Explain token passing -token ring, Computer Networking

Assignment Help:

Token Passing - Token Ring (IEEE 802.5)

  • Needs that station take turns sending data
  • Token passing coordinates process
  • Token is a especially formatted three-byte frame that circulates station wishing to transmit must first have possession
  • Token passes from NIC to NIC in sequence if station has data to send and station takes token and sends data frame if not passes to neighbour
  • Every station receives the frame one by one and examines the destination address
  • If it matches frame is copied station checks the frame for errors changes bits to indicate the frame was received and copied
  • Packet continues around the ring also is passed back to originating station
  • Once the sender receives the frame in addition to recognizes its address in the sender field it examines the address-recognized bits
  • If they are set it recognizes the frame was received and copied
  • Sender subsequently discards the frame and releases the token back to the ring

 


Related Discussions:- Explain token passing -token ring

Data communication and networking, i) Identify at least two items at every ...

i) Identify at least two items at every site that needs upgrading [2 Marks] ii) What type of WAN connection (link) might you use to connect the three sites to each other?

Describe the rpc and client server architecture, Can you describe the RPC a...

Can you describe the RPC and Client server Architecture?

use dijkstras shortest-path algorithm compute short path, Consider the fol...

Consider the following network example. With the indicated link costs along each link in the figure, use Dijkstra's shortest-path algorithm to compute the shortest path from x to a

Single mode for transmitting optical signals, Q. Single Mode for transmitti...

Q. Single Mode for transmitting optical signals? - Merely one beam from a light source is transmitted using a smaller range of angles - Smaller diameter as well as lower de

Client-server , We need to design and implement a secure conference system....

We need to design and implement a secure conference system. The system will allow users to connect to a conference server and to participate in a shared conversation. The conversat

What is subnetting, Used in IP Networks to break up larger networks into sl...

Used in IP Networks to break up larger networks into slighter subnetworks. It is used to decrease network traffic, Optimized network performance, and make simpler management i.e. t

Name the three phases of ppp session establishment, The three phase of PPP ...

The three phase of PPP session establishment are:-  A. Link establishment phase  B. Authentication phase  C. Network layer protocol phase

What is the beaconing, An FDDI frame or Token Ring frames those points to s...

An FDDI frame or Token Ring frames those points to serious problem with the ring, like a broken cable. The beacon frame carries the address of the station thought to be down.

Performance - application layer, Performance Running on  inexpensive  ...

Performance Running on  inexpensive  hardware oracle web cache  increase the  throughput of  website  by several  orders of magnitude. In  addition  oracle web cache  signific

What happens in cdma systems, Question: (a) Suppose that you are a comm...

Question: (a) Suppose that you are a communication engineer and you have to construct a mobile telephone network with bandwidth W = 4.2 MHz in each link. The data rate is

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd