| A | B |
| IBM originally developed Token Ring as reliable network architecture based on the | token-passing access control method. |
| Systems Network Architecture (SNA) which is | the IBM architecture used for connecting to mainframe networks |
| The Token Ring standards are defined in | IEEE 802.5. |
| The Token Ring topology is referred to as a star-wired ring because the | outer appearance of the network design is a star. |
| In a Token Ring topology, computers connect to a | central hub, called a Multistation Access Unit (MSAU). |
| Inside the MSAU of a Token Ring topology, the wiring forms a | circular data path, creating a logical ring. |
| Token Ring is so named because of its logical ring topology and | its media access control method of token passing. |
| Token Ring is a baseband architecture that uses | digital signaling |
| The transfer rate for Token Ring can be | either 4 Mbps or 16 Mbps. |
| In a Token Ring topology as the signal travels around the circle | to each network card, it is regenerated before being sent on its way |
| In a Token Ring topology all computers are | created physically equal. |
| In a Token Ring network, the first computer that comes online becomes the "hall monitor" and must | keep track of how many times each frame circles the ring. |
| In a Token Ring network, the first computer that comes online has the responsibility of | ensuring that only one token is out on the network at a time. |
| The Token Ring monitor computer periodically sends a signal called a | beacon, which circulates around the ring. |
| If a computer does not receive the beacon from its Nearest Active Upstream Neighbor (NAUN) when expected, it | puts a message on the network |
| The message notifies the monitoring computer that the beacon was not received from the NAUN cause | an automatic reconfiguration that restores communications |
| A token is initially generated when the | first computer on the network comes online. |
| When a computer wants to transmit, it waits for and then | takes control of the token when it comes its way. |
| The token can travel in either direction around the ring, but only | in one direction at a time. |
| the direction in which the token travels is determined by | the hardware configuration |
| As the token passes around the ring, it | polls devices on the network to see if they want to send data |