What is Token Ring
Token-Ring Lan Technology was developed by IBM in the middle 1980s as a fast and reliable alternative to Ethernet. Token ring technology uses a different concept, known as token passing, for allowing network adapters to transmit data on the media. Token Ring uses a Star Ring topology, a hybrid topology, looking physically like a Star Topology but logically wired as a Ring Topology.
Token-Ring operates in Ring Topology, in a logical ring, where the central device which is used to connect the network devices (Servers, Workstations, Printers, Scanners etc.) hosts an internal ring, where access to the network media for a network device is given only by the possession of a token that is passed from device to device on the ring. The central device which is used to connect the network devices is called as a Multistation Access Unit, or MAU. Please click the link to view an image of IBM token ring MAU from Wikipedia webpage.
Token-Ring is more sophisticated than Ethernet., and it includes a number of built-in diagnosis and correction mechanisms that can help troubleshoot network problems and Token-Ring networks does not produce the collisions that can take place in the Ethernet. Network. The main difference of Ethernet and Token ring is that, Ethernet uses Star Topology and Token ring uses logical Ring topology.
When a Token-Ring network starts up, the devices take part in a negotiation to decide who will become the "Active Monitor". In Token-Ring network, "Active Monitor" is a machine with the highest MAC address and all other machines are 'Standby Monitors'. The job of the Active Monitor is to make sure that none of the machines are causing problems on the network, and to re-establish the ring after a break or an error has occurred.
A computer that passes the token to the next computer on the logical ring would be called the nearest active upstream neighbor (NAUN). The computer receiving the token is the nearest active downstream neighbor (NADN). Once a computer takes possession of the token and transmits data, it then creates a new token and passes it to its NADN.
Early Token-Ring networks had 4Mbps speed and later 16Mbps and 100Mbps speed Token-Ring networks were also available. Token Ring networks were replaced by Ethernet family technologies due to the advantages of Ethernet technologies.
These days, it is extremly difficult to find a business network operating using Token ring technology.
Chapter 1 :- Introduction to Computer Networking
Chapter 2 :- What is a Computer Network
Chapter 3 :- Why we need computer networks
Chapter 4 :- Client Operating Systems
Chapter 5 :- Common Network Application Software
Chapter 6 :- LAN and WAN
Chapter 7 :- CAN and MAN
Chapter 8 :- Peer-to-Peer networks and Client-Server networks
Chapter 9 :- Centralized and Distributed Computer Networks
Chapter 10 :- Internetworks, Internet, Intranet and Extranet
Chapter 11 :- What is a Network Protocol
Chapter 12 :- Difference between Proprietary and Standard Protocols
Chapter 13 :- What are RFCs
Chapter 14 :- Organizations which control Internet
Chapter 15 :- Bus Topology
Chapter 16 :- Star Topology
Chapter 17 :- Mesh, Ring and Hybrid Topologies
Chapter 18 :- Network Infrastructure Devices and Icons
Chapter 19 :- Network Hub
Chapter 20 :- Network Bridge
Chapter 21 :- What is a Router
Chapter 21 :- What is a Firewall
Chapter 22 :- Office Networks
Chapter 23 :- Hub-and-spoke WAN topology
Chapter 24 :- Partial-Mesh WAN topology
Chapter 25 :- Full-mesh Site-to-site WAN topology
Chapter 26 :- What is NIC
Chapter 27 :- Common Network Cable types
Chapter 28 :- Difference between Baseband and Broadband
Chapter 29 :- CSMA/CD, CSMA/CA and Token Passing
Chapter 30 :- LAN Technologies Ethernet
Chapter 31 :- Ethernet Media Standards
Chapter 32 :- What is Token Ring
Chapter 33 :- What is FDDI
Chapter 34 :- IEEE 802 Standards
Networking Interview Questions :- 1
Networking Interview Questions :- 2
Post a Comment
If you have any doubt, Please let me know.