SlideShare a Scribd company logo
1 of 13
.
CONTENT
TOKEN
Lan
TOKEN RING
Work of token ring
Types of token Ring
Token ring and Ethernet
2
TOKEN
Token is series of bits that circulate on
token ring network.
Token takes data from sender and move
towards destination point.
There is only one token for each token ring
network.
One computer only data can send at a time.
3
LAN
Local Area Network
A LAN is a network infrastructure that
spans a small geographical area.
Interconnect end devices in a limited area.
Administered by a single organization or
individual.
Provide high-speed bandwidth to internal
devices
4
Token Ring
Token ring was developed in the early
1980’s by IBM for LAN.
It was in direct competition with Ethernet.
A token ring network is used in local area
network.
A token ring network all computers are
connected in a ring or star topology and
pass one or more logical tokens from host
to host.
Only a host that holds a token can send
data and tokens are released when receipt
of the data is confirmed.
5
How token ring works
6
Token moves in one direction that is called
uni direction.
Token revolve every time in ring topology If
A computer wants to send data to C then A
hold token and fill up data in token then it
send to C.
TypeOf token
PhysicaltokenRing
This one visible ring where token
work in token ring.
Devices are connected with each
other in ring shape
If wire damage then system not
work.
DualtokenRing
Dual ring Bothe side devices are
connected outgoing and incoming
Primary and secondary ring
If ring primary damage then
secondary ring will work on ring
BusTokenRing
In Bus ring we can not see physical
shape as ring topology but it will
work as ring.
StarTokenRing
In Star token ring the devices are
connected through hub.
star token ring message pass through
hub.
If one device damage then others
devices working.
12
Token Ring Ethernet
The local area network which has the
properties to transmit the node only when
it has certain pieces in succession that
come from the other successive nodes turn
by turn.
The system used for connecting various computers
to form a local area network and has different
protocols to ensure the passage of information
takes place smoothly.
Deterministic Non-deterministic
Delay start to occur whenever the load
becomes low.
The flow stays the same even if the load becomes
less or more.
A token-passing system which has only one
workstation to call upon at one instant.
Collision Sense Multiple Access/Collision Detection
(CSMA/CD) topology.
ThankYou
Sarmad Ali Memon
+923083642441
sindhisarmad123@gmail.com

More Related Content

What's hot

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Phan Vuong
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
ymghorpade
 

What's hot (20)

Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Ethernet
EthernetEthernet
Ethernet
 
Token bus
Token busToken bus
Token bus
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in Networking
 
Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Transmission modes
Transmission modesTransmission modes
Transmission modes
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
HUB Device
HUB Device HUB Device
HUB Device
 
Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Synchronous and Asynchronous Transmission
Synchronous and Asynchronous TransmissionSynchronous and Asynchronous Transmission
Synchronous and Asynchronous Transmission
 

Similar to Token ring

Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
kuramartin
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
RiteshKumar630578
 

Similar to Token ring (20)

Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Cristian
CristianCristian
Cristian
 
Ethernet and switches
Ethernet and switchesEthernet and switches
Ethernet and switches
 
Webinar in English for the Token Bridge between RSK and Ethereum
Webinar in English for the Token Bridge between RSK and EthereumWebinar in English for the Token Bridge between RSK and Ethereum
Webinar in English for the Token Bridge between RSK and Ethereum
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
How networks communicate ?
How networks communicate ?How networks communicate ?
How networks communicate ?
 
Dc lec-03 (topologies)
Dc lec-03  (topologies)Dc lec-03  (topologies)
Dc lec-03 (topologies)
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
LAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptxLAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptx
 
FASE DE PLANEACION (INGLES)
FASE DE PLANEACION (INGLES)FASE DE PLANEACION (INGLES)
FASE DE PLANEACION (INGLES)
 
Enhancing fault tolerance in ring topology
Enhancing fault tolerance in ring topology Enhancing fault tolerance in ring topology
Enhancing fault tolerance in ring topology
 
Advanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture noteAdvanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture note
 
Cotrolled access
Cotrolled accessCotrolled access
Cotrolled access
 
Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)Ethernet and Token ring (Computer Networks)
Ethernet and Token ring (Computer Networks)
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

Token ring

  • 1. .
  • 2. CONTENT TOKEN Lan TOKEN RING Work of token ring Types of token Ring Token ring and Ethernet 2
  • 3. TOKEN Token is series of bits that circulate on token ring network. Token takes data from sender and move towards destination point. There is only one token for each token ring network. One computer only data can send at a time. 3
  • 4. LAN Local Area Network A LAN is a network infrastructure that spans a small geographical area. Interconnect end devices in a limited area. Administered by a single organization or individual. Provide high-speed bandwidth to internal devices 4
  • 5. Token Ring Token ring was developed in the early 1980’s by IBM for LAN. It was in direct competition with Ethernet. A token ring network is used in local area network. A token ring network all computers are connected in a ring or star topology and pass one or more logical tokens from host to host. Only a host that holds a token can send data and tokens are released when receipt of the data is confirmed. 5
  • 6. How token ring works 6 Token moves in one direction that is called uni direction. Token revolve every time in ring topology If A computer wants to send data to C then A hold token and fill up data in token then it send to C.
  • 8. PhysicaltokenRing This one visible ring where token work in token ring. Devices are connected with each other in ring shape If wire damage then system not work.
  • 9. DualtokenRing Dual ring Bothe side devices are connected outgoing and incoming Primary and secondary ring If ring primary damage then secondary ring will work on ring
  • 10. BusTokenRing In Bus ring we can not see physical shape as ring topology but it will work as ring.
  • 11. StarTokenRing In Star token ring the devices are connected through hub. star token ring message pass through hub. If one device damage then others devices working.
  • 12. 12 Token Ring Ethernet The local area network which has the properties to transmit the node only when it has certain pieces in succession that come from the other successive nodes turn by turn. The system used for connecting various computers to form a local area network and has different protocols to ensure the passage of information takes place smoothly. Deterministic Non-deterministic Delay start to occur whenever the load becomes low. The flow stays the same even if the load becomes less or more. A token-passing system which has only one workstation to call upon at one instant. Collision Sense Multiple Access/Collision Detection (CSMA/CD) topology.