Home Tutorials FAQ's Installers Shop Contact Us Network Cabling Help Network Cabling Help - Copyright © 2014 - All rights reserved. - Privacy and Cookie Policy "All you'll ever need to know about Network Cabling ......... well almost !"
76
Unlike Ethernet, Token Ring uses a ring topology whereby the data is sent from one machine to the next and so on around the ring until it ends up back where it started. It also uses a token passing protocol which means that a machine can only use the network when it has control of the Token, this ensures that there are no collisions because only one machine can use the network at any given time.Token Ring networks are now very rare because the cost and flexibility of Ethernet came to dominate the market.The BasicsHere is an animated GIF that shows the basic operation of a Token Ring, and below is an explanation of what is going on. Although 16Mbps is the standard ring speed (and Fast Token Ring was being developed) we will consider a 4Mbps Token Ring in this tutorial to explain the basic concepts. Hit 'Refresh' on your browser to start the animation from the beginningAt the start, a free Token is circulating on the ring, this is a data frame which to all intents and purposes is an empty vessel for transporting data. To use the network, a machine first has to capture the free Token and replace the data with its own message. In the example above, machine 1 wants to send some data to machine 4, so it first has to capture the free Token. It then writes its data and the recipient's address onto the Token (represented by the yellow flashing screen).The packet of data is then sent to machine 2 who reads the address, realizes it is not its own, so passes it on to machine 3. Machine 3 does the same and passes the Token on to machine 4.This time it is the correct address and so number 4 reads the message (represented by the yellow flashing screen). It cannot, however, release a free Token on to the ring, it must first send the frame back to number 1 with an acknowledgement to say that it has received the data (represented by the purple flashing screen).The receipt is then sent to machine 5 who checks the address, realizes that it is not its own and so forwards it on to the next machine in the ring, number 6.Machine 6 does the same and forwards the data to number 1, who sent the original message.Machine 1 recognizes the address, reads the acknowledgement from number 4 (represented by the purple flashing screen) and then releases the free Token back on to the ring ready for the next machine to use.That's the basics of Token Ring and it shows how data is sent, received and acknowledged, but Token Ring also has a built in management and recovery system which makes it very fault tolerant. Below is a
Home Tutorials FAQ's Installers Shop Contact Us Network Cabling Help Network Cabling Help - Copyright © 2014 - All rights reserved. - Privacy and Cookie Policy "All you'll ever need to know about Network Cabling ......... well almost !"
76
Unlike Ethernet, Token Ring uses a ring topology whereby the data is sent from one machine to the next and so on around the ring until it ends up back where it started. It also uses a token passing protocol which means that a machine can only use the network when it has control of the Token, this ensures that there are no collisions because only one machine can use the network at any given time.Token Ring networks are now very rare because the cost and flexibility of Ethernet came to dominate the market.The BasicsHere is an animated GIF that shows the basic operation of a Token Ring, and below is an explanation of what is going on. Although 16Mbps is the standard ring speed (and Fast Token Ring was being developed) we will consider a 4Mbps Token Ring in this tutorial to explain the basic concepts. Hit 'Refresh' on your browser to start the animation from the beginningAt the start, a free Token is circulating on the ring, this is a data frame which to all intents and purposes is an empty vessel for transporting data. To use the network, a machine first has to capture the free Token and replace the data with its own message. In the example above, machine 1 wants to send some data to machine 4, so it first has to capture the free Token. It then writes its data and the recipient's address onto the Token (represented by the yellow flashing screen).The packet of data is then sent to machine 2 who reads the address, realizes it is not its own, so passes it on to machine 3. Machine 3 does the same and passes the Token on to machine 4.This time it is the correct address and so number 4 reads the message (represented by the yellow flashing screen). It cannot, however, release a free Token on to the ring, it must first send the frame back to number 1 with an acknowledgement to say that it has received the data (represented by the purple flashing screen).The receipt is then sent to machine 5 who checks the address, realizes that it is not its own and so forwards it on to the next machine in the ring, number 6.Machine 6 does the same and forwards the data to number 1, who sent the original message.Machine 1 recognizes the address, reads the acknowledgement from number 4 (represented by the purple flashing screen) and then releases the free Token back on to the ring ready for the next machine to use.That's the basics of Token Ring and it shows how data is sent, received and acknowledged, but Token Ring also has a built in management and recovery system which makes it very fault tolerant. Below is a
การแปล กรุณารอสักครู่..