How Token Ring Works
Unlike other standard forms of LAN interconnects, token ring maintains one or more common data frames that continuously circulate through the network. All connected devices on the network share these frames as follows: Tokens are three bytes that consist of a start and end delimiter that describe the beginning and end of the frame (these bytes mark the frame boundaries). Also within the token is the access control byte. The maximum length of the data portion is 4,500 bytes.
How Token Ring Compares to Ethernet
Unlike an Ethernet network, devices within a token ring network can have the same MAC address without causing issues. Here are some more differences:
Cabling for token ring networks is more expensive than Ethernet CAT 3/5e cable. Token ring network cards and ports are also more expensive. Administrators can configure token ring networks so that certain nodes have more priority than others. This isn’t allowed with unswitched Ethernet. Token ring networks use tokens to avoid collisions. Ethernet networks are more prone to collisions, especially when the system employs hubs. These systems use switches to avoid collisions.