Difference Between Token ring and Ethernet
Last Updated :
03 May, 2025
There are two well-known types of local area network (LAN) technologies used in computer networking: Token Ring and Ethernet, Token Ring follows a rule where a special token must be passed around the network. A device can only send data when it has the token, which helps avoid data collisions. This method is based on the IEEE 802.5 standard.
In contrast, Ethernet uses a method called Carrier-Sense Multiple Access with Collision Detection (CSMA/CD). In this system, devices can try to send data whenever the network is free. If two devices send data at the same time and a collision happens, they wait a short, random time before trying again.
These two technologies are quite different in how they send data, how their networks are set up, and how much they cost. Because of this, each one is better suited for different types of situations.
Token Ring
In the token ring, a token ring passes over a physical ring. Token ring is defined by IEEE 802.5 standard. In a token ring, there is a station and a special frame called a token. A station in the token ring can transmit data frame if it contains a token.
After the successful transmission of data frame tokens are pointed(issued). The token ring is a star-shaped topology and handles priority in which some nodes may give priority to the token.

Advantages
- Predictability: Since each device gets an opportunity to pass the token, this token passing process is more predictable with no packet collisions happening at all.
- Handling of Priorities: In a token ring network, some nodes can be given priority over others making the management of important data easier.
- Routing Information: Token Ring includes routing information and it may assist in streamlining data transmission.
Disadvantages
- Expensive: Compared to Ethernet, Token Ring networks are relatively costly to set up.
- Slow Speed: Generally speaking its transmission speeds are lower than that of other types of networks with speeds ranging from four megabits per second (Mbps) to sixteen megabits per second (Mbps).
- Complexity: Compared to Ethernet, token ring technology is more complicated and hence needs intense care during its operation.
Ethernet
IEEE 802.3 defines the Ethernet. It uses CSMA/CD mechanism. It means that if many stations exist at the same time to talk, all stations will be closed. To resume them, wait for a random time. Unlike token ring it doesn't employ any priorities. It is less costly than token ring network.
EthernetAdvantages
- Saving Cost: Cost of token ring is much higher as compared to Ethernet. It may be up to 70% lower in cost.
- Speed: Ethernet uses faster data transmission rates compared with other methods like token ring, from 10 Mbps to 100 Mbps or beyond.
- Simplicity: Setting up and maintaining an Ethernet network is simpler for users.
Disadvantages
- Collisions: In Ethernet, the fact that it is not deterministic makes it prone to collisions if two or more devices attempt transmitting simultaneously.
- No Priority Handling: The absence of a way on the part of Ethernet to sort out some devices or data means there will be problems where priority management is required.
Difference Between Token ring and Ethernet
Token Ring VS EthernetFeature | Token Ring | Ethernet |
---|
Access Method | Token passing mechanism. | CSMA/CD (Carrier Sense Multiple Access/Collision Detection). |
IEEE Standard | IEEE 802.5. | IEEE 802.3. |
Determinism | Deterministic. | Non-deterministic. |
Topology | Star (logical ring). | Bus (traditionally), now often Star with switches. |
Priority Handling | Supports priority handling. | Does not support priority natively. |
Cost | More expensive. | Cheaper than Token Ring. |
Cabling | Uses telephone wires. | Uses coaxial cables or twisted pair. |
Routing Information | Contains routing information. | Does not contain routing information. |
Speed | Slower (typically 4 Mbps to 16 Mbps). | Faster (10 Mbps to 100 Mbps or more). |
Data Flow | Unidirectional (token must be received to send data). | Any device can transmit if the network is idle. |
Active Workstations | Only one active at a time (token-based control). | Multiple can be active (collision management through CSMA/CD). |
Similar Reads
What is OSI Model? - Layers of OSI Model The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems communicate over a network. OSI Model was developed by the International Organization for Standardization (ISO). The OSI Model consists of 7 layers and each layer has specific functions and re
13 min read
Introduction of ER Model The Entity-Relationship Model (ER Model) is a conceptual model for designing a databases. This model represents the logical structure of a database, including entities, their attributes and relationships between them. Entity: An objects that is stored as data such as Student, Course or Company.Attri
10 min read
DBMS Tutorial â Learn Database Management System Database Management System (DBMS) is a software used to manage data from a database. A database is a structured collection of data that is stored in an electronic device. The data can be text, video, image or any other format.A relational database stores data in the form of tables and a NoSQL databa
7 min read
TCP/IP Model The TCP/IP model (Transmission Control Protocol/Internet Protocol) is a four-layer networking framework that enables reliable communication between devices over interconnected networks. It provides a standardized set of protocols for transmitting data across interconnected networks, ensuring efficie
7 min read
Types of Network Topology Network topology refers to the arrangement of different elements like nodes, links, or devices in a computer network. Common types of network topology include bus, star, ring, mesh, and tree topologies, each with its advantages and disadvantages. In this article, we will discuss different types of n
12 min read
Normal Forms in DBMS In the world of database management, Normal Forms are important for ensuring that data is structured logically, reducing redundancy, and maintaining data integrity. When working with databases, especially relational databases, it is critical to follow normalization techniques that help to eliminate
7 min read
Operating System Tutorial An Operating System(OS) is a software that manages and handles hardware and software resources of a computing device. Responsible for managing and controlling all the activities and sharing of computer resources among different running applications.A low-level Software that includes all the basic fu
4 min read
Computer Network Tutorial A Computer Network is a system where two or more devices are linked together to share data, resources and information. These networks can range from simple setups, like connecting two devices in your home, to massive global systems, like the Internet. Below are the main components of a computer netw
7 min read
Basics of Computer Networking A computer network is a collection of interconnected devices that share resources and information. These devices can include computers, servers, printers, and other hardware. Networks allow for the efficient exchange of data, enabling various applications such as email, file sharing, and internet br
14 min read
ACID Properties in DBMS In the world of DBMS, transactions are fundamental operations that allow us to modify and retrieve data. However, to ensure the integrity of a database, it is important that these transactions are executed in a way that maintains consistency, correctness, and reliability. This is where the ACID prop
8 min read