How do token passing algorithms work




















Before you go through this article, make sure that you have gone through the previous article on Access Control. Before discussing Token Passing, let us discuss few important concepts required for the discussion. Bit delay is the time for which a station holds the bit before transmitting to the other side.

Token Holding Time is the time for which a station holds the token before transmitting to the other side. The following diagram illustrates these steps for station Same procedure is repeated at every station. Watch this Video Lecture. Get more notes and other study material of Computer Networks. Computer Networks. Access Control in Networking- Before you go through this article, make sure that you have gone through the previous article on Access Control.

Token Passing Token Ring in Networking. Change Language. Related Articles. Computer Network Fundamentals. Physical layer. Data Link layer. Network layer. Transport layer. Application layer. Network Security. Computer Network Quizes. Table of Contents.

Save Article. Improve Article. Like Article. Next Error Detection in Computer Networks. Recommended Articles. Article Contributed By :. Easy Normal Medium Hard Expert. Writing code in comment?



0コメント

  • 1000 / 1000