Explain token passing -token ring, Computer Networking

Assignment Help:

Token Passing - Token Ring (IEEE 802.5)

  • Needs that station take turns sending data
  • Token passing coordinates process
  • Token is a especially formatted three-byte frame that circulates station wishing to transmit must first have possession
  • Token passes from NIC to NIC in sequence if station has data to send and station takes token and sends data frame if not passes to neighbour
  • Every station receives the frame one by one and examines the destination address
  • If it matches frame is copied station checks the frame for errors changes bits to indicate the frame was received and copied
  • Packet continues around the ring also is passed back to originating station
  • Once the sender receives the frame in addition to recognizes its address in the sender field it examines the address-recognized bits
  • If they are set it recognizes the frame was received and copied
  • Sender subsequently discards the frame and releases the token back to the ring

 


Related Discussions:- Explain token passing -token ring

Difference between trigger and rule, What is the difference between trigger...

What is the difference between trigger and rule? Ans) The triggers are known as implicitly by database generated events, whereas stored procedures are known as explicitly by cli

Explain the forward congestion avoidance process, Explain the Forward conge...

Explain the Forward congestion avoidance process Notifies the user that congestion avoidance process should be initiated where applicable for traffic in the similar direction a

Residential access - computer network, Residential Access Residential ...

Residential Access Residential  access is connecting home  end  systems ( typically a PC but increasingly a home network) into the network. One form  of residential  access  i

Ftp and ftp application layer protocols, What is the difference between TFT...

What is the difference between TFTP and FTP application layer protocols? Ans) TFTP - Trivial File Transfer Protocol A stripped down version of FTP, easy to use and fast. TFTP

State the security concerns, State the Security concerns The history of...

State the Security concerns The history of security concerns is not new. They have been of great worry to man and for many centuries man has been endeavouring to devise new tec

What is the mesh network, A network in which there is multiple network link...

A network in which there is multiple network links among computers to provide multiple paths for data to travel.

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Distributed enrollment protocol dep, Introduction: This is a specialized p...

Introduction: This is a specialized protocol designed for CS5244. It provides a distributed means to access a BasicEnrollmentManager implementation through client-server communica

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd