What Is a Token Ring? Understanding Local Area Networks

Written by Coursera Staff • Updated on

In local area networks (LANs), token ring technology offers a unique approach to facilitating reliable and orderly communication between network devices.

[Featured Image] Two IT professionals look at a computer and talk about their company's token ring.

Key takeaways

Token rings provide an alternative to the more commonly used Ethernet technology.

  • Token ring networks represent a particular type of LAN topology designed to manage data transmission in a more controlled manner.

  • Type 1 and Type 3 token rings are the most common, with Type 1 supporting up to 255 stations and Type 3 supporting up to 72 devices per network.

  • You can make use of a token ring network’s priority system to give certain stations more frequent access to a network.

Find out what a token ring is, its working mechanism, and how it compares with Ethernet. Afterward, if you’re ready to start a career in IT support, enroll in Google’s IT Support Professional Certificate to develop essential skills for performing routine information technology (IT) support tasks, including computer assembly and wireless networking.

What is a local area network (LAN)?

A local area network, commonly known as a LAN, is a network of interconnected devices confined to a specific geographic location, such as a building or residence. The size of a LAN varies depending on its use, ranging from a home setup with a single user to a corporate environment with thousands of users and devices. 

The distinguishing feature of a LAN is its limited scope: it serves devices in a localized area instead of a wide area network (WAN) or a metropolitan area network (MAN), both of which cover larger geographic zones. WANs and MANs often function as connective tissues that link multiple LANs.

What is a token ring network?

Token ring networks represent a particular type of LAN topology designed to manage data transmission in a more controlled manner. In this setup, data travels unidirectionally through a “ring” of interconnected nodes. The critical element here is the “token,” which is a unique digital signature that grants the authority to transmit data. When the token arrives at a particular station within the network, that station then sends its own data to the next station.

While token ring and ring topology might seem similar, they are fundamentally different. A token ring represents a networking protocol, while a ring topology characterizes a network layout where devices are interconnected circularly. Developed by IBM in the late 1900s and standardized by IEEE 802.5, token rings provide an alternative to the more commonly used Ethernet technology.

How token ring networks work

A token ring network, initially developed by IBM in the 1970s, operates on a ring topology and utilizes a token-passing mechanism to control data transmission between network nodes. Unlike Ethernet, the token ring ensures a collision-free environment by allowing only one station to transmit simultaneously. 

When a station has data to send, it captures a circulating “free” token, converts it to a “busy” token, and then transmits a data frame. The frame travels the network until it reaches its destination and copies the data. The frame then completes its journey back to the originating station, confirming successful transmission, after which a new free token is released for other stations to use.

Token ring vs. Ethernet

When comparing token ring and Ethernet technologies, several key distinctions arise. Unlike Ethernet, in which all stations compete for network access through their bus topology, token rings ensure that every station gets a scheduled opportunity to transmit data. This makes the network more predictable and equitable, enhancing its reliability.

While Ethernet primarily uses unshielded twisted pair (UTP) wiring, token ring networks rely on shielded twisted pair (STP) wiring for more secure and robust transmissions. Ethernet also relies on carrier sense multiple access with collision detection (CSMA/CD) for data transmission, which can lead to occasional data collisions. Token ring employs a token-passing protocol, ensuring a more controlled and reliable data transmission.

Types of token rings in computer networks

Token rings come in different variations, each offering its own features and limitations. Specifically, Type 1 and Type 3 token rings are the most commonly used.

Type 1

Type 1 token rings can support a substantial network, accommodating 255 stations. They primarily use STP cabling with IBM-style Type 1 connectors, offering a robust and secure transmission medium.

Type 3

Type 3 token rings are more limited in scope, supporting up to 72 devices per network. These networks utilize UTP cabling, generally of Category (Cat) 3, 4, or 5 types, with Registered Jack 45 (RJ-45) connectors. 

Token ring hubs

In a token ring network, computers or stations connect to a centralized hub known as a multistation access unit (MAU or MSAU). The MAU is a conduit for data transmission in a logical ring pattern, even though the physical connections are star-shaped. 

An MAU may function as the central hub but operate differently from an Ethernet hub. The network uses a unique token-passing mechanism, where a single data packet or token circulates among the stations, granting permission for data transmission. MAUs make adding or removing nodes from the system easier and act as protection if a node fails.

However, due to the dwindling prevalence of token ring networks, it is more common to encounter Ethernet hubs or switches in contemporary settings today.

Read more: Hub vs. Switch: What’s the Difference?

When is a token ring used?

Network professionals may use token rings for media access control (MAC) protocols. Unlike point-to-point communication channels, LANs operate on shared media networks, which require a sophisticated method for managing multiple devices’ access to the network. 

While contention-based methods like those in Ethernet networks offer one approach, token rings employ a token-passing protocol for media access control. This token-based system facilitates orderly and collision-free data transmission, which professionals may find especially useful in environments requiring highly reliable or deterministic data transfer. 

Pros and cons of token rings

Token ring networks offer several advantages that contribute to their reliability and performance. One such feature is the priority system, which allows network administrators to designate high-priority stations that get more frequent access to the network. Each token frame contains priority fields, ensuring only stations with matching or higher priority levels can seize the token. Other advantages include:

  • Eliminates collisions: The token-passing mechanism ensures that you don’t have data collisions in the network.

  • Speed: Continual development has led to higher-speed versions of the token ring.

On the other hand, you may experience several disadvantages with token rings. Some of these include:

  • System failures: Token rings are less reliable than some of their counterparts. Because of the ring topology, one point of failure can often affect the entire system. However, many professionals use MAUs to minimize this concern.

  • Outdated: As more modern technologies emerge, token rings become less common, leading to fewer options for compatible hardware and software.

How to learn more about token rings

Learning about token ring networks can provide valuable insights into alternative networking topologies that prioritize controlled data transmission and reliability. Consider the following avenues to deepen your understanding:

  • Educational courses: Many online platforms offer courses on network technologies, including token rings. 

  • Books and academic journals: Various textbooks and articles explore the intricacies of token ring technology. 

  • Industry publications: Websites dedicated to networking technologies often publish articles, reviews, and comparisons that can help you understand where token rings stand in the current technology landscape.

Check out our free resources for IT support professionals

From in-demand skills to career development tips, get the most out of Career Chat, a weekly LinkedIn newsletter by Coursera. Learn more about IT support with our other free digital resources: 

Accelerate your career growth with a Coursera Plus subscription. When you enroll in either the monthly or annual option, you’ll get access to over 10,000 courses.

Updated on
Written by:

Editorial Team

Coursera’s editorial team is comprised of highly experienced professional editors, writers, and fact...

This content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.