The IEEE 802.four and 802.5 standards and the IBM Token Ring protocol (with which IEEE 802.5 is compatible) use token passing, an altogether diverse method than CSMA/CD, for medium access handle. Phase three (Participation in ring poll) — A station learns the address of its Nearest Active Upstream Neighbour (NAUN) and makes its address recognized to its nearest downstream neighbour, top to the creation of the ring map. If the status line indicates that the interface and line protocol are not up, check the cable from the router to the MAU.
It is also achievable to extend the configuration in Figure 9-two to involve a ring consisting of several interconnected hubs. In the MSAU, if we do not connect a cable to a Ring In or Ring Out port, that port loops the signal back by means of the MSAU to retain the integrity of the ring.
MAUs, repeaters, and most other equipment use a special IBM Form-1 unisex information connector (Newer Token Ring cards and MAUs use RJ-45 connectors and CAT5 UTP cabling). There are nonetheless some legacy minicomputers and mainframes that nevertheless use Token Ring networks but they are few and far in between.
A token ring LAN is implemented either as a logical ring utilizing a physical ring topology (see Figure 9-1), or as a logical ring structure arranged in a physical star configuration (see Figure 9-2). In a token ring network, the initially personal computer to come on-line creates a three-byte information frame referred to as a token.
A token (a special bit pattern) is circulated in the network to allow a node to capture the information. Add on the price of more expensive cabling and MAUs, and Token Ring just priced itself out of the marketplace. Due to being future proof and somewhat low cost, …Read more