Token ring, Computer Network Security

TOKEN RING

Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both pass from transmitter passed by other devices and are copied by destination.

Hardware have to be designed to pass token ever if attached device powered down. This is given in figure below

 

2432_token Ring.png

 

USING THE TOKEN:

When a device waits to transfer it waits a token. After transmission device transmits token on ring. Next device is then ready to send, receive and then transmits.

 

TOKEN AND SYNCHRONIZATION:

 Because there is only one token, only one device will transmit at a time. Token is a short reserved frame that may not seem in data.

 Hardware must recreate token if lost. Token produce computer permission to send one packet frame. If all devices are ready to transmit it enforces Round-Robin process. But if now device is ready to transmit, token circulates in whole ring.

IBM TOKEN RING:

 It is very commonly used. It was usually 4Mbps and now it is upto 16Mbps. It needs special connection cable between the device and the Ring interface.

 

Posted Date: 7/30/2012 7:49:20 AM | Location : United States







Related Discussions:- Token ring, Assignment Help, Ask Question on Token ring, Get Answer, Expert's Help, Token ring Discussions

Write discussion on Token ring
Your posts are moderated
Related Questions
Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

QUESTION: a) Explain four issues that are generally addressed in the Needs Analysis phase in the building-block approach to network design. b) Sketch a typical hybrid star-b

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Let me know the details of protocol tcp/ip

attacks on crytography

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po