Explain token passing -token ring, Computer Networking

Assignment Help:

Token Passing - Token Ring (IEEE 802.5)

  • Needs that station take turns sending data
  • Token passing coordinates process
  • Token is a especially formatted three-byte frame that circulates station wishing to transmit must first have possession
  • Token passes from NIC to NIC in sequence if station has data to send and station takes token and sends data frame if not passes to neighbour
  • Every station receives the frame one by one and examines the destination address
  • If it matches frame is copied station checks the frame for errors changes bits to indicate the frame was received and copied
  • Packet continues around the ring also is passed back to originating station
  • Once the sender receives the frame in addition to recognizes its address in the sender field it examines the address-recognized bits
  • If they are set it recognizes the frame was received and copied
  • Sender subsequently discards the frame and releases the token back to the ring

 


Related Discussions:- Explain token passing -token ring

What does jade stands for, QUESTION (a) Briefly describe the dire...

QUESTION (a) Briefly describe the direct coordination model and the meeting oriented coordination model (b) What does JADE stands for? (c) Name the three spec

Explain the hubs and repeaters, Hubs/Repeaters Hubs/Repeaters are used ...

Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exc

Urgent pointer - transport layer, Urgent Pointer This 16 bite whic...

Urgent Pointer This 16 bite which is valid  only f the urgent  flag is set is used  when the segment  contains  urgent data. If  defines  the number  that must be  added  t

Components of the vpn - point to point , Components of the VPN When  us...

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

Factor price, who are experts who lecter on factor price?

who are experts who lecter on factor price?

Sonet sdh , SONET SDH To satisfy the  requirements  of ever inc...

SONET SDH To satisfy the  requirements  of ever increasing data rate  for diverse applications, ANS developed  a standard known as synchronous optical  network by utili

What is ring topology, What is Ring topology The network consists of a ...

What is Ring topology The network consists of a set of repeaters joined by point-to-point links in a closed loop. Each station attaches to the network at a repeater and can tra

Address space, Internet addresses are divided in five distinct types of cla...

Internet addresses are divided in five distinct types of classes. The classes were designated A by E. class A address space lets a small number of networks although a large number

Metrics for performance evaluation, Metrics For Performance Evaluation ...

Metrics For Performance Evaluation In this section, we would highlight different kinds of metrics involved for analyzing the performance of parallel algorithms for parallel co

Medium earth orbiting satellite, Medium Earth Orbiting satellite is an orbi...

Medium Earth Orbiting satellite is an orbit which is located just above the few hundred miles to a few thousands above the earth surface. It is of higher advantage than Low orbit s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd