answersLogoWhite

0

poo sexy poo

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

In a token ring network what happens to a packet when it reaches the computer it was sent to?

The token is set to 'received' and both the token and the packet are regenerated and placed on the network for the next station. The only system that may remove the packet is the station that originally sent it.


On a token ring network what happens to a packet when it reaches the computer it was sent to?

it gets cached and reassembled.


How does a token ring work?

3. Unlike Ethernet, Token Ring uses a ring topology whereby the data is sent from one machine to the next and so on around the ring until it ends up back where it started. It also uses a token passing protocol which means that a machine can only use the network when it has control of the Token, this ensures that there are no collisions because only one machine can use the network at any given time.


What is token ring cable?

it is a network data communication system where each of the device connected with it wait for their time to communicate. when they have the token, they got to communicate or sent transmission.


Define the terms packet datagram frame and token?

Data is transmitted on a network in pieces called packets, datagrams, or frames. Specifically, the frame is the header and trailer surrounding the data. The entire header, trailer, and data is called the packet or datagram. A token is a small packet used on Token Ring or FDDI networks. The token is passed from node to node to indicate to the node that data can be sent on the network.


How do token passing works?

I assume you're talking about a network. On a token network, all of the computers wait to send data until they have the token. The token is a piece of data that travels around the network (picture all of the computers set up in a circle) giving each one a chance to send their data. After that computer has sent the data, the token moves on to the next. It prevents data collision on the network.


Forms of network access protocol?

n/y access protocol means say in arp process when an ip has a data and it needs to sent it, it must inform network access protocol such as ethernet and token ring of the destination hardware add on the local n/w.


What is token bus communication system?

it is a network data communication system where each of the device connected with it wait for their time to communicate. when they have the token, they got to communicate or sent transmission.


Why is a token ring nework inefficient?

Because it makes all computers who have something to say wait until they get the token. Some info that needs to be sent may be very important but if it doesn't have the token then too bad. It'll have to wait.


Who Sent the first text massage?

The phone. i sent the first text massage.


Can a Token Ring and Ethernet use the same physical topology?

No, because they use different methods for data transfer. Token Ring is where the computers are arranged in a sort of Ring Shape. there is no router involved. the packet is sent until the recipient is found. Ethernet networking requires the use of a Router or a Switch, or Multiple computers. The data is transfered to the Router, then sent to the recipient directly. multiple computers can be stringed together in a "Daisy Chain", so they all share the MAC address of the first PC in the chain. This can be used to defeat MAC filtering, but that should be covered in a different questions.


Why has the ring topology become obsolete?

These days each desktop computer has a separate internet address bypassing the need to have everything sent through a ring of computers or token ring system. The internet is based on a form of interlinked computers that means information sent from one computer find its way through whatever links it needs to another computer regardless of where those computers are.