Open In App

Difference Between Token ring and Ethernet

Last Updated : 03 May, 2025
Comments
Improve
Suggest changes
Like Article
Like
Report

There are two well-known types of local area network (LAN) technologies used in computer networking: Token Ring and Ethernet, Token Ring follows a rule where a special token must be passed around the network. A device can only send data when it has the token, which helps avoid data collisions. This method is based on the IEEE 802.5 standard.

In contrast, Ethernet uses a method called Carrier-Sense Multiple Access with Collision Detection (CSMA/CD). In this system, devices can try to send data whenever the network is free. If two devices send data at the same time and a collision happens, they wait a short, random time before trying again.

These two technologies are quite different in how they send data, how their networks are set up, and how much they cost. Because of this, each one is better suited for different types of situations.

Token Ring 

In the token ring, a token ring passes over a physical ring. Token ring is defined by IEEE 802.5 standard. In a token ring, there is a station and a special frame called a token. A station in the token ring can transmit data frame if it contains a token.

After the successful transmission of data frame tokens are pointed(issued). The token ring is a star-shaped topology and handles priority in which some nodes may give priority to the token. 

Token Ring

Advantages

  • Predictability: Since each device gets an opportunity to pass the token, this token passing process is more predictable with no packet collisions happening at all.
  • Handling of Priorities: In a token ring network, some nodes can be given priority over others making the management of important data easier.
  • Routing Information: Token Ring includes routing information and it may assist in streamlining data transmission.

Disadvantages

  • Expensive: Compared to Ethernet, Token Ring networks are relatively costly to set up.
  • Slow Speed: Generally speaking its transmission speeds are lower than that of other types of networks with speeds ranging from four megabits per second (Mbps) to sixteen megabits per second (Mbps).
  • Complexity: Compared to Ethernet, token ring technology is more complicated and hence needs intense care during its operation.

Ethernet

IEEE 802.3 defines the Ethernet. It uses CSMA/CD mechanism. It means that if many stations exist at the same time to talk, all stations will be closed. To resume them, wait for a random time. Unlike token ring it doesn't employ any priorities. It is less costly than token ring network. 

Ethernet
Ethernet

Advantages

  • Saving Cost: Cost of token ring is much higher as compared to Ethernet. It may be up to 70% lower in cost.
  • Speed: Ethernet uses faster data transmission rates compared with other methods like token ring, from 10 Mbps to 100 Mbps or beyond.
  • Simplicity: Setting up and maintaining an Ethernet network is simpler for users.

Disadvantages

  • Collisions: In Ethernet, the fact that it is not deterministic makes it prone to collisions if two or more devices attempt transmitting simultaneously.
  • No Priority Handling: The absence of a way on the part of Ethernet to sort out some devices or data means there will be problems where priority management is required.

Difference Between Token ring and Ethernet

token-ring-vs-ethernet
Token Ring VS Ethernet
FeatureToken RingEthernet
Access MethodToken passing mechanism.CSMA/CD (Carrier Sense Multiple Access/Collision Detection).
IEEE StandardIEEE 802.5.IEEE 802.3.
DeterminismDeterministic.Non-deterministic.
TopologyStar (logical ring).Bus (traditionally), now often Star with switches.
Priority HandlingSupports priority handling.Does not support priority natively.
CostMore expensive. Cheaper than Token Ring.
CablingUses telephone wires.Uses coaxial cables or twisted pair.
Routing InformationContains routing information.Does not contain routing information.
SpeedSlower (typically 4 Mbps to 16 Mbps).Faster (10 Mbps to 100 Mbps or more).
Data FlowUnidirectional (token must be received to send data).Any device can transmit if the network is idle.
Active WorkstationsOnly one active at a time (token-based control).Multiple can be active (collision management through CSMA/CD).

Next Article

Similar Reads