answersLogoWhite

0


Best Answer

Token Passing

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which access method is used in Token Ring?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What type of network access method is used on a ring network?

Token passing


What is the term for a hub used on a token ring network?

Figure it out your selves If you are doing a National Diploma in IT then you should know this


Assuming the de-528ct cards are compatible with the office network does the lan use ethernet or token ring?

i think the next question is " what is the name of the access method used on the LAN?


What internetworking device is used to connect computers on a Token Ring?

Token ring hub


How is a FDDI network like a Token Ring network How is it different?

Both Token Ring and FDDI use the concept of a ring topology structure. However, Token Ring is used in a LAN, and FDDI is used in a MAN.Token Ring is implemented with copper cable (UTP cable) and FDDI uses Fiber Optic cable.Finally, the protocols are very different between the two. FDDI uses a synchronous type of transmission, where Token Ring uses an actual token (a 3 character packet) to control who has access to transmit or receive on the network. FDDI does not use this technique.


Who developed token ring?

IBM created the token ring architecture, which was used for years primarily by Novell.


Why token ring cannot be used in wan?

Token ring is a loacal area network technology. It is limited in ldistance by its physical layer connection requirements.


Nodes transmitting when it is their turn?

You are thinking ring topology. Not used much today.


Can you change the frame type of an Network Interface card in an Ethernet network be used in a token ring network?

no. The differences between ethernet and token ring are greater then the frame type. Ethernet uses CDMA and token ring uses.....well a token. Token ring adapters have an on-board processor for source route bridging which uses a RIF field and ethernet has nothing of the sort. There are many more examples, but the simple answer is it will not work. fm


What are Ethernet and token ring?

oken-Ring was initially successful for IBM - as most IBM-endorsed technologies are. But beyond IBM, it never garnered much support among top-tier vendors, which gravitated toward Ethernet, the preferred LAN technology of research institutions and manufacturing companies.Token-Ring began its downward spiral soon after the emergence of 10Base-T Ethernet, an inexpensive, 10Mbps transmission technology than ran across telephone grade unshielded twisted-pair copper media. Matters were not helped when Soderblom began demanding royalties from the few Token-Ring vendors and chip makers, driving prices higher.Stations on a token ring LAN are logically organized in a ring topology with data being transmitted sequentially from one ring station to the next with a control token circulating around the ring controlling access. This token passing mechanism is shared by ARCNET, token bus, and FDDI, and has theoretical advantages over the stochastic CSMA/CD of Ethernet. Physically, a token ring network is wired as a star, with 'hubs' and arms out to each station and the loop going out-and-back through each. Cabling is generally IBM "Type-1" shielded twisted pair, with unique hermaphroditic connectors, commonly referred to as IBM data connectors. The connectors have the disadvantage of being quite bulky, requiring at least 3 x 3 cm panel space, and being relatively fragile.Initially (in 1985) token ring ran at 4 M bit/s, but in 1989 IBM introduced the first 16 M bit/s token ring products and the 802.5 standard was extended to support this. In 1981, Apollo Computer introduced their proprietary 12 M bit/s Apollo token ring (ATR) and Proteonintroduced their 10 M bit/s ProNet-10 token ring network in 1984. However, IBM token ring was not compatible with ATR or ProNet-10. Each station passes or repeats the special token frame around the ring to its nearest downstream neighbor. This token-passing process is used to arbitrate access to the shared ring media. Stations that have data frames to transmit must first acquire the token before they can transmit them. Token ring LANs normally use differential Manchester encoding of bits on the LAN media.IBM popularized the use of token ring LANs in the mid 1980s when it released its IBM token ring architecture based on active MAUs (Media Access Unit, not to be confused with Medium Attachment Unit) and the IBM Structured Cabling System. The Institute of Electrical and Electronics Engineers (IEEE) later standardized a token ring LAN system as IEEE 802.5.Token ring LAN speeds of 4 Mbit/s and 16 Mbit/s were standardized by the IEEE 802.5 working group. An increase to 100 Mbit/s was standardized and marketed during the wane of token ring's existence while a 1000 Mbit/s speed was actually approved in 2001, but no products were ever brought to market.


What type of bridge would be used to conncet an ehernet segment with a token ring segment?

A gateway.


What is fddi nic?

Fiber Distributed Data Interface (FDDI) NICs are commonly used to connect host systems or file servers to FDDI network equipment using one connectin (single attachment) and to attach the network equipment to the FDDI cabling through two attachments (dual attachment). FDDI is defined by the ANSI X3T9.5 standards committee and provides an access method to enable high-capacity data throughput on busy networks. It has a data throughput rate of 100Mbps, and is simliar to the token ring access method because it uses token passing for network communication.