Token ring, Computer Network Security

TOKEN RING

Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both pass from transmitter passed by other devices and are copied by destination.

Hardware have to be designed to pass token ever if attached device powered down. This is given in figure below

 

2432_token Ring.png

 

USING THE TOKEN:

When a device waits to transfer it waits a token. After transmission device transmits token on ring. Next device is then ready to send, receive and then transmits.

 

TOKEN AND SYNCHRONIZATION:

 Because there is only one token, only one device will transmit at a time. Token is a short reserved frame that may not seem in data.

 Hardware must recreate token if lost. Token produce computer permission to send one packet frame. If all devices are ready to transmit it enforces Round-Robin process. But if now device is ready to transmit, token circulates in whole ring.

IBM TOKEN RING:

 It is very commonly used. It was usually 4Mbps and now it is upto 16Mbps. It needs special connection cable between the device and the Ring interface.

 

Posted Date: 7/30/2012 7:49:20 AM | Location : United States







Related Discussions:- Token ring, Assignment Help, Ask Question on Token ring, Get Answer, Expert's Help, Token ring Discussions

Write discussion on Token ring
Your posts are moderated
Related Questions
Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us


Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

DATAGRAM REASSEMBLY Recreation of original datagram is known as reassembly. Ultimate receiver acts reassembly as given below.Fragments can reach out of order. Header bit check

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below


QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not