Page 846 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 846

loss in potential throughput.

               Token Passing This is the LAN media access technology that
               performs communications using a digital token. Possession of the

               token allows a host to transmit data. Once its transmission is
               complete, it releases the token to the next system. Token passing is
               used by Token Ring networks, such as FDDI. Token Ring prevents
               collisions since only the system possessing the token is allowed to
               transmit data.

               Polling This is the LAN media access technology that performs
               communications using a master-slave configuration. One system is

               labeled as the primary system. All other systems are labeled as
               secondary. The primary system polls or inquires of each secondary
               system in turn whether they have a need to transmit data. If a
               secondary system indicates a need, it is granted permission to
               transmit. Once its transmission is complete, the primary system

               moves on to poll the next secondary system. Synchronous Data Link
               Control (SDLC) uses polling.

               Polling addresses collisions by attempting to prevent them from using
               a permission system. Polling is an inverse of the CSMA/CA method.
               Both use masters and slaves (or primary and secondary), but while
               CSMA/CA allows the slaves to request permissions, polling has the
               master offer permission. Polling can be configured to grant one (or

               more) system priority over other systems. For example, if the standard
               polling pattern was 1, 2, 3, 4, then to give system 1 priority, the polling
               pattern could be changed to 1, 2, 1, 3, 1, 4.
   841   842   843   844   845   846   847   848   849   850   851