Monday 7 May 2012

PROTOCOL:TOKEN RING

• developed by IBM in the mid-1980s.
• access method involves token-passing.
• the computers are connected so that the signal travels
around the network from one computer to another in a
logical ring.
• A single electronic token moves around the ring from
one computer to the next. If a computer does not have
information to transmit, it simply passes the token on
to the next workstation. If a computer wishes to
transmit and receives an empty token, it attaches data
to the token. The token then proceeds around the ring
until it comes to the computer for which the data is
meant- the data is captured by the receiving computer.

No comments:

Post a Comment