Token ring, Computer Network Security

TOKEN RING

Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both pass from transmitter passed by other devices and are copied by destination.

Hardware have to be designed to pass token ever if attached device powered down. This is given in figure below

 

2432_token Ring.png

 

USING THE TOKEN:

When a device waits to transfer it waits a token. After transmission device transmits token on ring. Next device is then ready to send, receive and then transmits.

 

TOKEN AND SYNCHRONIZATION:

 Because there is only one token, only one device will transmit at a time. Token is a short reserved frame that may not seem in data.

 Hardware must recreate token if lost. Token produce computer permission to send one packet frame. If all devices are ready to transmit it enforces Round-Robin process. But if now device is ready to transmit, token circulates in whole ring.

IBM TOKEN RING:

 It is very commonly used. It was usually 4Mbps and now it is upto 16Mbps. It needs special connection cable between the device and the Ring interface.

 

Posted Date: 7/30/2012 7:49:20 AM | Location : United States







Related Discussions:- Token ring, Assignment Help, Ask Question on Token ring, Get Answer, Expert's Help, Token ring Discussions

Write discussion on Token ring
Your posts are moderated
Related Questions
Ask question #Minimum.. 100 words accepted#

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber securit

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

Size of Option field of an ip datagram is 20 bytes. What is the value of HLEN? What is the value in binary?

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

implementing password policy in organisation

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho