Explain monitor stations of token passing, Computer Networking

Assignment Help:

Monitor Stations

  • Lost tokens - timer is issued each time a frame or token is generated
  • If no frame is received in time period new token is generated by a monitor station
  • Orphan frames effects if a sending station neglects to remove a used data frame from the ring
  • Monitor sets a bit in the AC field in every frame as frame passes bit is set if the frame passes again the monitor discards and will remove it and generate a new token

 

846_Computer network.png


Related Discussions:- Explain monitor stations of token passing

Error correcting code - hamming code, Error Correcting Code - Hamming Code:...

Error Correcting Code - Hamming Code: Hamming code is the one of the error-correcting code named after its inventor. Because of the simplicity of the hamming code, it can dete

Disadvantages of fiber optics, Disadvantages of Fiber Optics - Install...

Disadvantages of Fiber Optics - Installation/maintenance - Unidirectional - Cost

Circuit switched networks, Question 1 Write about                       Ci...

Question 1 Write about                       Circuit Switched Networks                       Packet Switched Networks Question 2 Write about                       Protocol Indep

Introduction to operations research, explain the three classification of op...

explain the three classification of operation research

Determine the specification of fddi, FDDI has four specifications: 1. M...

FDDI has four specifications: 1. Media Access Control it defines how the medium is accessed 2. Physical Layer Protocol it defines data encoding/decoding procedures 3. Phy

Networks edge and technologies - computer networks , Networks Edge  and Te...

Networks Edge  and Technologies Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Wireless transmission, what are the main problems of signal propagation?why...

what are the main problems of signal propagation?why do radio waves not always follow a straight line?why is reflection both useful and harmful?

Explain the term - global corporate-wide network, Explain the term - global...

Explain the term - global corporate-wide network It would be highly interesting to note that more than 70 per cent of all security related problems start from within the organi

Packet loss and retransmission in tcp, Packet loss and retransmission in TC...

Packet loss and retransmission in TCP TCP gets reliability by retransmission. An acknowledgement is used to check that data has arrived successfully. If acknowledgement does no

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd