[Contents] [Back] [<< Prev] [Next >>]

Token Passing

Token passing utilizes a frame called a token, which circulates around the network. A computer that needs to transmit must wait until it receives the token, at which time the computer is permitted to transmit. When the computer is finished transmitting, it passes the token frame to the next station on the network. Figure 4.2 shows how token passing is implemented on a Token Ring network. Token Ring networks are discussed in greater detail later in this chapter in the section titled “Token Ring.”

Several network standards employ token passing access control:
Token-passing methods can use station priorities and other methods to prevent any one station from monopolizing the network. Because each computer has a chance to transmit each time the token travels around the network, each station is guaranteed a chance to transmit at some minimum time interval.


[note.gif]

Token passing is more appropriate than contention under the following conditions: