
- DCN Tutorial
- Data Comm & Networks Home
- DCN - Overview
- DCN - Computer Network Types
- DCN - Network LAN Technologies
- DCN - Computer Network Topologies
- DCN - Computer Network Models
- DCN - Computer Network Security
- Physical Layer
- DCN - Physical Layer Introduction
- DCN - Digital Transmission
- DCN - Analog Transmission
- DCN - Transmission media
- DCN - Wireless Transmission
- DCN - Multiplexing
- DCN - Network Switching
- Data Link Layer
- DCN - Data Link Layer Introduction
- DCN - Error detection and Correction
- DCN - Data Link Control & Protocols
- Network Layer
- DCN - Network Layer Introduction
- DCN - Network Addressing
- DCN - Routing
- DCN - Internetworking
- DCN - Network Layer Protocols
- Transport Layer
- DCN - Transport Layer Introduction
- DCN - Transmission Control Protocol
- DCN - User Datagram Protocol
- Application Layer
- DCN - Application Layer Introduction
- DCN - Client-Server Model
- DCN - Application Protocols
- DCN - Network Services
- DCN Useful Resources
- DCN - Quick Guide
- DCN - Useful Resources
Token Passing in Bit-Map Protocol
Bit-map protocol is a collision free protocol that operates in the Medium Access Control (MAC) layer of the OSI model. It resolves any possibility of collisions while multiple stations are contending for acquiring a shared channel for transmission. In this protocol, if a station wishes to transmit, it broadcasts itself before the actual transmission. Every station gets its turn for transmission in a predefined order. A method to accomplish this is to use the method of token passing.
Token Passing Mechanism
A token is a small message that circulates among the stations of a computer network providing permission to the stations for transmission. If a station has a frame to transmit when it receives a token, it sends the frame and then passes the token to the next station; otherwise it simply passes the token to the next station.
For token passing mechanism to operate, the stations should be connected in a single ring as shown in the following diagram −
In the above configuration, passing the token comprise of receiving the token from the preceding station and transmitting to the successor station. The data flow is unidirectional in the direction of the token passing. The token may be generated by the station that wants to send the frame or the station that wants to receive the frame. In order that tokens are not circulated infinitely, they are removed from the network once their purpose is completed.
Performance Analysis
The performance is similar to conventional bit map protocol. If N number of stations are in the token ring, the waiting time of each station is (N – 1). The advantage of this protocol over bit map protocol is that all the stations have equal priority for transmission.
- Related Articles
- Bit-Map Protocol
- What is Bit Map protocol in computer networks?
- Map a 10-bit number to 8-bit in Arduino
- A One-Bit Sliding Window Protocol
- What is three-bit sliding window protocol?
- Token Bus and Token Ring
- Difference between Token Bus Network and Token Ring Network
- What is early token release and delayed token release?
- What is CSRF token in Django?
- What is accounting token?
- Stringize and Token-pasting operator in C
- Token Bus (IEEE 802.4) Network
- What is Token Bucket algorithm in computer networks?
- Using djoser in Django for token authentication without views
- Protocol and Protocol Hierarchies
