Site home page
Get alerts when Linktionary is updated
Book updates and addendums
Get info about the Encyclopedia of Networking and Telecommunicatons, 3rd edition (2001)
Download the electronic version of the Encyclopedia of Networking, 2nd edition (1996). It's free!
Contribute to this site
Electronic licensing info
Token and Token-Passing Access Methods
Note: Many topics at this site are reduced versions of the text in "The Encyclopedia of Networking and Telecommunications." Search results will not be as extensive as a search of the book's CD-ROM.
A token is a special control frame on token ring, token bus, and FDDI (Fiber Distributed Data Interface) networks that determines which stations can transmit data on a shared network. The node that has the token can transmit. Unlike contention-based networks, such as Ethernet, workstations on token-based networks do not compete for access to the network. Only the station that obtains the token can transmit. Other stations wait for the token rather than trying to access the network on their own. On Ethernet networks, "collisions" occur when two or more workstations attempt to access the network at the same time. They must back off and try again later, which reduces performance-especially as the number of workstations attached to a network segment increases.
In token ring networks, a station takes possession of a token and changes one bit, converting the token to a SFS (start-of-frame sequence). A field exists in the token in which workstations can indicate the type of priority required for the transmission. The priority setting is basically a request to other stations for future use of the token. The other stations compare a workstation's request for priority with their own priority levels. If the workstation's priority is higher, the other stations will grant the workstation access to the token for an extended period.
Copyright (c) 2001 Tom Sheldon and Big Sur Multimedia.