Token ring, Computer Network Security

TOKEN RING

Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both pass from transmitter passed by other devices and are copied by destination.

Hardware have to be designed to pass token ever if attached device powered down. This is given in figure below

 

2432_token Ring.png

 

USING THE TOKEN:

When a device waits to transfer it waits a token. After transmission device transmits token on ring. Next device is then ready to send, receive and then transmits.

 

TOKEN AND SYNCHRONIZATION:

 Because there is only one token, only one device will transmit at a time. Token is a short reserved frame that may not seem in data.

 Hardware must recreate token if lost. Token produce computer permission to send one packet frame. If all devices are ready to transmit it enforces Round-Robin process. But if now device is ready to transmit, token circulates in whole ring.

IBM TOKEN RING:

 It is very commonly used. It was usually 4Mbps and now it is upto 16Mbps. It needs special connection cable between the device and the Ring interface.

 

Posted Date: 7/30/2012 7:49:20 AM | Location : United States







Related Discussions:- Token ring, Assignment Help, Ask Question on Token ring, Get Answer, Expert's Help, Token ring Discussions

Write discussion on Token ring
Your posts are moderated
Related Questions
#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

What is the concept of topology?

Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

TCP and UDP End-to-end delivery application is connection less. The basic function of connectionless service are as given: It adds extension of LAN abstraction. It has simp

1. For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

what are the participant of marketing channal?