Ethernet Vs Token Ring Essays About Life

Token Ringlocal area network (LAN) technology is a communications protocol for local area networks. It uses a special three-byte frame called a "token" that travels around a logical "ring" of workstations or servers. This token passing is a channel access method providing fair access for all stations, and eliminating the collisions of contention-based access methods.

Introduced by IBM in 1984, it was then standardized with protocol IEEE 802.5 and was fairly successful, particularly in corporate environments, but gradually eclipsed by the later versions of Ethernet.

(The main focus of this article is the IBM/IEEE 802.5 version, but there were several other earlier implementations of Token Rings.)

History[edit]

A wide range of different local area network technologies were developed in the early 1970s, of which one, the Cambridge Ring had demonstrated the potential of a token passing ring topology, and many teams worldwide began working on their own implementations. At the IBM Zurich Research Laboratory Werner Bux and Hans Müller in particular worked on the design and development of IBM's Token Ring technology,[1] while early work at MIT[2] led to the Proteon 10 Mbit/s ProNet-10 Token Ring network in 1981 – the same year that workstation vendor Apollo Computer introduced their proprietary 12 Mbit/s Apollo Token Ring (ATR) network running over 75-ohm RG-6Ucoaxial cabling.[3] Proteon later evolved a 16 Mbit/s version that ran on unshielded twisted pair cable.

IBM launched their own proprietary Token Ring product on October 15, 1985.[4] It ran at 4 Mbit/s, and attachment was possible from IBM PCs, midrange computers and mainframes. It used a convenient star-wired physical topology, and ran over shielded twisted-pair cabling, and shortly thereafter became the basis for the (ANSI)/IEEE standard 802.5.[5]

During this time, IBM argued strongly that Token Ring LANs were superior to Ethernet, especially under load,[6] but these claims were fiercely debated.[7]

In 1988 the faster 16 Mbit/s Token Ring was standardized by the 802.5 working group,[8] and an increase to 100 Mbit/s was standardized and marketed during the wane of token ring's existence. However it was never widely used, ("IBM does not view high-speed token ring as a requirement for the majority of its customers, and therefore the decision has been made not to provide 100 Mbps high-speed Token Ring uplinks on its products..."),[9] and while a 1000 Mbit/s was approved in 2001, no products were ever brought to market[10] and standards activity came to a standstill as Fast Ethernet and Gigabit Ethernet dominated the local area networking market.

  • 100 Mbit/s IBM Token Ring Management Adapter with Wake On LAN. Both UTP (RJ45) and STP (IBM Data Connector) interfaces are present.

  • Token Ring Network Interface Cards (NICs) with varying interfaces from: ISA, PCI and MicroChannel

  • Madge 4/16Mbit/s TokenRing ISA NIC

Comparison with Ethernet[edit]

Ethernet and Token ring have some notable differences:

  • Token Ring access is more deterministic, compared to Ethernet's contention-based CSMA/CD
  • Ethernet supports a direct cable connection between two network interface cards by the use of a crossover cable or through auto-sensing if supported. Token ring does not inherently support this feature and requires additional software and hardware to operate on a direct cable connection setup.[11]
  • Token Ring eliminates collision by the use of a single-use token and early token release to alleviate the down time. Ethernet alleviates collision by carrier sense multiple access and by the use of an intelligent switch; primitive Ethernet devices like hubs can precipitate collisions due to repeating traffic blindly.[12]
  • Token Ring network interface cards contain all of the intelligence required for speed autodetection, routing and can drive themselves on many Multistation Access Units (MAUs) that operate without power (most MAUs operate in this fashion, only requiring a power supply for LEDs). Ethernet network interface cards can theoretically operate on a passive hub to a degree, but not as a large LAN and the issue of collisions is still present.[13]
  • Token Ring employs 'access priority' in which certain nodes can have priority over the token. Unswitched Ethernet does not have provisioning for an access priority system as all nodes have equal contest for traffic.
  • Multiple identicalMAC addresses are supported on Token Ring (a feature used by S/390 mainframes).[9] Switched Ethernet cannot support duplicate MAC addresses without reprimand.[14]
  • Token Ring was more complex than Ethernet, requiring a specialized processor and licensed MAC/LLC firmware for each interface. By contrast, Ethernet included both the (simpler) firmware and the lower licensing cost in the MAC chip. The cost of a Token Ring interface using the Texas Instruments TMS380C16 MAC and PHY was approximately three times that of an Ethernet interface using the Intel 82586 MAC and PHY.[citation needed]
  • Initially both networks used expensive cable, but once Ethernet was standardized for unshielded twisted pair with 10BASE-T (Cat 3) and 100BASE-TX (Cat 5(e)), it had a distinct advantage and sales of it increased markedly.
  • Even more significant when comparing overall system costs was the much-higher cost of router ports and network cards for token-ring vs Ethernet. The emergence of Ethernet switches may have been the final straw.[citation needed]

Operation[edit]

Stations on a token ring LAN are logically organized in a ring topology with data being transmitted sequentially from one ring station to the next with a control token circulating around the ring controlling access. Similar token passing mechanisms are used by ARCNET, token bus, 100VG-AnyLAN (802.12) and FDDI, and they have theoretical advantages over the CSMA/CD of early Ethernet.[15]

A Token Ring network can be modeled as a polling system where a single server provides service to queues in a cyclic order.[16]

Access control[edit]

The data transmission process goes as follows:

  • Empty information frames are continuously circulated on the ring.
  • When a computer has a message to send, it seizes the token. The computer will then be able to send the frame.
  • The frame is then examined by each successive workstation. The workstation that identifies itself to be the destination for the message copies it from the frame and changes the token back to 0.
  • When the frame gets back to the originator, it sees that the token has been changed to 0 and that the message has been copied and received. It removes the message from the frame.
  • The frame continues to circulate as an "empty" frame, ready to be taken by a workstation when it has a message to send.

Multistation Access Units and Controlled Access Units[edit]

Main article: Media Access Unit

Physically, a Token Ring network is wired as a star, with 'MAUs' in the center, 'arms' out to each station, and the loop going out-and-back through each.[17]

A MAU could present in the form of a hub or a switch; since token ring had no collisions many MAUs were manufactured as hubs. Although Token Ring runs on LLC, it includes Source Routing to forward packets beyond the local network. The majority of MAUs are configured in a 'concentration' configuration by default, but later MAUs also supporting a feature to act as splitters and not concentrators exclusively such as on the IBM 8226.[18]

Later IBM would release Controlled Access Units that could support multiple MAU modules known as a Lobe Attachment Module. The CAUs supported features such as Dual-Ring Redundancy for alternate routing in the event of a dead port, modular concentration with LAMs, and multiple interfaces like most later MAUs.[19] This offered a more reliable setup and remote management than with an unmanaged MAU hub.

Cabling and interfaces[edit]

Cabling is generally IBM "Type-1", a heavy two-pair 150 Ohm shielded twisted pair cable. This was the basic cable for the "IBM Cabling System", a structured cabling system that IBM hoped would be widely adopted. Unique hermaphroditic connectors, commonly referred to as IBM Data Connectors in formal writing or colloquially as Boy George connectors were used.[20] The connectors have the disadvantage of being quite bulky, requiring at least 3 x 3 cm panel space, and being relatively fragile. The advantages of the connectors being that they are genderless and have superior shielding over standard unshielded RJ45. Connectors at the computer were usually DE-9 female.

In later implementations of Token Ring, Cat 6 cabling was also supported, so RJ45 connectors were used on both of the MAUs, CAUs and NICs; with many of the network cards supporting both RJ45 and DE-9 for backwards compatibility.[17]

  • IBM Data Connectors on the IBM 8228 Multistation Access Unit.

  • RJ45 'Media Filters' that plug into an IBM Data Connector converting it for use with RJ45 connectors.

Frame types[edit]

Token[edit]

When no station is sending a frame, a special token frame circles the loop. This special token frame is repeated from station to station until arriving at a station that needs to send data.

Tokens are 3 bytes in length and consist of a start delimiter, an access control byte, and an end delimiter.

Start DelimiterAccess ControlEnd Delimiter
8-bits8-bits8-bits

Abort frame[edit]

Used to abort transmission by the sending station

Data[edit]

Data frames carry information for upper-layer protocols, while command frames contain control information and have no data for upper-layer protocols. Data/command frames vary in size, depending on the size of the Information field.

SDACFCDASAPDU from LLC (IEEE 802.2)CRCEDFS
8 bits8 bits8 bits48 bits48 bitsup to 4500x8 bits32 bits8 bits8 bits
Starting delimiter 
Consists of a special bit pattern denoting the beginning of the frame. The bits from most significant to least significant are J,K,0,J,K,0,0,0. J and K are code violations. Since Manchester encoding is self clocking, and has a transition for every encoded bit 0 or 1, the J and K codings violate this, and will be detected by the hardware. Both the Starting Delimiter and Ending Delimiter fields are used to mark frame boundaries.
JK0JK000
1 bit1 bit1 bit1 bit1 bit1 bit1 bit1 bit
Access control 
This byte field consists of the following bits from most significant to least significant bit order: P,P,P,T,M,R,R,R. The P bits are priority bits, T is the token bit which when set specifies that this is a token frame, M is the monitor bit which is set by the Active Monitor (AM) station when it sees this frame, and R bits are reserved bits.
+Bits 0–2345–7
0PriorityTokenMonitorReservation
Frame control 
A one byte field that contains bits describing the data portion of the frame contents which indicates whether the frame contains data or control information. In control frames, this byte specifies the type of control information.
+Bits 0–1Bits 2–7
0Frame typeControl Bits

Frame type – 01 indicates LLC frame IEEE 802.2 (data) and ignore control bits; 00 indicates MAC frame and control bits indicate the type of MAC control frame

Destination address 
A six byte field used to specify the destination(s) physical address.
Source address 
Contains physical address of sending station. It is a six byte field that is either the local assigned address (LAA) or universally assigned address (UAA) of the sending station adapter.
Data 
A variable length field of 0 or more bytes, the maximum allowable size depending on ring speed containing MAC management data or upper layer information. Maximum length of 4500 bytes.
Frame check sequence 
A four byte field used to store the calculation of a CRC for frame integrity verification by the receiver.
Ending delimiter 
The counterpart to the starting delimiter, this field marks the end of the frame and consists of the following bits from most significant to least significant: J,K,1,J,K,1,I,E. I is the intermediate frame bit and E is the error bit.
JK1JK1IE
11 bit1 bit1 bit1 bit1 bit1 bit1 bit
Frame status 
A one byte field used as a primitive acknowledgement scheme on whether the frame was recognized and copied by its intended receiver.
AC00AC00
1 bit1 bit1 bit1 bit1 bit1 bit1 bit1 bit

A = 1, Address recognized C = 1, Frame copied

Other technical details[edit]

Active and standby monitors[edit]

Every station in a Token Ring network is either an active monitor (AM) or standby monitor (SM) station. There can be only one active monitor on a ring at a time. The active monitor is chosen through an election or monitor contention process.

The monitor contention process is initiated when the following happens:

  • a loss of signal on the ring is detected.
  • an active monitor station is not detected by other stations on the ring.
  • a particular timer on an end station expires such as the case when a station hasn't seen a token frame in the past 7 seconds.

When any of the above conditions take place and a station decides that a new monitor is needed, it will transmit a "claim token" frame, announcing that it wants to become the new monitor. If that token returns to the sender, it is OK for it to become the monitor. If some other station tries to become the monitor at the same time then the station with the highest MAC address will win the election process. Every other station becomes a standby monitor. All stations must be capable of becoming an active monitor station if necessary.

The active monitor performs a number of ring administration functions. The first function is to operate as the master clock for the ring in order to provide synchronization of the signal for stations on the wire. Another function of the AM is to insert a 24-bit delay into the ring, to ensure that there is always sufficient buffering in the ring for the token to circulate. A third function for the AM is to ensure that exactly one token circulates whenever there is no frame being transmitted, and to detect a broken ring. Lastly, the AM is responsible for removing circulating frames from the ring.

Token Ring insertion process[edit]

Token Ring stations must go through a 5-phase ring insertion process before being allowed to participate in the ring network. If any of these phases fail, the Token Ring station will not insert into the ring and the Token Ring driver may report an error.

  • Phase 0 (Lobe Check) — A station first performs a lobe media check. A station is wrapped at the MSAU and is able to send 2000 test frames down its transmit pair which will loop back to its receive pair. The station checks to ensure it can receive these frames without error.
  • Phase 1 (Physical Insertion) — A station then sends a 5 volt signal to the MSAU to open the relay.
  • Phase 2 (Address Verification) — A station then transmits MAC frames with its own MAC address in the destination address field of a Token Ring frame. When the frame returns and if the Address Recognized (AR) and Frame Copied (FC) bits in the frame-status are set to 0 (indicating that no other station currently on the ring uses that address), the station must participate in the periodic (every 7 seconds) ring poll process. This is where stations identify themselves on the network as part of the MAC management functions.
  • Phase 3 (Participation in ring poll) — A station learns the address of its Nearest Active Upstream Neighbour (NAUN) and makes its address known to its nearest downstream neighbour, leading to the creation of the ring map. Station waits until it receives an AMP or SMP frame with the AR and FC bits set to 0. When it does, the station flips both bits (AR and FC) to 1, if enough resources are available, and queues an SMP frame for transmission. If no such frames are received within 18 seconds, then the station reports a failure to open and de-inserts from the ring. If the station successfully participates in a ring poll, it proceeds into the final phase of insertion, request initialization.
  • Phase 4 (Request Initialization) — Finally a station sends out a special request to a parameter server to obtain configuration information. This frame is sent to a special functional address, typically a Token Ring bridge, which may hold timer and ring number information the new station needs to know.

Optional priority scheme[edit]

In some applications there is an advantage to being able to designate one station having a higher priority. Token ring specifies an optional scheme of this sort, as does the CAN Bus, (widely used in automotive applications) - but Ethernet does not.

In the Token Ring priority MAC, 8 priority levels, 0–7, are used. When the station wishing to transmit receives a token or data frame with a priority less than or equal to the station's requested priority, it sets the priority bits to its desired priority. The station does not immediately transmit; the token circulates around the medium until it returns to the station. Upon sending and receiving its own data frame, the station downgrades the token priority back to the original priority.

Here are the following 8 access priority and traffic types for devices that support 802.1Q and 802.1p:

Priority bitsTraffic type
x'000'Normal data traffic
x'001'Not used
x'010'Not used
x'011'Not used
x'100'Normal data traffic (forwarded from other devices)
x'101'Data sent with time sensitivity requirements
x'110'Data with real time sensitivity (i.e. VoIP)
x'111'Station management

Bridging Token Ring and Ethernet[edit]

Bridging solutions for Token Ring and Ethernet networks included the AT&T StarWAN 10:4 Bridge, the IBM 9208 LAN Bridge and the Microcom LAN Bridge. [21] Alternative connection solutions incorporated a router that could be configured to dynamically filter traffic, protocols and interfaces, such as the IBM 2210-24M Multiprotocol Router which contained both Ethernet and Token Ring interfaces.[22]

See also[edit]

References[edit]

  1. ^"IEEE honors Zurich LAN pioneers", Zurich, Switzerland, 14 April 2003
  2. ^"Early Token Ring Work at MIT", J. Noel Chiappa, ieeexplore.ieee.org
  3. ^"A History of Computer Communications 1968-1988", James Pelkey
  4. ^"Local Area Networks", InfoWorld 24 Mar 1986
  5. ^IEEE Standards: P802.5 Working Group Area. Ieee802.org. Retrieved on 2011-10-30.
  6. ^"IEEE 802.3 Local Area Network considerations", IBM document GG22-9422-0
  7. ^David R. Boggs; Jeffrey C. Mogul; Christopher A. Kent (1988). "Measured capacity of an Ethernet: myths and reality"(PDF). ACM SIGCOMM Computer Communication Review. 25 (1): 123–136. doi:10.1145/205447.205460. 
  8. ^"ETHERNET VS. TOKEN RING IN THE LOCAL AREA NETWORKING BUSINESS", URS VON BURG AND MARTIN KENNY, Industry and Innovation, Volume 10, Number 4, 351–375, December 2003
  9. ^ ab"TR00.book"(PDF). Redbooks.ibm.com. Retrieved 2016-08-03. 
  10. ^IEEE 802.5 activities. Ieee802.org. Retrieved on 2011-10-30.
  11. ^Louis Ohland. "8228 Multistation Access Unit". Ps-2.kev009.com. Retrieved 2016-08-03. 
  12. ^"What is the difference between an Ethernet hub and switch?". Retrieved 10 May 2016. 
  13. ^"A Passive Ethernet Hub". Zen22142.zen.co.uk. Retrieved 2016-08-03. 
  14. ^"networking - Duplicate MAC address on the same LAN possible?". Server Fault. 2013-01-03. Retrieved 2016-08-03. 
  15. ^"Does anyone actually still USE Token Ring?", John Sheesley, April 2, 2008, TechRepublic
  16. ^Bux, W. (1989). "Token-ring local-area networks and their performance". Proceedings of the IEEE. 77 (2): 238. doi:10.1109/5.18625. 
  17. ^ ab"Whu buy from IBM?"(PDF). Ps-2.kev009.com. Retrieved 2016-08-03. 
  18. ^Louis Ohland. "8226". Ps-2.kev009.com. Retrieved 2016-08-03. 
  19. ^"IBM 8230 Controlled access Unit"(PDF). Public.dhe.ibm.com. Retrieved 2016-08-03. 
  20. ^"Local Area Networks - Token Ring". Scottsnetworkclass.com. Retrieved 2013-06-15. 
  21. ^"Network World". Books.google.ca. 1991-06-03. p. 56. Retrieved 2016-08-03. 
  22. ^"SG244446"(PDF). Ps-2.kev009.com. Retrieved 2016-08-03. 
General
  • Castelli, Matthew (2002). Network Consultants Handbook. Cisco Press. ISBN 1-58705-039-0. 
  • Gallo, Michael; Hancock, William M. (2001). Networking Explained. Digital Press. ISBN 1-55558-252-4. 

External links[edit]

Wikimedia Commons has media related to Token ring.
Two examples of Token Ring networks: a) Using a single MAU b) Using several MAUs connected to each other
IBM hermaphroditic connector with locking clip
The IBM 8228 Multistation Access Unit with accompanying Setup Aid to prime the relays on each port
Both Token ring and Ethernet interfaces on the 2210-24M

What are Ethernet, Token Ring, FDDI, and Wireless?

  • Length: 941 words (2.7 double-spaced pages)
  • Rating: Excellent
Open Document

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - More ↓
Introduction
Have you ever listened or sat in on a concept or network design meeting and been fed an alphabet soup of acronyms and words or technical jargon that just didn’t make sense to you? Well, the chances are that Ethernet, Token Ring, FDDI, and Wireless were among some of those being spoken.
In this writing, the author plans to help one understand, in simple terms (where possible), what exactly these technologies are and where they may belong. He provides an overview of each, explains the differences between them, and outlines the advantages and disadvantages of using them. His goal is to provide you, the reader, with the ability to understand at a high-level what these technologies are, and how they can be used.

What are Ethernet, Token Ring, FDDI, and Wireless?
They are all Local Area Network (LAN) technologies or standards for communication across different medium. In the past decades the essence of internetworking has vastly increased. As always, demand breeds supply, and several different LAN technologies have emerged. LANs can be implemented in several ways. They can be divided into several subgroups based on e.g. physical implementation or standardized technologies. Choosing the right kind of LAN solution for a particular purpose always depends on several issues, e.g. size of the network, location of the terminals, and cost. Let us look a little deeper in the details.
Ethernet
Ethernet is the most widely used local area network (LAN) technology. The original and most popular version of Ethernet supports a data transmission rate of 10 Mb/s. Newer versions of Ethernet called "Fast Ethernet" and "Gigabit Ethernet" support data rates of 100 Mb/s and 1 Gb/s (1000 Mb/s). An Ethernet LAN may use coaxial cable, special grades of twisted pair wiring, or fiber optic cable. "Bus" and "Star" wiring topologies are supported. Ethernet devices compete for access to the network using a protocol called Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

Token Ring & Fiber Distributed Data Interface (FDDI)
Ethernet CSMA/CD networks provide a relatively simple way of passing data. However, many industry observers correctly note that CSMA/CD breaks down under the pressure exerted by many computers on a network segment. These observers are correct; the constant contention for bandwidth that is part and parcel of Ethernet does not always scale efficiently.
In an attempt to circumvent this problem, IBM and the IEEE created another networking standard called 802.5. IEEE 802.5 is more commonly identified with token ring; FDDI also uses the 802.

How to Cite this Page

MLA Citation:
"What are Ethernet, Token Ring, FDDI, and Wireless?." 123HelpMe.com. 13 Mar 2018
    <http://www.123HelpMe.com/view.asp?id=56663>.

LengthColor Rating 
Wireless Sensor Network Essay - ... Unreliable communication occurs due to connectionless packet based routing in wireless sensor network. Even if channel is reliable it leads to unreliable communication due to broadcast nature of wireless sensor network it leads conflict .Network congestion, multi hop routing and node processing lead to more latency in wireless sensor network[2]. Unreliable transfer: Due to packet based routing a connectionless transfer of formation occur in wireless sensor network it makes connection is highly unreliable....   [tags: topologies, monitoring, data integrity]1657 words
(4.7 pages)
Term Papers[preview]
The Evolution Ethernet Essay - Ethernet is a household of processor interacting machineries for local area networks. Ethernet was brought to light in 1980 and consistent in 1983 as IEEE 802.3. Ethernet has basically substituted rival online local area network machineries such as token ring, FDDI, and ARCNET. The Ethernet ethics include some cabling and beckoning alternates of the OSI physical layer in use with Ethernet. The unique 10BASE5 Ethernet recycled coaxial cable as a collective medium. Well along the coaxial cables remained exchanged with twisted pair and fiber optic contacts in combination with hubs or switches....   [tags: Ethernet Technology]
:: 18 Works Cited
2562 words
(7.3 pages)
Strong Essays[preview]
Essay on Explaining a Wireless Connection Network - Wireless connection network is great. It allows us to check e-mail while waiting on an airplane we can simple take our simply tale a laptop outside and the afternoon and work on a bright and sunny day while enjoying the day. Unfortunately with all the benefits of having a wireless networks can sometime infuriate you at times. Disconnection can have cursing at your computer while threatening to throw it across the room into a wall it is more annoying when you don’t have control over the hardware broadcasting the signal....   [tags: Wireless, internet, ]825 words
(2.4 pages)
Better Essays[preview]
Wired and Wirless Technology Essay - The basic concept of wired and wireless technology is radio frequency versus wired endpoint connectivity, both requiring hardware and network connectivity. Organizations or moreover home networks can choose a completely wired or wireless network. Wireless networks allow users to become more mobile, however speeds are not as proficient as wired, therefore many companies choose a wired and wireless network configuration, see Figure 3, Wired and Wireless Network Configuration for architecture details....   [tags: wired broadband, wireless network]
:: 12 Works Cited
1124 words
(3.2 pages)
Strong Essays[preview]
Survey of Wireless Computing Essay - Survey of Wireless Computing Abstract Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set of operations that must be carried out efficiently on demand....   [tags: Wireless Technology Networks Computers Essays]
:: 12 Works Cited
4792 words
(13.7 pages)
Strong Essays[preview]
Network Topologies Essay example - Mesh, Bus, Ring and Star topologies The term Topology refers to the physical or logical shape or layout of a network. Communication between different nodes within a network is determined by its topology. Mesh, Bus, Ring and Star are four of the most common network topologies, each with advantages and disadvantages in relation to each other. Mesh Topology The Mesh topology is true to its name in that there are multiple redundant interconnections between network nodes. A mesh network can employ one of two connection arrangements, full mesh or partial mesh....   [tags: Network Topology]1391 words
(4 pages)
Strong Essays[preview]
Essay about Terms - Mesh, Bus, Ring, and Star are all types of a topology. Each of these types of topology is used for specific network’s but some networks can uses any combination of the four. A mesh topology has each station connected to the others. This network is more difficult to set up but provides a great deal of performance and reliability. In a Mesh network if a segment of the network is broken, then the packet being sent will find an alternate route to its destination. Mesh are used in Wide Area Networks (WANs) where reliability is important, this is used were the network is small....   [tags: essays research papers]667 words
(1.9 pages)
Strong Essays[preview]
The Ethernet Essay - Bob Metcalfe of the Xerox Corporation developed the first experimental Ethernet system in late 1972. The goal of the Ethernet was to interconnect the Xerox Alto Aloha Network. The experimental Ethernet was used to link Altos workstations, servers, and laser printers. Data transmission of the Ethernet was 2.94 Mbps. In 1973, Metcalfe changed the name to "Ethernet," to make it clear that the system could support any computer, and not just Altos, and to point out that his new network mechanisms had evolved well beyond the Aloha system....   [tags: essays research papers]2471 words
(7.1 pages)
Powerful Essays[preview]
Metro Ethernet Essay - Metro Ethernet Disclaimer; this is intended to be an introductory technical article; certain details have been excluded in the interests of space and clarity. Network design examples are presented to illustrate specific technical points and are not intended to fully complete. Historically WAN’s (Wide Area Networks) and LAN’s (Local Area Networks) have relied on independent technologies. At a physical layer WAN technologies today continue to be based largely on legacy TDM systems that were built initially to support voice, video and early data communications in a reliable fashion....   [tags: essays research papers]1622 words
(4.6 pages)
Strong Essays[preview]
Ethernet Essay - Networking is another way that advances in computer engineering and software has paved a way for the advancement of communication, industry, and our lives in general through technological advancements. Just as the utilization of fire and carving of the wheel gave us advantages over the perils of life, the networking of computers has brought an unreachable far off world closer to each and every one of us. First and foremost we are now able to nearly instantaneously share information with an unreachable world....   [tags: Technology Networks]1405 words
(4 pages)
Strong Essays[preview]

Related Searches

Local Area         Optic Cable         Ethernet         An Overview         Network Design         Multiple         Carrier         Choosing         Meeting         Chances        




5 method of moving data around networks.
Token ring works very differently from Ethernet. In Ethernet, any computer on a given network segment can transmit until it senses a collision with another computer. In token ring and FDDI networks, by contrast, a single special packet called a token is generated when the network starts up and is passed around the network. When a computer has data to transmit, it waits until the token is available. The computer then takes control of the token and transmits a data packet. When it is done, it releases the token to the network, and the next computer grabs the token if it has data to transmit
In comparison to the contentious nature of Ethernet; token ring and FDDI appear quite civilized. These two logical topologies do not have collisions in which multiple stations try to send data; instead, every computer waits its turn.
Although similar to Token Ring; FDDI uses dual-ring architecture with traffic on each ring flowing in opposite directions (called counter-rotating). The dual rings consist of a primary and a secondary ring. During normal operation, the primary ring is used for data transmission, and the secondary ring remains idle. The primary purpose of the dual rings is to provide superior reliability and robustness.

Wireless
This is a technology that provides the ability to send data between computing devices without the need for cables. The most common form of wireless technology of recent years has been IEEE 802.11x (Wi-Fi standard for Wireless LAN (WLAN) applications.)
Wi-Fi has become increasingly popular; enabling people to link computers to wireless LANs, either to give greater flexibility in offices, to reduce cost by not having to install wired networks, or simply to access a computer when using a “hotspot” in a coffee shop of Internet Café, this technology has become a major force in the wireless industry.
Another well-known wireless technology is “Bluetooth.” One would typically be involved with this technology when using hand held devices such as cell phones and Personal Digital Assistants (PDA.) Among other things, it provides the ability to un-tether one’s self from the often inconvenient need for head-phone wires. This is accomplished by using a “Bluetooth” capable cell-phone and an equally capable earpiece. Although still quite large, it is often preferred over the alternative.

Conclusion
Each of the aforementioned technologies has their place, and each appears to have been developed to overcome weaknesses in the other.
Ethernet is the most widely used and understood. It is typically used to provide both backbone traffic and local workstation access, Token Ring and FDDI networks are not used so much for workstation access, but are more commonly recognized as robust backbone technologies or protocols.
In recent years it has become apparent that being restricted to physical medium is not going to help improve our ability to be more effective or mobile. Although it has a long way to go, I believe wireless to be the way of the future at least for user access to backbone networks. Maybe sometime in the not too distant future we will all connect to an invisible global network to share our ideas, play games, and convenience our lives



0 thoughts on “Ethernet Vs Token Ring Essays About Life”

    -->

Leave a Comment

Your email address will not be published. Required fields are marked *