Penguin

Differences between current version and previous revision of TokenRing.

Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History

Newer page: version 3 Last edited on Wednesday, October 15, 2003 4:42:59 pm by CraigBox
Older page: version 2 Last edited on Wednesday, October 15, 2003 4:39:14 pm by CraigBox Revert
@@ -1,5 +1,5 @@
-__Token Ring:__ A hardware layer network protocol described in IEEE 802.5 definition. The Token Ring network was originally developed by IBM in the 1970s. It is still IBM's primary local-area network ([LAN]) technology. The related IEEE 802.5 specification is almost identical to and completely compatible with IBM's Token Ring network. In fact, the IEEE 802.5 specification was modeled after IBM [ Token Ring] , and it continues to shadow IBM's Token Ring development. 
+__Token Ring:__ A hardware layer network protocol described in IEEE 802.5 definition. The Token Ring network was originally developed by IBM in the 1970s. It is still IBM's primary local-area network ([LAN]) technology. The related IEEE 802.5 specification is almost identical to and completely compatible with IBM's Token Ring network. In fact, the IEEE 802.5 specification was modeled after IBM Token Ring, and it continues to shadow IBM's Token Ring development. 
  
 Token Ring and IEEE 802.5 networks are basically compatible, although the specifications differ in minor ways. IBM's Token Ring network specifies a star, with all end stations attached to a device called a multistation access unit ([MSAU]). In contrast, IEEE 802.5 does not specify a topology, although virtually all IEEE 802.5 implementations are based on a star. Other differences exist, including media type (IEEE 802.5 does not specify a media type, although IBM Token Ring networks use twisted-pair wire) and routing information field size. 
  
 Token Ring and IEEE 802.5 are two principal examples of token-passing networks ([FDDI] is the other). Token-passing networks move a small frame, called a token, around the network. Possession of the token grants the right to transmit. If a node receiving the token has no information to send, it passes the token to the next end station. Each station can hold the token for a maximum period of time.