Explain token passing -token ring, Computer Networking

Assignment Help:

Token Passing - Token Ring (IEEE 802.5)

  • Needs that station take turns sending data
  • Token passing coordinates process
  • Token is a especially formatted three-byte frame that circulates station wishing to transmit must first have possession
  • Token passes from NIC to NIC in sequence if station has data to send and station takes token and sends data frame if not passes to neighbour
  • Every station receives the frame one by one and examines the destination address
  • If it matches frame is copied station checks the frame for errors changes bits to indicate the frame was received and copied
  • Packet continues around the ring also is passed back to originating station
  • Once the sender receives the frame in addition to recognizes its address in the sender field it examines the address-recognized bits
  • If they are set it recognizes the frame was received and copied
  • Sender subsequently discards the frame and releases the token back to the ring

 


Related Discussions:- Explain token passing -token ring

What does a metric of 16 hops showwhen using RIP , Destination unreachable ...

Destination unreachable Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Netware ipx addressing uses a network number, NetWare IPX addressing uses a...

NetWare IPX addressing uses a network number and a node number. Which  statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi

compute maximum current and properties of an ideal op-amp, Questions: ...

Questions: 1. A 5V Zener diode has a maximum power dissipation of 2W. What is the maximum current that can be safely passed through the device? 2. List three properties of a

Why is the authentication and key agreement of 3gpp weak, Question 1: a...

Question 1: a) How is the four-way exchange employed for mutual authentication in WPA/RSN? b) Elaborate on how inquiry attacks and traffic monitoring attacks can be u

command saves the configuration stored in ram to nvram, Which command save...

Which command saves the configuration stored in RAM to NVRAM Ans) copy running-config startup-config is the command which saves the configuration stored in RAM to NVRAM

Digital encoding, A modified NRZ code known as enhanced-NRZ (E-NRZ) operate...

A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is chosen to make the

Bandwidth allocation , Consider figure.  Assume a new flow E is added that ...

Consider figure.  Assume a new flow E is added that takes a path from R1 to R2 to R6. How does the max-min bandwidth allocation change for the 5 flows?

Explain about the intranet hardware and software, Explain about the Intrane...

Explain about the Intranet hardware and software Intranets not only provide a secure environment for companies but also provide an excellent working environment that is full of

Which statement is true regarding half duplex, Half duplex is analogous to ...

Half duplex is analogous to a one a lane bridge, it can handle traffic in both directions but no at the similar time.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd