Examples of using Token ring in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Like token ring, FDDI also has error-detection and correction capabilities.
FDDI uses a token passing access method similar to token ring.
Ethernet and token ring interfaces have been used for years.
Although FDDI logical topology is a ring-based token network,it does not use the IEEE 802.5 token ring protocol as its basis;
Token ring resolves this uncertainty by requiring that stations take turns sending data.
IBM launched their own proprietary token ring product on October 15, 1985.
At the time, high-speed engineering workstations were beginning to tax the bandwidth of existing local-area networks(LANs)based on Ethernet and Token Ring.
Technology Tend to use certain connectivity technologies,primarily Ethernet and Token Ring WANs tend to use technologies like MPLS, ATM, Frame Relay and X.
Protective devices with RJ45 connection, where all eight signal paths are protected, are universally suited to the Ethernet,PROFINET and token ring interfaces.
IBM's Token Ring was open in theory, but Metcalfe has said that in reality, non-IBM Token Ring equipment seldom worked with IBM computers.
Bridging is a technology using which two or more local area networks that use same protocols,like Ethernet or token ring, can be aggregated together.
During this time, IBM argued strongly that Token Ring LANs were superior to Ethernet, especially under load,[6] but these claims were fiercely debated.[7].
Since L2 Switch supports multiple interface types, it can be even used to connect segments of aLAN with different technologies(e.g. a Ethernet segment and a Token ring segment).
In addition to CSMA/CD, Token Ring(supported by IBM) and Token Bus(selected and henceforward supported by General Motors) were also considered as candidates for a LAN standard.
For example, before you built a network and started downloading network cards and cabling, you had to decide if you were going to use Ethernet,coaxal Ethernet, Token Ring, Arcnet, or one of the other networking standards of the time.
IBM launched their own proprietary Token Ring product on October 15, 1985.[4] It ran at 4 Mbit/s, and attachment was possible from IBM PCs, midrange computers and mainframes.
Cat 5 cables are often used in structured cabling for computer networks such as Fast Ethernet, although they are also used to carry many othersignals such as basic voice services, token ring, and ATMat up to 155 Mbit/s.
FDDI offers both a Dual-Attached Station(DAS), counter-rotating token ring topology and a Single-Attached Station(SAS), token bus passing ring topology.[1].
In the past ARCNET, Token Ring and other standards have been used, but nowadays Ethernet over twisted pair cabling, and Wi-Fi are the two most commonly used technologies.
Although FDDI logical topology is a ring-based token network,it did not use the IEEE 802.5 token ring protocol as its basis; instead, its protocol was derived from the IEEE 802.4 token bus timed token protocol.
ARCNET, Token Ring and other technologies have been used in the past, but Ethernet over twisted pair cabling and Wi-Fi are the two most common technologies currently in use.
The VTAM/NCP PU type 2 definition becomes a Switched Major Node that can be local to VTAM(without an NCP), and a"Line" connection can bedefined using various possible solutions(such as a Token Ring interface on the 3745, a 3172 Lan Channel Station, or a Cisco ESCON-compatible Channel Interface Processor).
ARCNET, Token Ring and other technology requirements have been used in the past, but Ethernet over twisted pair cabling, and Wi-Fi are the 2 most typical technologies at the moment used to build LANs.
In 1988 the faster 16 Mbit/s Token Ring was standardized by the 802.5 working group,[8] and an increase to 100 Mbit/s was standardized and marketed during the wane of Token Ring's existence.
In a token ring network, the presence of a token(which is simply a particular bit setting) in a continually circulating transmission stream allows a device to change the bit setting(thus taking the token) and put a message in its place.
The receiver of the message elsewhere in the token ring network removes the message and resets the bit setting(thus putting thetoken back) so that someone else in the ring of devices will be able to have a turn at using that message space.
In a token ring network, the presence of a token(which is simply a particular bit setting) in a continually circulating transmission stream allows a device to change the bit setting(thus taking the token) and put a message in its place.
The receiver of the message elsewhere in the token ring network removes the message and resets the bit setting(thus putting the token back) so that someone else in the ring of devices will be able to have a turn at using that message space.
