Explain the concept of token passing, Computer Networking

Assignment Help:

Token Passing

  • Station is able to send only when it receives a special frame called a token
  • Token circulates around the ring
  • If station wishes to send it detains the token and sends one or more frames
  • Token is then released thus next station can transmit

 

560_Computer network.png


Related Discussions:- Explain the concept of token passing

Data bandwidth requirements, Calculate data bandwidth requirements from and...

Calculate data bandwidth requirements from and to each site.

What are the protocol support tools, What are the Protocol Support Tools ...

What are the Protocol Support Tools The Intranet should support the tools meant for providing various services on the Internet through the protocols. In addition to the convent

What is frequency diversity, What is Frequency diversity Due to the tra...

What is Frequency diversity Due to the transmission is spread out over a larger bandwidth, frequency-dependent transmission impairments, like as noise bursts and selective fadi

What is encapsulation and de-encapsulation, Process to send data is called ...

Process to send data is called as encapsulation and process to receive data is called De-encapsulation.

What is tcp/ip, TCP/IP is a name provided to the collection (or suite) of n...

TCP/IP is a name provided to the collection (or suite) of networking protocols that have been used to construct the global Internet. The protocols are also referred to as the DoD (

Permutation representation through matrix, Q. Permutation representation th...

Q. Permutation representation through Matrix? Figure: Clos Network The functioning of this above permutation is displayed in Figure. This permutation is able to

What is wdm, What is WDM? WDM is conceptually the similar as FDM, excep...

What is WDM? WDM is conceptually the similar as FDM, except that the multiplexing and demultiplexing includes light signals transmitted by fiber optics channel.

Give examples of icmp, Ping and Traceroute are used by ICMP for Testing. ...

Ping and Traceroute are used by ICMP for Testing. Destination Unreachable messages are obtained by a router when it does not have a route to the network.

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd