scispace - formally typeset
Search or ask a question
Topic

Token ring

About: Token ring is a research topic. Over the lifetime, 1597 publications have been published within this topic receiving 23206 citations.


Papers
More filters
Book
01 Jan 1993
TL;DR: The full treatment of competing approaches of LAN and MAN technologies is included, including complete treatment of standards: IEEE 802 and ANSI standards, specifications from the ATM forum and the Fibre Channel Association, plus TCP/IP.
Abstract: From the Publisher: Includes the full treatment of competing approaches of LAN and MAN technologies Details high-speed LANs: Gigabit Ethernet, 100-Mbps token ring, Fibre Channel, and ATM LANs Covers complete treatment of standards: IEEE 802 and ANSI standards, specifications from the ATM forum and the Fibre Channel Association, plus TCP/IP Presents structured cabling systems and cabling types Companion Web site at provides links to important sites, course support for instructors, as well as a link to the Computer Science Student Support Site maintained by the author

446 citations

Patent
Derek L. Davis1, Lionel Smith1
17 Apr 1996
TL;DR: In this paper, a wireless authentication system consisting of a security device implemented within the computer and a user authentication token ("token") in possession of the authorized user is presented. But the protocol is configured between the security device and the token, and the first successful Challenge/Response message exchange between the device and token places the node in an operational state allowing the user access to the contents and/or networked resources of the node.
Abstract: A wireless authentication system to control an operating state of a node being a computer, door control mechanism or any muti-state product based on the proximity of an authorized user to the node. The wireless authentication system comprises a security device implemented within the computer and a user authentication token ("token") in possession of the authorized user. A Challenge/Response protocol is configured between the security device and the token. The first successful Challenge/Response message exchange between the security device and the token places the node in an operational state allowing the authorized user access to the contents and/or networked resources of the node. Later Challenge/Response message exchanges are set to occur periodically to check whether the authorized user possessing the token has left the node unattended thereby causing the node to be placed in a non-operational state.

350 citations

Journal ArticleDOI
TL;DR: An effective flow control mechanism enables the Totem single-ring protocol to achieve message-ordering rates significantly higher than the best prior total-ordering protocols.
Abstract: Fault-tolerant distributed systems are becoming more important, but in existing systems, maintaining the consistency of replicated data is quite expensive. The Totem single-ring protocol supports consistent concurrent operations by placing a total order on broadcast messages. This total order is derived from the sequence number in a token that circulates around a logical ring imposed on a set of processors in a broadcast domain. The protocol handles reconfiguration of the system when processors fail and restart or when the network partitions and remerges. Extended virtual synchrony ensures that processors deliver messages and configuration changes to the application in a consistent, systemwide total order. An effective flow control mechanism enables the Totem single-ring protocol to achieve message-ordering rates significantly higher than the best prior total-ordering protocols.

311 citations

Patent
01 Mar 1991
TL;DR: A token ring local area network as discussed by the authors integrates voice, data and image information over a single cable with voice packets having a higher priority than non-voice packets, and with all the voice packet having the same length and the maximum non voice packet length being related to the maximum number of terminals in the network so as to ensure real-time voice reception.
Abstract: A token ring local area network integrates voice, data and image information over a single cable with voice packets having a higher priority than non-voice packets, and with all the voice packets having the same length and the maximum non-voice packet length being related to the voice packet length and to the maximum number of terminals in the network so as to ensure real-time voice reception Call processing functions are fully distributed among the voice terminals without the use of a centralized processing unit or a centralized data base Conference calls are effected by each party transmitting conference packets to a single destination party, with conference packets having a unique packet format wherein a single packet incorporates voice information from plural terminals so as to minimize the number of packets traversing the ring The token ring includes a plurality of interconnected stations or node coupling units, each of which is, in turn, connected to a plurality of nodes or terminals in a star-wired configuration, with each terminal having connected thereto one or more application devices, such as a digital feature telephone, a video camera, or a PC One or more of the node coupling units may be connected to a bridge for providing connection to another token ring, or to a gateway for providing connection to external networks, such as a PBX, a telephone central office, or a host computer

277 citations

Journal ArticleDOI
TL;DR: An innovative approach is presented to the design of fault-tolerant distributed systems that avoids the several rounds of message exchange required by current protocols for consensus agreement.
Abstract: An innovative approach is presented to the design of fault-tolerant distributed systems that avoids the several rounds of message exchange required by current protocols for consensus agreement. The approach is based on broadcast communication over a local area network, such as an Ethernet or a token ring, and on two novel protocols, the Trans protocol, which provides efficient reliable broadcast communication, and the Total protocol, which with high probability promptly places a total order on messages and achieves distributed agreement even in the presence of fail-stop, omission, timing, and communication faults. Reliable distributed operations, such as locking, update, and commitment, typically require only a single broadcast message rather than the several tens of messages required by current algorithms. >

272 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
85% related
Server
79.5K papers, 1.4M citations
84% related
Wireless ad hoc network
49K papers, 1.1M citations
83% related
Wireless network
122.5K papers, 2.1M citations
83% related
Mobile computing
51.3K papers, 1M citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231
20224
20214
202013
20193
201810