Engineering:Token passing
On a local area network, token passing is a channel access method where a packet called a token is passed between nodes to authorize that node to communicate.[1][2][3] In contrast to polling access methods, there is no pre-defined "master" node.[4] The most well-known examples are IBM Token Ring and ARCNET, but there were a range of others, including FDDI (Fiber Distributed Data Interface), which was popular in the early to mid 1990s. Token passing schemes degrade deterministically under load, which is a key reason why they were popular for industrial control LANs such as MAP, (Manufacturing Automation Protocol).[5] The advantage over contention based channel access (such as the CSMA/CD of early Ethernet), is that collisions are eliminated, and that the channel bandwidth can be fully utilized without idle time when demand is heavy.[6] The disadvantage is that even when demand is light, a station wishing to transmit must wait for the token, increasing latency.
Some types of token passing schemes do not need to explicitly send a token between systems because the process of "passing the token" is implicit. An example is the channel access method used during "Contention Free Time Slots" in the ITU-T G.hn standard for high-speed local area networking using existing home wires (power lines, phone lines and coaxial cable).[citation needed]
See also
References
- ↑ Sheldon, Tom. "Token and Token-Passing Access Methods". http://www.linktionary.com/t/token_access.html. Retrieved 8 July 2017.
- ↑ Littlejohn Shinder, Debra (2001). Computer Networking Essentials. Cisco Press. p. 123. ISBN 978-1587130380. https://books.google.com/books?id=ZMizSUW7XF4C&q=token+passing&pg=PA123. Retrieved 8 July 2017.
- ↑ Savage, Stefan. "Lecture 6: Media Access Control". UC San Diego. https://cseweb.ucsd.edu/classes/fa11/cse123-a/123f11_Lec6.pdf. Retrieved 8 July 2017.
- ↑ DiNicolo, Dan. "Essential Network Concepts Part 3". http://www.securitypronews.com/essential-network-concepts-part-3-2004-03. Retrieved 9 July 2017.
- ↑ "Token Bus (IEEE 802.4)". https://www.technologyuk.net/telecommunications/networks/token-bus.shtml. Retrieved 8 July 2017.
- ↑ Hura, Gurdeep (2001). Data and Computer Communications: Networking and Internetworking. CRC Press. p. 327. ISBN 978-0849309281. https://books.google.com/books?id=c0z7d9S82EsC&q=token+deterministic&pg=PA327.
Original source: https://en.wikipedia.org/wiki/Token passing.
Read more |