Inc.
NuBus i.5 a trademark of Texas
Instruments.
Simultaneously publi.shed in the
United States and Canada
Notice
The information in this
document rctlects the current
state of the product. Every
effort has been made to verify
the accuracy of this information;
however, it is subject to change.
Beta Drafts an: rcJe:ased in this
form to ptOTlde the
deveJopmem community with
essendal information In order
to work on compatible products.
Apple confidential
Y21/89
Apple C.Onfidential
(
Contents
Preface
What this document contains I
Suggested reading I
Possible applications I
Conventions used in this manual I
1 Introduction 1
Token Ring Networks I
The network layers I
A token ring network I
Token communication I
The Macintosh II token ring interface I
SubNetwork Access Protocol (SNAP) I
The 802.2 Logical Link Control !PC interface I
Macintosh Operating System !PC services I
Download and initialization services I
iii
Apple Confidential
2 Source Routing Support
What is source routing? I
Hierarchical networks I
Mesh networks I
How source routing works I
Routing information I
Source routing implementation I
SNAPuse I
U.C use I
Source route limits I
3 SubNetwork Access Protocol (SNAP) Interface
General information I
Typical SNAP use I
!PC requests to SNAP I
SNAPAttach I
SNAPGetConfig I
SNAPGetHdr I
SNAPTransmit I
SNAPDetach I
SNAPReceive I
SNAPC.ancel I
SNAPGetParm.s I
Functions supporting 802.2 I
SNAPSwapHdr I
Example program listing I
4 The 802.2 llC I lPC Interface
General information I
Typi:al rol-2 llC use I
!PC requests ID ~2.2 LLC I
U.COpenSAP I
U.CCloseSAP /
iv
CONTENTS
Apple Confidential
(
IlCGetHdr I
IlCGetCoofig I
LLCOpenStation I
LLCClo.seStation I
IlCConnectStation I
LLCModifyParams I
IlCReceive I
IlCReceiveC.ancel I
IlCTl Transmit I
IlCT2Transmit I
IlCReset I
LLCRetumBuffer I
IlCGetStatistics I
IlCStatus I
IlCSetFunctionalAddr I
Functions Supporting 802.2 I
LLCSwapHdr I
5 Apple IPC Services
I
1
General information I
Apple !PC driver I
Apple !PC library I
Apple !PC managers I
Csing Apple !PC I
Apple !PC services I
C<RQJeue I
CopvNuBus I
freeMsg /
GetCard I
GetETick I
GetICCTID I
GetlPCg I
GetMsg I
GeL"larn…
Showing first 3,000 characters of 210,592 total. Open the full document →