It is known as a deterministic access method.
n,knkjhkjn ,bmvjhgfjhghjbhvg
Token-based media access is a controlled media access method in which computers pass a special sequence of bits between them; only the node holding this token can transmit on the network. After transmitting its data, or if it has no data to transmit, a node passes the token to the next computer on the network. Neeraj
media sharing and logical topology
Media Access Control Method or MAC method
Controlled-based media access control is based upon having a system in place for allowing one host to transmit at a time. It is also known as deterministic method since there is a process to determine which host transmits at a certain time. No collisions exist with this type of media access control. An example would be token ring where a token is passed from host to host and when it has the token it can transmit and others do not transmit at that time. Contention-based media access control is known as non-deterministic because hosts can transmit whenever they want. CSMA/CD is an example of this. Collisions do exist.
token passing
i dont know hey
Amazing
This is a function of the token ring topology.
how can media be controlled
It scales very well under heavy media use
Media Access Control address (MAC address) is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification, and used in the Media Access Control protocol sub-layer.