Preview

Token Ring

Good Essays
Open Document
Open Document
1290 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Token Ring
Token ring is a local area network protocol which resides at the data link layer (DLL) of the OSI model. It uses a special three-byte frame called a token that travels unidirectionally around a star-wired logical ring. Token ring frames travel completely around the loop. The name 'Token Ring' is misleading since the physical topology is a loop.

Each station passes or repeats the special token frame around the ring to its nearest downstream neighbor. This token-passing process is used to arbitrate access to the shared ring media. Stations that have data frames to transmit must first acquire the token before they can transmit them. Token ring LANs normally use differential Manchester encoding of bits on the LAN media.

Token ring was invented by Olof Söderblom in the late 1960s. It was later licensed to IBM, who popularized the use of token ring LANs in the mid 1980s when it released its IBM token ring architecture based on active multi-station access units (MSAUs or MAUs) and the IBM Structured Cabling System. The Institute of Electrical and Electronics Engineers or IEEE (http://www.ieee.org) later standardized a token ring LAN system as IEEE 802.5 (http://www.ieee802.org/5/).

Token ring LAN speeds of 4Mbps, 16Mbps, 100Mbps and 1Gbps have been standardized by the IEEE 802.5 working group.

Token ring networks had significantly superior performance and reliability compared to early shared-media implementations of Ethernet (IEEE 802.3), and were widely adopted as a higher-performance alternative to shared-media Ethernet.

However, with the development of switched Ethernet, token ring architectures lagged badly behind Ethernet in both performance and reliability. The higher sales of Ethernet allowed economies of scale which drove down prices further, and added a compelling price advantage to its other advantages over token ring.

Token ring networks have since declined in usage and the standards activity has since come to a standstill as switched Ethernet

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1310 Unit 3 Exercise 1

    • 443 Words
    • 2 Pages

    Application (in terms of cabling infrastructure) – systems supported by telecommunications cabling; includes Ethernet, Token ring, Fiber Distributed Data Interface (FDDI), and Asynchronous Transfer Mode (ATM)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Unit 5 Questions

    • 821 Words
    • 3 Pages

    Which of the following types of LANs was a competitor of Ethernet LANs from the earliest days…

    • 821 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ring Networks, just as its name implies, require all computers or hardware to be connected in a continuous circle with no ending, hubs or switches. In this setup signals are passed along thru each terminal on its way to the end user. A ring network can be very difficult to install due to the circular configuration making it tough to do in a large area. There are multiple points of failure in this setup, if a cable or a piece of hardware fails this can lead to the entire network…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    NT1210 Lad 5

    • 598 Words
    • 4 Pages

    The IEEE 802.1standard concerns with the standards and recommendations in the of architecture and internetworking of local area networks (LANs) and metropolitan area networks (MANs), security, network management, and protocol issues above the Data Link Layer.…

    • 598 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Assignment 1

    • 6320 Words
    • 26 Pages

    “A ring network is a network topology in which each node connects exactly to two other nodes, forming a single continual pathway for each node - a ring” (Conjecture Corporation, 2003). In a ring network data travels from each node to the other node/s with each node handling every packet. A ring network provides only a pathway between any two nodes at one time. Ring networks may be disrupted by the failure of a link. A node failure or cable break will isolate every node attached…

    • 6320 Words
    • 26 Pages
    Powerful Essays
  • Satisfactory Essays

    IT220 Unit 5 assignment

    • 286 Words
    • 2 Pages

    802.3: the name of the original IEEE Ethernet standard, as well as the overall base name of all IEEE Ethernet LAN working committees…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Provides more capability than wired 10/100 Ethernet connections, allowing enterprise applications to be mobilized thus increasing productivity.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210 Final Exam Notes

    • 1243 Words
    • 5 Pages

    Ethernet Bit Rates (Speeds) – Ethernet standards have seen a vast improvement since the IEEE first took over the Ethernet standardization process in 1980. The earliest improvements to Ethernet, in the 1980s, focused on cabling and topology.…

    • 1243 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    In just over thirty years, the Ethernet standard has grown exponentially. In 1980, the standard was only 10MB, which is unheard of today. Today, the standard is 100 Gbit, which is a growth of 10,000 times what it once was. The rate of progression is still climbing, with 1 Tbit Ethernet standards being in the works.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week 3 Ntc 362

    • 664 Words
    • 3 Pages

    May refer only to the access method in a LAN, such as Ethernet or Token Ring…

    • 664 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    Each ring works independently until one is disabled when the network fails. When this takes place, the functioning ring automatically wraps around the disabled ring to ensure data flow.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cisco System Analysis

    • 15753 Words
    • 64 Pages

    The purpose of this paper is to provide an analysis of Cisco System’s primary business strategies and its utilization of information technologies to achieve a competitive advantage in the network equipment industry. The paper is divided into four sections, starting with a broad industry analysis, then narrowing to concentrate on Cisco Systems Inc., followed by an analysis of their use of information technology. The conclusion is a final analysis of Cisco System’s success.…

    • 15753 Words
    • 64 Pages
    Good Essays
  • Satisfactory Essays

    University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.…

    • 2224 Words
    • 9 Pages
    Satisfactory Essays
  • Better Essays

    Fddi and Cddi

    • 2832 Words
    • 12 Pages

    The Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps token-passing, dual-ring LAN using fiber-optic cable. FDDI is frequently used as high-speed backbone technology because of its support for high bandwidth and greater distances than copper. It should be noted that relatively recently, a related copper specification, called Copper Distributed Data Interface (CDDI), has emerged to provide 100-Mbps service over copper. CDDI is the implementation of FDDI protocols over twisted-pair copper wire. This chapter focuses mainly on FDDI specifications and operations, but it also provides a high-level overview of CDDI. FDDI uses dual-ring architecture with traffic on each ring flowing in opposite directions (called counter-rotating). The dual rings consist of a primary and a secondary ring. During normal operation, the primary ring is used for data transmission, and the secondary ring remains idle. As will be discussed in detail later in this chapter, the primary purpose of the dual rings is to provide superior reliability and robustness. Figure 8-1 shows the counter-rotating primary and secondary FDDI rings.…

    • 2832 Words
    • 12 Pages
    Better Essays

Related Topics