Compare and contrast FDDI to the token ring access method.

What will be an ideal response?


FDDI is similar to the token ring access method because it uses token passing for network communications. It differs from standard token ring in that it uses a timed token access method. An FDDI token travels along the network ring from node to node. If a node does not need to transmit data, it picks up the token and sends it to the next node. If the node possessing the token does need to transmit, it can send as many frames as desired for a fixed amount of time, called the target token rotation time (TTRT). Because FDDI uses a timed token method, it is possible for several frames from several nodes to be on the network at a given time, providing high-capacity communications.

Computer Science & Information Technology

You might also like to view...

Routing tables on a router keep track of

a. port assignments. b. MAC address assignments. c. gateway addresses of LANs. d. routes to use for forwarding data to its destination.

Computer Science & Information Technology

The color of a tab changes depending on whether it is the ____________________ tab.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A company is receiving a large number of laptop theft reports in the corporate buildings. Which of the following is the MOST cost-efficient way to discourage theft of laptops?

A. A CCTV system B. A cable lock C. A badge reader D. A retina scanner

Computer Science & Information Technology

The top section of the Tools panel contains what type of tools?  

A. Drawing B. Shape C. Transform D. Selection

Computer Science & Information Technology