Explain token ring, Computer Engineering

Assignment Help:

Explain Token Ring.

Token Ring:

A token ring is a collection of single point -to-point links, which arise from a circle. In a token ring a special bi t pattern, termed as the token, circulates around the ring when each station is idle. While a station needs to transmit a frame, this is needed to seize the token and remove this from the ring before transmitting. Its action is done through inverting a single bit in the 3-byte token that instantly changes this into the first 3 bytes of a normal data frame. Since there is only one token one station can transmit at a specified instant.


Related Discussions:- Explain token ring

Processing elements (pes) -array processing, Processing elements (PEs)  : E...

Processing elements (PEs)  : Every processing element consists of ALU, local memory and its registers  for storage of distributed data. This PEs has been interconnected via an inte

Structural classification-flynns classification , Structural Classification...

Structural Classification Flynn's classification examine the behavioural concept and does not receive into consideration the computer's structure. Parallel computers can be cla

Mini project, give proper code for any kind of project in oop c++

give proper code for any kind of project in oop c++

How are standard query operators useful in linq, Standard Query Operators i...

Standard Query Operators in LINQ can be used for working with collections for any of the following and more. 1. Get total count of elements in a collection. 2. Order the resu

What is a table cluster, What is a table cluster? A table cluster join...

What is a table cluster? A table cluster joins several logical tables in the ABAP/4 Dictionary.  Various logical rows from different cluster tables are brought together in a o

Android projects, how should I do connectivity with google play for my andr...

how should I do connectivity with google play for my android GSM based project

Boundary tag management system, what are the two memory management scehme...

what are the two memory management scehme(boundary tag system,buddy system)

Connectives - first-order logic , Connectives - first-order logic: We ...

Connectives - first-order logic: We can string predicates all together in a sentence by using connectives into the same way to conduct that we did for propositional logic. We

Define the firewall design policy, Define the Firewall Design Policy ...

Define the Firewall Design Policy A lower-level policy that describes how the firewall will handle prevention of access and filtering of services as defined in the above net

Final year project, i want to make final year project in wireless.please he...

i want to make final year project in wireless.please help me to decide the topic???????

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd