Technical IBM Token Ring Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

IBM Token Ring. The writer explores the history of the token ring, its functions and its future. The writer also discusses some of the trouble shooting methods that are used to correct any problems.


International Business Machines (IBM) has been on the leading edge of technology since the explosi0on began. The technological explosion that has occurred in the last four decades has taken mankind to heights it never knew was possible. IBM has been a leader in the industry since the industry was born. IBM began its journey into success in the early 1900's and has been re-inventing the wheel since then. One of the most advanced inventions in IBM's history was the invention of the token ring. The token ring created a level in the world of technology that has served as a building block for many other technological advances.

Before one can fully understand the impact of the token ring one must first have a grasp of its history and importance in the history of technology. The token ring was first introduced to the world in the year 1970. IBM brought its product to the market after many tests and reports as to its use and viability for the market place. It was such an important advancement in the world of technology that it is still IBM's primary local area network (LAN) today. The IEEE 802.5 shares a complete compatible with the IBM token ring which also makes the token ring a highly marketable product. Some of the aspects that are important to understand about the IBM token ring include:

Data rates (4.16)

Stations segments (290/72) ology (Star)

Media (Twisted Pair)

Signaling (Baseband)

Access Method (Token Passing)

Encoding (Differential Manchester)

The token ring operates as a token passing network by moving a small frame that is called a token around the network. When one possesses the token one obtains the right to transmit around the network using the system. Receiving nodes are designed to pass the information further around the network if when it receives the information it has no information. The token is passes around to different stations and each token can hold the information for a stored predetermined amount of time before it must pass it on to the next station in the network. If one wanted to compare the token to an understandable no technical term it could be best compared to a building block with additions. When the token is passed from station to station an exact process takes place to process it around the network, The token is sent to the first station and the station will hold it for the predetermined amount of time. If the station has any information to contribute to the network need that information is added to the token by changing one of the bits in the token. When this occurs at the first station it is referred to as the beginning of a start-of-frame sequence. Once this occurs the information has been appended and the token is then sent to the next station for the same process. If the next station does not have an additional information to add to the token is quickly passed to the next station and the process continues until all the information has been placed on the token and utilized for the purpose it was intended.

The system is designed in such a manner that a collision of information on the network system is a virtual impossibility. This is because as information is being processed and added to the token as it makes its way around the network no other addition to a token can be done. This means that if others want to add information to the network as it moves around each station the others have to wait. This is an important aspect of the token ring system because the inability to collide means the prevention of potential problems within the network system. The system is also designed for an early token release ability. This means if a station receives a token and the station does not have any new information to apply to the token the station is able and authorized to perform an early…[continue]

Cite This Term Paper:

"Technical IBM Token Ring" (2002, September 27) Retrieved December 11, 2016, from

"Technical IBM Token Ring" 27 September 2002. Web.11 December. 2016. <>

"Technical IBM Token Ring", 27 September 2002, Accessed.11 December. 2016,

Other Documents Pertaining To This Topic

  • Technical Document for Hans Tech

    6: Existing Cable and Wireless Design The company will establish wireless access using the LWAP (lightweight access point). The LWAP will be distributed to all the facilities through the WLS. Typically, WLS will be installed to assist in providing the traffic tunnel and failover authentication. To enhance the security of the WLAN, the company will install the encryption system at the wireless access point, the encryption protocols will contain WPA/WPA2, and

  • LAN and WAN Analysis Current Release OS

    LAN and WAN Analysis Current Release OS X Mountain Lion Linux kernel 3.4; GNU C. Library Windows Server 2008 R2 (NT 6.1.7600) S-Net SP IBM AIX Variant (UNIX System V Release Range of compatible hardware Low Performance High for fine-tuned applications to the processor and O.S. API calls (1) Very High for natively-written applications Medium for applications using emulation mode; very high for 64-bit applications Slow for applications emulating MS-Windows; fast for direct API-call based applications Very high for applications written directly to the UNIX

  • Internet Business Proposal & Implementation

    With the widespread use of such technologies, we require greater understanding of the personal and social attributes that affect why people use computer-mediated communication (CMC) and the outcomes of CMC-related behavior." (Papacharissi & Rubin, 2000) Barriers and Issues The most fundamental concern in the refurbishment building's networking and VoIP proposal is also the industry's most basic barriers to accomplishing the goal of networking success. In other words, instituting a highly efficient

Read Full Term Paper
Copyright 2016 . All Rights Reserved