?
Solved

PCI Bus Capacity

Posted on 1998-06-01
2
Medium Priority
?
229 Views
Last Modified: 2013-11-09
Hello:

I am trying to determine the capacity of the PCI bus.  I know its 132 MB/S but I don't know if it is megabyte or megabit.  I f you know conclusively let me know.

Thanks
0
Comment
Question by:GBP
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
busuka earned 400 total points
ID: 1018637
Just FYI: http://www.sundance.com/pci.htm
I believe that this is MegaBytes/sec. Megabits used in telecommunications,
like modem characteristics and also RAM chips markings. In computers
used MB (MegaBytes).
0
 
LVL 7

Expert Comment

by:rin1010
ID: 1018638

  I see... a proposed answer was attached while I was doing my hunt & peck... Oh well, I'll comment on bits...

  A byte contains adjacent bits that a computer reads as a unit; 7 or 8, or more typically, 16 of them. A BIT contains one of the two binary characters, 0 and 1.

  A megabit is 1,048,576 bits (2 raised to the 20th power,) and a megabyte is that amount of bytes. Modems express the rate of data transmission as bits per second (bps), or the number of data bits sent in one second.

  A bite is a bit with an e appended, as in "off more than one can chew." Help this hopes, GBP...

0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Director of Solution Engineering Jon Tobin discusses the function and features of Percona Server for MongoDB. How Percona can help Percona can help you determine if Percona Server for MongoDB is the right solution for …
Suggested Courses
Course of the Month14 days, 14 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question