Warning: Illegal string offset 'sfsi_rectsub' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 52

Warning: Illegal string offset 'sfsi_rectfb' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 55

Warning: Illegal string offset 'sfsi_rectshr' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 58

Warning: Illegal string offset 'sfsi_recttwtr' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 61

Warning: Illegal string offset 'sfsi_rectpinit' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 64

Warning: Illegal string offset 'sfsi_rectfbshare' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 67

In a token ring network, the presence of a token (which is simply a particular bit setting) in a continually circulating transmission stream allows a device to change the bit setting (thus taking the token) and put a message in its place.