answersLogoWhite

0


Best Answer

by using tokens

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How do workstations in a ring topology negotiate which node has the authority to transmit data at any given time?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

In ring topology what protocol should use to transmit data?

casfas


Which network topology provides a redundant path to transmit data?

bus


What is a logical network designtopology?

Also called signal topology. Every LAN has a topology, or the way that the devices on a network are arranged and how they communicate with each other. The way that the workstations are connected to the network through the actual cables that transmit data -- the physical structure of the network -- is called the physical topology. The logical topology, in contrast, is the way that the signals act on the network media, or the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. Logical topologies are bound to the network protocols that direct how the data moves across a network. The Ethernet protocol is a common logical bus topology protocol. LocalTalk is a common logical bus or star topology protocol. IBM's Token Ring is a common logical ring topology protocol. A network's logical topology is not necessarily the same as its physical topology. For example, twisted pair Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token Ring is a logical ring topology, it is physically set up in a star topology.


Cables used in a star topology?

A star topology is a method of connecting several computers to one another in a network. The cables used in a star topology are twisted pair cables or coaxial cables. Coaxial cables would be the cheapest solution.


Which statements describe the logical token-passing topology?

Computers are allowed to transmit data only when they possess a token.Electronic tokens are passed sequentially to each other.


What is difference between topology and protocol?

Network topology is the physical design of a LAN which resolves the conflict that occurs between computers on the network attempting to transmit at the same time. Whereas protocols are the standards used by networks to permit communication between network-connected devices. -s74


Why you should use a straight through cable when connecting two unlike devices?

because it makes sense to use a straight cable, as they are two unlike devices.


What are the various topology of WAN and what is the drawback in BUS topology?

there are a few different topologies when you are talking about WAN's but remember WAN's topologies are different than LAN's because of the area they cover. But there are bus wan, ring wan, star wan, full mesh wan, partial mesh wan, and tiered wan. as far as a drawback to bus topology is that each site in the wan bus topolgy depends on every other site in the network to transmit and receive its traffic.


How do you xxplain the process of non-deterministic MAC?

MAC Protocols will define MAC and provide examples of deterministic and non-deterministic MAC protocols. MAC refers to protocols that determine which computer in a shared-media environment, or collision domain, is allowed to transmit data. MAC and LLC comprise the IEEE version of the OSI Layer 2. MAC and LLC are sublayers of Layer 2. The two broad categories of MAC are deterministic and non-deterministic. Examples of deterministic protocols include Token Ring and FDDI. In a Token Ring network, hosts are arranged in a ring and a special data token travels around the ring to each host in sequence. When a host wants to transmit, it seizes the token, transmits the data for a limited time, and then forwards the token to the next host in the ring. Token Ring is a collisionless environment since only one host can transmit at a time. Non-deterministic MAC protocols use a first-come, first-served approach. CSMA/CD is a simple system. The NIC listens for the absence of a signal on the media and begins to transmit. If two nodes transmit at the same time a collision occurs and none of the nodes are able to transmit. Three common Layer 2 technologies are Token Ring, FDDI, and Ethernet. All three specify Layer 2 issues, LLC, naming, framing, and MAC, as well as Layer 1 signaling components and media issues. The specific technologies for each are as follows: • Ethernet - uses a logical bus topology to control information flow on a linear bus and a physical star or extended star topology for the cables • Token Ring - uses a logical ring topology to control information flow and a physical star topology • FDDI - uses a logical ring topology to control information flow and a physical dual-ring topology


How can a physically connected star hub logically be considered a bus network?

in the star topology central system switch or hub act as a central devices and if it fails whole the system will fail, in star topology if one station only transmit at a time other wise the collision will occur and it will broadcast the data like a bus.so it contains the properties like bus that's why said that it is logically a bus


How do headlice transmit aids?

No they do not transmit HIV.


What part of speech is transmit?

Transmit is a verb.