Explore chapters and articles related to this topic
Customer Premises Networks
Published in Goff Hill, The Cable and Telecommunications Professionals' Reference, 2012
Because of Ethernet's success, other LAN technologies are no longer widely used. Nevertheless, it is instructive to consider alternative approaches briefly. In a token ring network, network devices are interconnected via a ring topology. Information is transmitted sequentially around the ring, one device after another, unlike Ethernet, where information is always transmitted in an unscheduled, random fashion. A unique token is passed via the ring between devices, where each may only transmit when it has the token. After receiving a frame, the destination device copies information from the ring and the source device removes the frame from the ring when it replies. After that, the source device sends the token to the next node. Other ring technologies based on similar concepts exist, such as the Fiber Distributed Data Interface (FDDI) and the Cambridge Ring. In an alternative configuration, the token bus protocol involves passing tokens sequentially in a set pattern around devices connected to a bus network.
The Data Center Manager’s Guide to Networked Imaging Systems
Published in Steven F. Blanding, Enterprise Operations Management, 2020
Overall, Token-Ring has a lot to recommend it for image applications. At 16M bps, it exceeds Ethernet performance by 63 percent and overcomes the distance limitations of Ethernet, about 2.5 miles, through token regeneration at each station. Unlike Ethernet, Token-Ring provides every station with guaranteed access to the network instead of making each station wait for access until the network is idle, as in Ethernet. Token-Ring traffic can even be ranked according to priority, so that workstations can swap document images, for example, before other types of applications can use the network.
Practical Solutions
Published in Andy Bailey, Network Technology for Digital Audio, 2013
A token ring network uses a special frame called a token that rotates around the ring when no stations are actively sending information. A network of only one device sets the network in single station mode and that device becomes responsible for generating the token. As other devices become active on the network, the first station remains the master, responsible for regenerating lost tokens.
The advanced wireless sensor networks’ routing protocol to detect malicious nodes and behavior
Published in Journal of the Chinese Institute of Engineers, 2023
Previously, computer networks endeavored to route data transfer faster over local or regional networks with the token-ring technique. A token ring technique is based on a small frame that circulates among all stations. A station wishing to transmit the must wait until it detects a token ring. The principal advantage of a computer network with a token ring is its flexible control over access to the token ring. Bux and colleagues analyzed the architecture, performance, transmission system, and wiring strategy of a token-ring local area network implemented at the IBM Zurich Research Laboratory. In the design of the system, they placed a particular emphasis on high reliability, availability, and serviceability (Bux et al. 1983). However, with the advancement of technology and the penetration of modern computer networks and the Internet in all aspects of life, the issue of data transfer security has also become important (Ometov et al. 2021). The fundamental characteristics of a computer network are the interchange of data between two or more parties, multi-shear communications, direct and indirect trustworthiness, and reliable routing (Din et al. 2018; Salehi et al. 2016).