That is not possible. In Token Ring, only the station with the token can transmit.
To indicate to the network that a particular node is about to transmit data
A token bus is a type of network which uses the token ring protocol. The protocol is implemented over a virtual ring using coaxial cable. A token is passed around the ring, so that only one computer has the right to transmit data. If the chosen computer doesn't have any data to transmit, the token is passed to the next computer.
token passing
Token-based media access is a controlled media access method in which computers pass a special sequence of bits between them; only the node holding this token can transmit on the network. After transmitting its data, or if it has no data to transmit, a node passes the token to the next computer on the network. Neeraj
Nobody knows......
The token indicates current "ownership" of the ring, in that only one client at a time can have access to the network. If you don't have the token you can't do anything on the network. It also indicates the status of the ring, whether it is in use, available to transmit on, health status, etc.
Controlled-based media access control is based upon having a system in place for allowing one host to transmit at a time. It is also known as deterministic method since there is a process to determine which host transmits at a certain time. No collisions exist with this type of media access control. An example would be token ring where a token is passed from host to host and when it has the token it can transmit and others do not transmit at that time. Contention-based media access control is known as non-deterministic because hosts can transmit whenever they want. CSMA/CD is an example of this. Collisions do exist.
Computers are allowed to transmit data only when they possess a token.Electronic tokens are passed sequentially to each other.
The hub and/or the active monitor program will be aware of the system that is turned off, and the attempt to send that system the token will be bypassed. Standard token ring systems are designed to avoid systems that are turned off or non-functioning. The network keeps running.
How does Token Bus (IEEE 802.4) enforce discipline on a logical ring topology? ----
The token is set to 'received' and both the token and the packet are regenerated and placed on the network for the next station. The only system that may remove the packet is the station that originally sent it.
A token bus uses a shared bus for communication. Hosts on the bus are ordered in a logical ring, with access to the bus coordinated by passing a token (a special packet) around the ring, indicating permission to transmit. The intent is to get the robustness of a simple bus protocol with the deterministic response time of a token ring. Unfortunately, because the bus is shared, each host on the bus must wait for the token to be completely transmitted before it can pass it on. This is in contrast to a token ring, where the token passes through each host with only a few bits delay. This gives the token bus considerably worse latency than a token ring. The reliability of a token protocol over a (CSMA protocl such as Ethernet ) is undermined by the complex protocols needed to recover the token at exactly one host should it become corrupted.