Explain the concept of token passing, Computer Networking

Assignment Help:

Token Passing

  • Station is able to send only when it receives a special frame called a token
  • Token circulates around the ring
  • If station wishes to send it detains the token and sends one or more frames
  • Token is then released thus next station can transmit

 

560_Computer network.png


Related Discussions:- Explain the concept of token passing

Determine the switch in a physical ring, Switch In a physical ring ...

Switch In a physical ring configuration any disabled or else disconnected node can disable the entire network Use of a switch can permit the ring to bypass an inactive

Failure reporting and analysis, 1. A systematic study of failures will help...

1. A systematic study of failures will help in identifying areas that may cause :   i.  Loss of adjacent parts/ equipment/ whole equipment. ii.  Loss of production and rev

Explain hyper cube interconnection networks, Hyper Cube: A Hypercube inter...

Hyper Cube: A Hypercube interconnection network is an expansion of cube network. For n=3, Hypercube interconnection network may be described recursively in this manner:  For n

Explain asynchronous FDDI, Explain Asynchronous FDDI Asynchronous bandw...

Explain Asynchronous FDDI Asynchronous bandwidth is allocated utilizing an eight-level priority scheme. Every station is assigned an asynchronous priority level. FDDI as wel

Which decision called socket base, IP plus port (IP on layer 3 and port on ...

IP plus port (IP on layer 3 and port on Layer 4 - In Encapsulation, socket base decision on Network Layer -Layer 3)

Define topologies other than basic topologies, What are the popular topolog...

What are the popular topologies other than basic Topologies? Apart from basic topologies some other topologies worth considering are: mesh topology (each device linked to all o

Whitney houston, contribution to afican American history

contribution to afican American history

Ip message finally reassemble, Concept of how does the IP message finally r...

Concept of how does the IP message finally reassemble?

Describe any good security technology, Describe any good security technolog...

Describe any good security technology A good security technology should be powerful enough to support the features that the administrators need, including rules validation to i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd