Standards  >   Network Protocols  >   LAN Protocols  >  

Token Ring Protocols

RSS Feed   
ALSO CALLED: HSTR, 16Mb Token, 4Mb Token, 16 Mbps Token Ring Protocols, 4 Mbps Token Ring Protocols, Token Ring, High Speed Token Ring
DEFINITION: A Token Ring network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. The Token Ring protocol is the second most widely-used protocol on local area networks after Ethernet. The IBM Token Ring protocol led  … 

Token Ring Protocols definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary
Token Ring Protocols Reports
76 - 83 of 83 Matches Previous Page  |  Next Page
Video conferencing standards and interoperability considerations
sponsored by SearchSecurity.com
EGUIDE: Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.
Posted: 27 Apr 2011 | Published: 27 Apr 2011

SearchSecurity.com

Virtual Panel: COVID-19 & Public Transit
sponsored by Cradlepoint
WEBCAST: COVID-19 has caused mass transit ridership and fare revenues to drop by more than 90%. Public transit will hopefully become disease-free sooner rather than later, but agencies must consider the connectivity of riders and how they are accounted for. Watch this webcast for a panel discussion on the implications of COVID-19 on transit technology.
Posted: 10 Sep 2020 | Premiered: Aug 5, 2020

Cradlepoint

Webinar - How to Proactively Monitor and Troubleshoot Microsoft Teams Performance
sponsored by ThousandEyes
WEBCAST: Now that teams are more distributed than ever, collaboration platforms like Microsoft Teams have become key to remaining productive. How can you ensure your workers are getting the best end user experience from these key resources? Leverage this webinar to learn how you can gain end-to-end visibility of the service delivery path for Teams.
Posted: 25 Jan 2021 | Premiered: Jan 25, 2021


What are your top ten network automation use cases?
sponsored by Gluware
WHITE PAPER: When organizations begin automating their enterprise networks, top of mind are enhancing network security, increasing agility and ensuring business continuity. Explore this collection of network automation use-cases explores to see how these challenges can be solved by the Gluware Intelligent Network Automation code-free software platform.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Gluware

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

What an Impending Marriage of IoT and 5G Means for the Future
sponsored by T-Mobile for Business
EGUIDE: One area that will greatly benefit from 5G is the Internet of Things. However, 5G is also adding some confusion in the market today as there are existing private and public solutions being deployed now while 5G is a couple years away from adoption. In this e-guide, learn what the impending marriage of IoT and 5G means for the future.
Posted: 05 Mar 2020 | Published: 03 Mar 2020

T-Mobile for Business

What Enterprises Should Do About IPv6 in 2011
sponsored by Cisco Systems, Inc.
WHITE PAPER: The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com
76 - 83 of 83 Matches Previous Page    2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info