Preview

Token Ring

Good Essays
Open Document
Open Document
1290 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Token Ring
Token ring is a local area network protocol which resides at the data link layer (DLL) of the OSI model. It uses a special three-byte frame called a token that travels unidirectionally around a star-wired logical ring. Token ring frames travel completely around the loop. The name 'Token Ring' is misleading since the physical topology is a loop.

Each station passes or repeats the special token frame around the ring to its nearest downstream neighbor. This token-passing process is used to arbitrate access to the shared ring media. Stations that have data frames to transmit must first acquire the token before they can transmit them. Token ring LANs normally use differential Manchester encoding of bits on the LAN media.

Token ring was invented by Olof Söderblom in the late 1960s. It was later licensed to IBM, who popularized the use of token ring LANs in the mid 1980s when it released its IBM token ring architecture based on active multi-station access units (MSAUs or MAUs) and the IBM Structured Cabling System. The Institute of Electrical and Electronics Engineers or IEEE (http://www.ieee.org) later standardized a token ring LAN system as IEEE 802.5 (http://www.ieee802.org/5/).

Token ring LAN speeds of 4Mbps, 16Mbps, 100Mbps and 1Gbps have been standardized by the IEEE 802.5 working group.

Token ring networks had significantly superior performance and reliability compared to early shared-media implementations of Ethernet (IEEE 802.3), and were widely adopted as a higher-performance alternative to shared-media Ethernet.

However, with the development of switched Ethernet, token ring architectures lagged badly behind Ethernet in both performance and reliability. The higher sales of Ethernet allowed economies of scale which drove down prices further, and added a compelling price advantage to its other advantages over token ring.

Token ring networks have since declined in usage and the standards activity has since come to a standstill as switched Ethernet

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1310 Unit 3 Exercise 1

    • 443 Words
    • 2 Pages

    Application (in terms of cabling infrastructure) – systems supported by telecommunications cabling; includes Ethernet, Token ring, Fiber Distributed Data Interface (FDDI), and Asynchronous Transfer Mode (ATM)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Unit 5 Questions

    • 821 Words
    • 3 Pages

    Which of the following types of LANs was a competitor of Ethernet LANs from the earliest days…

    • 821 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ring Networks, just as its name implies, require all computers or hardware to be connected in a continuous circle with no ending, hubs or switches. In this setup signals are passed along thru each terminal on its way to the end user. A ring network can be very difficult to install due to the circular configuration making it tough to do in a large area. There are multiple points of failure in this setup, if a cable or a piece of hardware fails this can lead to the entire network…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It/242 Week 4 Chekpoint

    • 379 Words
    • 2 Pages

    Saguaro Federal has mainframes for all of its banks and businesses. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate?…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment

    • 629 Words
    • 3 Pages

    The ring arrangement is the least frequently used with microcomputers. However, as stated above, it often is used to link mainframes over wide geographical areas to build distributed data processing system. The loss of a mainframe usually does not restrain the operation of the network, but a cable problem will stop the network…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Lad 5

    • 598 Words
    • 4 Pages

    The IEEE 802.1standard concerns with the standards and recommendations in the of architecture and internetworking of local area networks (LANs) and metropolitan area networks (MANs), security, network management, and protocol issues above the Data Link Layer.…

    • 598 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A ring network is a network topology in which each node connects exactly to two other nodes, forming a single continual pathway for each node - a ring” (Conjecture Corporation, 2003). In a ring network data travels from each node to the other node/s with each node handling every packet. A ring network provides only a pathway between any two nodes at one time. Ring networks may be disrupted by the failure of a link. A node failure or cable break will isolate every node attached…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    IT220 Unit 5 assignment

    • 286 Words
    • 2 Pages

    802.3: the name of the original IEEE Ethernet standard, as well as the overall base name of all IEEE Ethernet LAN working committees…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    With the advancement information technologies such as multi-core processors, digital media and mega storage architectures, increased Ethernet capacities will continue to be developed. It is likely that approximately every five to seven years will produce new standards to meet new technologies in Ethernet capacities. We can expect to see a greater push towards unified networking with an increasing emphasis on increased data storage at lower costs. New standards will be developed and evolve as the technologies continue to expand.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Provides more capability than wired 10/100 Ethernet connections, allowing enterprise applications to be mobilized thus increasing productivity.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 3 Ntc 362

    • 664 Words
    • 3 Pages

    May refer only to the access method in a LAN, such as Ethernet or Token Ring…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Each ring works independently until one is disabled when the network fails. When this takes place, the functioning ring automatically wraps around the disabled ring to ensure data flow.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cisco System Analysis

    • 15753 Words
    • 64 Pages

    The purpose of this paper is to provide an analysis of Cisco System’s primary business strategies and its utilization of information technologies to achieve a competitive advantage in the network equipment industry. The paper is divided into four sections, starting with a broad industry analysis, then narrowing to concentrate on Cisco Systems Inc., followed by an analysis of their use of information technology. The conclusion is a final analysis of Cisco System’s success.…

    • 15753 Words
    • 64 Pages
    Good Essays
  • Satisfactory Essays

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 2224 Words
    • 9 Pages
    Satisfactory Essays
  • Better Essays

    Fddi and Cddi

    • 2832 Words
    • 12 Pages

    The Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps token-passing, dual-ring LAN using fiber-optic cable. FDDI is frequently used as high-speed backbone technology because of its support for high bandwidth and greater distances than copper. It should be noted that relatively recently, a related copper specification, called Copper Distributed Data Interface (CDDI), has emerged to provide 100-Mbps service over copper. CDDI is the implementation of FDDI protocols over twisted-pair copper wire. This chapter focuses mainly on FDDI specifications and operations, but it also provides a high-level overview of CDDI. FDDI uses dual-ring architecture with traffic on each ring flowing in opposite directions (called counter-rotating). The dual rings consist of a primary and a secondary ring. During normal operation, the primary ring is used for data transmission, and the secondary ring remains idle. As will be discussed in detail later in this chapter, the primary purpose of the dual rings is to provide superior reliability and robustness. Figure 8-1 shows the counter-rotating primary and secondary FDDI rings.…

    • 2832 Words
    • 12 Pages
    Better Essays

Related Topics