{"id":318,"date":"2020-08-18T19:23:47","date_gmt":"2020-08-18T20:23:47","guid":{"rendered":"http:\/\/www.linux-tutorial.info\/?page_id=77"},"modified":"2020-08-22T19:26:40","modified_gmt":"2020-08-22T20:26:40","slug":"this-is-the-page-title-toplevel-153","status":"publish","type":"page","link":"http:\/\/www.linux-tutorial.info\/?page_id=318","title":{"rendered":"Token-Ring"},"content":{"rendered":"\n<title>Token-Ring<\/title>\n<question id=\"408\" text=\"Token gets its name from the 'token' which determines which machine get to use the network at any given moment.\" \/>\n<p>\nToken-ring, developed by IBM, is embodied in the IEEE standard 802.5. The key concept in this\ntype of <glossary>network<\/glossary> is the idea of a <glossary>token<\/glossary>.\nThis is similar to a baton in a relay race when each machine must receive the token before it is allowed to go. If a particular machine has nothing to send, it simply passes the token on to the\nnext machine. If it does have something to send, the message is &#8220;linked&#8221; with the token before it is\nsend. By seeing the token linked to the message, the other machines know that the token is in use\nand pass it along to the destination. When the destination machine gets the entire bundle, it puts\nthe token back on the network, with a tag to indicate that it received the\n<glossary>packet<\/glossary>. It is then passed to the originator as an acknowledgment. The\noriginator then passes the token along to the next machine.\n<\/p>\n<p>\nThis scheme provides guaranteed access to the <glossary>network<\/glossary>\nsince every machine will eventually get the <glossary>token<\/glossary>.\n Even if the originator of one <glossary>packet<\/glossary>\nhas more to send, once it gets its acknowledgment back, it must pass the token along. If no others\nwant to  send anything, then it can come back to the first machine. However, the others were given\nthe <em>chance <\/em>to send something. This method also provides reliability since the destination\nmachine sends the packet back with an acknowledgment.\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Token-Ring Token-ring, developed by IBM, is embodied in the IEEE standard 802.5. The key concept in this type of network is the idea of a token. This is similar to a baton in a relay race when each machine must &hellip; <a href=\"http:\/\/www.linux-tutorial.info\/?page_id=318\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-318","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/pages\/318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=318"}],"version-history":[{"count":1,"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/pages\/318\/revisions"}],"predecessor-version":[{"id":767,"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=\/wp\/v2\/pages\/318\/revisions\/767"}],"wp:attachment":[{"href":"http:\/\/www.linux-tutorial.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}