Token ring, Computer Network Security


Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both pass from transmitter passed by other devices and are copied by destination.

Hardware have to be designed to pass token ever if attached device powered down. This is given in figure below


2432_token Ring.png



When a device waits to transfer it waits a token. After transmission device transmits token on ring. Next device is then ready to send, receive and then transmits.



 Because there is only one token, only one device will transmit at a time. Token is a short reserved frame that may not seem in data.

 Hardware must recreate token if lost. Token produce computer permission to send one packet frame. If all devices are ready to transmit it enforces Round-Robin process. But if now device is ready to transmit, token circulates in whole ring.


 It is very commonly used. It was usually 4Mbps and now it is upto 16Mbps. It needs special connection cable between the device and the Ring interface.


Posted Date: 7/30/2012 7:49:20 AM | Location : United States

Related Discussions:- Token ring, Assignment Help, Ask Question on Token ring, Get Answer, Expert's Help, Token ring Discussions

Write discussion on Token ring
Your posts are moderated
Related Questions
Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

how can you enter the ASVAB practice test on line?

FIREWALL ANALYSIS TOOLS There are a number of tools automate remote discovery of firewall rules and assist the administrator in analyzing rules Administrators who feel wary of u

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

how can you enter the ASVAB practice test on line?

Problem (1) - Alice, Bob and Charlie have a secret key a=3, b=4, c=5, respectively. - They want to find a common secret key using Diffie-Hellan key exchange protocol (with g

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Task 1 a. Consider the table showing the relative frequencies of letters in English. Arrange the frequencies from largest to smallest, and make a cumulative plot, using Exc

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr