For example, if Workstation 1 wants to send data on the wire, the workstation
would wait for the token, which is circling the network millions of times per second.
Once the token has reached Workstation 1, the workstation would take the token
off the network, fill it with data, mark the token as being used so that no other
systems try to fill the token with data, and then place the token back on the wire
heading for the destination host.