Explain token passing -token ring, Computer Networking

Assignment Help:

Token Passing - Token Ring (IEEE 802.5)

  • Needs that station take turns sending data
  • Token passing coordinates process
  • Token is a especially formatted three-byte frame that circulates station wishing to transmit must first have possession
  • Token passes from NIC to NIC in sequence if station has data to send and station takes token and sends data frame if not passes to neighbour
  • Every station receives the frame one by one and examines the destination address
  • If it matches frame is copied station checks the frame for errors changes bits to indicate the frame was received and copied
  • Packet continues around the ring also is passed back to originating station
  • Once the sender receives the frame in addition to recognizes its address in the sender field it examines the address-recognized bits
  • If they are set it recognizes the frame was received and copied
  • Sender subsequently discards the frame and releases the token back to the ring

 


Related Discussions:- Explain token passing -token ring

Explain the meaning and use of the z-index property in dhtml, QUESTION ...

QUESTION (a) In CSS, each element in a document is considered to be in an invisible box. Give three ways how to make the box visible (b) (i) Explain the meaning and use of t

The ip addressing scheme, An Internet address (IP address) is a unique 32-b...

An Internet address (IP address) is a unique 32-bit binary number given to a host and used for all interaction with the host. Each packet transmit across an Internet contains the 3

What is one basic requirement for establishing vlan, What is one basic requ...

What is one basic requirement for establishing VLANs? A VLAN needs dedicated equipment on each end of the connection that permits messages entering the Internet to be encrypted

Network service model - network layer and routing, Network Service Model ...

Network Service Model The network  service  model  defines  the characteristics of end to end  transport of data between  one edge of the  network  to the  other  that is betwe

osi layer performs code conversion, Name the OSI layer which performs code...

Name the OSI layer which performs code conversion, code formatting and encryption Ans) Presentation layer performs code conversion, code formatting and encryption

Name the 10base5 connectors, 10Base5 Connectors Transceiver - inter...

10Base5 Connectors Transceiver - intermediary device as well called a medium attachment unit (MAU) Performs CSMA/CD function may perhaps contain small buffer Atta

Illustrate nonboundary-level masking with example, Q. Illustrate Nonboundar...

Q. Illustrate Nonboundary-Level Masking with example? Nonboundary-Level Masking Example IP address 45 123 21 8 Mask 255 192 0 0 Subnet 45 64 0 0 123 0

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd