answersLogoWhite

0

That is not possible. In Token Ring, only the station with the token can transmit.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What is the purpose of the token frame in a token ring network?

To indicate to the network that a particular node is about to transmit data


What technique do token ring networks use to determine what node gets to transmit over a shared channel?

token passing


What is token based media access?

Token-based media access is a controlled media access method in which computers pass a special sequence of bits between them; only the node holding this token can transmit on the network. After transmitting its data, or if it has no data to transmit, a node passes the token to the next computer on the network. Neeraj


What happens when token is lost in token ring topology?

Nobody knows......


What is the purpose of a token in a token-passing network?

The token indicates current "ownership" of the ring, in that only one client at a time can have access to the network. If you don't have the token you can't do anything on the network. It also indicates the status of the ring, whether it is in use, available to transmit on, health status, etc.


What is access method for ring topologies?

In a ring topology, the access method used is typically token passing. In this method, a token is passed around the ring from one node to the next, allowing nodes to transmit data when they possess the token. This helps in controlling and managing the network traffic in a structured manner.


What is token bus?

Token Bus is a type of network where devices are connected in a bus (a single communication line) and use "token passing" to control communication. How It Works: A "token" (a small data packet) moves around the network. Only the device holding the token can send data. Once done, it passes the token to the next device. This method prevents data collisions and ensures smooth communication. While mostly outdated, the concept of Token Development Solutions in blockchain follows a similar idea—where tokens enable secure and controlled transactions in decentralized systems.


Compare and contast controlled media access and contention-based media access control?

Controlled-based media access control is based upon having a system in place for allowing one host to transmit at a time. It is also known as deterministic method since there is a process to determine which host transmits at a certain time. No collisions exist with this type of media access control. An example would be token ring where a token is passed from host to host and when it has the token it can transmit and others do not transmit at that time. Contention-based media access control is known as non-deterministic because hosts can transmit whenever they want. CSMA/CD is an example of this. Collisions do exist.


What if a computer is powerer off in a token ring Does token will be bypassed or ring topology will break up?

The hub and/or the active monitor program will be aware of the system that is turned off, and the attempt to send that system the token will be bypassed. Standard token ring systems are designed to avoid systems that are turned off or non-functioning. The network keeps running.


In token bus network what happens when the station accepts atoken and crashes immediately?

How does Token Bus (IEEE 802.4) enforce discipline on a logical ring topology? ----


Which statements describe the logical token-passing topology?

Computers are allowed to transmit data only when they possess a token.Electronic tokens are passed sequentially to each other.


In a token ring network what happens to a packet when it reaches the computer it was sent to?

The token is set to 'received' and both the token and the packet are regenerated and placed on the network for the next station. The only system that may remove the packet is the station that originally sent it.