Hey guys, i have a homework, i have finished it at 70%. It is about Token Ring and Ring Topology.As i said, the homework is at 70%, and the other 30% is about implementing it to a Company (My house).As an example i was to built an NAS for my home, but i found that a NAS uses another technology that is different to Token RingResume - TL;DR: I need to implementing something convicting that i am using the Token Ring and Ring Topology.(I was to implement the NAS, but it doesnt use those technologies)Sorry, the text is so confusing, and english isnt my mother tongue. I don't mean to be a dick, but why in the seven hells are you even studying token ring?Is this 'implementation' to be a physical one? What I mean, do you just have to write about how you would go about implementing this or what?Token ring is an old technology for the local LAN, and it is for all intents and purposes long gone (maybe some lab somewhere still has it). So you will not find anything that uses that in a modern production environment, let alone a home environment.Go look at the, it's really a bad design by today's standards, as it let only 1 device on a LAN talk at once.We moved away from token ring and changed to ethernet (and other technologies) and a packet switched network. :A ring network is a in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travel from node to node, with each node along the way handling every packet.Because a ring topology provides only one pathway between any two nodes, ring networks may be disrupted by the failure of a single link.
A node failure or cable break might isolate every node attached to the ring. In response, some ring networks add a 'counter-rotating ring' (C-Ring) to form a redundant topology: in the event of a break, data are wrapped back onto the complementary ring before reaching the end of the cable, maintaining a path to every node along the resulting C-Ring.
Such 'dual ring' networks include, (FDDI),. also known as IBM networks - avoid the weakness of a ring topology altogether: they actually use a star topology at the physical layer and a (MAU) to imitate a ring at the datalink layer.- Image showing ring network layoutInteresting: Parent commenter can. Will also delete on comment score of -1 or less. Is it truly a token ring you're setting up, or is it a standard ethernet ring?Token rings have been obsolete for decades. Building an ethernet ring in a home enviroment would be maddening, if it's even possible, as each device has to have 2 nics, 2 routes to everything (literally everything) on the network, and you'd have to have something (perhaps a switch running STP) that will automatically bring up a connection when the other fails.How it's done in the transport world, is that 2 interfaces are essentially bridged into a virtual ERPS (Ethernet Ring Protection Switching) interface. This interface has an 'East' and 'West' connection. Each east interface is connected to a west interface until you close the ring.
Token Ring protocol is a communication protocol used in Local Area Network (LAN). In a token ring protocol, the topology of the network is used to define the order in which stations send. In a token ring protocol, the topology of the network is used to define the order in which stations send. A TOKEN RING ALGORITHM. It is not permitted to enter a second CS using the same token. If a process is handed the token by its neighbor and is not interested in entering a CS, it just passes it along. As a consequence, when no processes want to enter any CS, the token just circulates at high speed around the ring.
Once the ring is closed, the 'ripple' link is blocked off automatically by the equipment. There are then status messages that are sent around the ring. If a connection goes down, the ripple link is allowed to forward traffic.Having a ripple link is what keeps a ring from being a switch loop. Without it, or without physically keeping a connection down, the network will fall on its face.Token rings get away without having a ripple link by have a 'token'. Whatever machine has the token is allowed to send data, the token is then passed around the ring. This is inefficiency at its finest.
Ok, i am not an expert, but i will take of your word and put it to my homework.This is the first time i see ppl saying that the Token Ring is soooo outdated.If it is so outdated, why some labs keep using it? Why thee are some minor companies using it as well? I dont get it.And yes, i can set up a ethernet ring.
I only need ideas of where to implement it, how to implement it, materials to use it. Then i will transport these ideas to build (In my mind, and write it down) or setup a Ethernet Ring or whatever Ring Topology for my house. Ok to build it you would need each computer to have a multi interface nic. Let's say we do this on Microsoft Windows. Install say a Mikrotik 4 port nic in each computer. On one you'll have the internet with Internet Connection Sharing enabled.
You could even run DHCP and DNS on it. On all the rest you need to run a routing protocol. RIP is fine, but slow to advertise that a link is broken or added.
OSPF is better but more complex to enable. Enable RIP and configure it on all computers and you should be good.:). If it is so outdated, why some labs keep using it? Why thee are some minor companies using it as well? I dont get it.Token ring, which again is not a ring topology (even wikipedia says so) was in vogue in 1985 or so, with very, very few major companies. Remember that computers did not really become popular till the mid 90ies, and even then networks were quite rare things.Labs may keep a version of it 'for funsies', basically to show how things were back then, in the long long ago. I doubt any serious company still relies on a token ring network, but it is possible that some very old archives are on ancient computers that are kept alive just to keep those archives alive, and due to being so old, are very hard to transfer to new systems.Now, Ring TOPOLOGY is still being used today.
FDDI, a type of old fiber standard, which uses ring topology.See the wiki article. I think you mean ring topology, which is not the same as Token Ring. Token Ring is a networking protocol, how the devices communicate.
Ring topology is how the nodes in the network are connected to each other, physically and logically. I have no idea why you would be using ring topology in home, as each computer would need a multi-interface NIC and your throughput would be terrible. I don't even know how you would set it up to be honest. I've only ever learned that it exists, but I would think that 99.9% of the stuff you would see in the real world would be hub-and-spoke (the 'tree' topology in the diagram I posted).
Thank you for the idea, I have run another performance test with string.Format.In the project where I used FastReplacer, it is not possible to replace all the tokens at once. Every replace operation introduces new tokens that might be replaced later. We use FastReplacer to generate C#, SQL and XML source where tokens were extension points in that source, formatted as comments in specific language.When I (mis)used string.Format to replace tokens one by one, performance was slower than string.Replace. When I adjusted the tests to use string.Format to replace many tokens at once, the execution was approximately 5 times faster than FastReplacer: FastReplacer.Replace was executed 131071 times in 2.0764 sec, string.Format was executed 17 times to replace total of 131071 tokens in 0.4120 sec.My conclusion would be that if you can enumerate tokens and replace all tokens in a text at once, then string.Format function is the right way to go. Otherwise, if you don’t know the number of tokens in advance or need to use many replace operations in specific order, string or FastReplacer would work faster.
I suspect that the comparison to String.Format is not entirely fair, because it has the option of replacing as it goes, which should be a linear operation, and sufficient memory can easily be allocated in advance, to avoid wasted motion due to a reallocation. The length of the template string and the lengths of all tokens and their replacements can be computed in advance. From those three numbers, it is straightforward to allocate enough memory to hold the completed string.Last Visit: 6-Sep-19 20:27 Last Update: 6-Sep-19 20:271General News Suggestion Question Bug Answer Joke Praise Rant AdminUse Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.