answersLogoWhite

0


Best Answer

That is not possible. In Token Ring, only the station with the token can transmit.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: If four token ring stations attempt to transmit at the same time what happens?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the purpose of the token frame in a token ring network?

To indicate to the network that a particular node is about to transmit data


What is token bus?

A token bus is a type of network which uses the token ring protocol. The protocol is implemented over a virtual ring using coaxial cable. A token is passed around the ring, so that only one computer has the right to transmit data. If the chosen computer doesn't have any data to transmit, the token is passed to the next computer.


What technique do token ring networks use to determine what node gets to transmit over a shared channel?

token passing


What is token based media access?

Token-based media access is a controlled media access method in which computers pass a special sequence of bits between them; only the node holding this token can transmit on the network. After transmitting its data, or if it has no data to transmit, a node passes the token to the next computer on the network. Neeraj


What happens when token is lost in token ring topology?

Nobody knows......


What is the purpose of a token in a token-passing network?

The token indicates current "ownership" of the ring, in that only one client at a time can have access to the network. If you don't have the token you can't do anything on the network. It also indicates the status of the ring, whether it is in use, available to transmit on, health status, etc.


Compare and contast controlled media access and contention-based media access control?

Controlled-based media access control is based upon having a system in place for allowing one host to transmit at a time. It is also known as deterministic method since there is a process to determine which host transmits at a certain time. No collisions exist with this type of media access control. An example would be token ring where a token is passed from host to host and when it has the token it can transmit and others do not transmit at that time. Contention-based media access control is known as non-deterministic because hosts can transmit whenever they want. CSMA/CD is an example of this. Collisions do exist.


Which statements describe the logical token-passing topology?

Computers are allowed to transmit data only when they possess a token.Electronic tokens are passed sequentially to each other.


What if a computer is powerer off in a token ring Does token will be bypassed or ring topology will break up?

The hub and/or the active monitor program will be aware of the system that is turned off, and the attempt to send that system the token will be bypassed. Standard token ring systems are designed to avoid systems that are turned off or non-functioning. The network keeps running.


In token bus network what happens when the station accepts atoken and crashes immediately?

How does Token Bus (IEEE 802.4) enforce discipline on a logical ring topology? ----


In a token ring network what happens to a packet when it reaches the computer it was sent to?

The token is set to 'received' and both the token and the packet are regenerated and placed on the network for the next station. The only system that may remove the packet is the station that originally sent it.


How is the operation of 802.4token bus?

A token bus uses a shared bus for communication. Hosts on the bus are ordered in a logical ring, with access to the bus coordinated by passing a token (a special packet) around the ring, indicating permission to transmit. The intent is to get the robustness of a simple bus protocol with the deterministic response time of a token ring. Unfortunately, because the bus is shared, each host on the bus must wait for the token to be completely transmitted before it can pass it on. This is in contrast to a token ring, where the token passes through each host with only a few bits delay. This gives the token bus considerably worse latency than a token ring. The reliability of a token protocol over a (CSMA protocl such as Ethernet ) is undermined by the complex protocols needed to recover the token at exactly one host should it become corrupted.