0% found this document useful (0 votes)
15 views

Token Rings: 7/26/2013 BEE08B Computer Networks 1

The document discusses token ring networks. It describes how token ring uses a contention-free protocol where a token circulates around a shared ring medium and nodes can only transmit when they have the token. It explains that if a node fails, relays will bypass it to keep the ring intact. Finally, it provides details on the token ring frame format and medium access control method where each node holds part of the token as it circulates.

Uploaded by

Ali Ahmad
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Token Rings: 7/26/2013 BEE08B Computer Networks 1

The document discusses token ring networks. It describes how token ring uses a contention-free protocol where a token circulates around a shared ring medium and nodes can only transmit when they have the token. It explains that if a node fails, relays will bypass it to keep the ring intact. Finally, it provides details on the token ring frame format and medium access control method where each node holds part of the token as it circulates.

Uploaded by

Ali Ahmad
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 7

Token Rings

7/26/2013

BEE08B Computer Networks

Token Ring (IEEE 802.5, FDDI)

7/26/2013

BEE08B Computer Networks

Contention-free Protocol
Ethernet and the similar protocols are contention-based protocol Token ring, token bus are examples of contention-free protocol

7/26/2013

BEE08B Computer Networks

Properties
The ring is a single, shared medium, not point to point links in a loop. All nodes see all frames. A distributed algorithm determines when a node can transmit. Data always flows in one direction. Basic idea: A token circulates around the ring. When a host has a frame to transmit, it seizes the token and injects the frame on the medium. The frame is forwarded by intermediate nodes until arriving at the destination. The destination puts the frame back after receiving it, but with a special mark. The frame circulates back to the sender.
7/26/2013 BEE08B Computer Networks 4

Physical Properties
Question: What happens if a node on the ring fails?
Host Host Host Host

From prev ious host

To next host

From prev ious host

To next host

Relay (a)
Host

Relay (b)

As long as a node provides power to the relay, the relay stays open. When the node fails, the relay closes bypassing the node.

MSAU Host Host

Multi-Station Access Unit: Several relays packaged together. Multiple MSAUs can be plugged together to make a larger network.

From prev ious MSAU To next MSAU Host

Typical token ring data rates go from 4 Mbps to 16 Mbps. Number of stations can be as high as 260.
BEE08B Computer Networks 5

7/26/2013

Medium Access Control (MAC)


network adaptor

TX

data storage

RX

Each host holds part of the token (1 bit). A designated monitor host may hold more bits than others.

As the token circulates around the ring, a host needing to send data drains it off the ring. Each TXed frame contains the receivers address. Frames are not removed from the ring: they flow through the NIC and the receiver copies it into a buffer. When the frame gets back to where it started, the sender drains it off the ring. Question: How long should a host hold the token?
7/26/2013 BEE08B Computer Networks 6

Token Ring Frame Format (IEEE 802.5)

8 Start delimiter

8 Access control

8 Frame control

48 Dest addr

48 Src addr

Variable Body

32 Checksum

8 End delimiter

8 Frame status

7/26/2013

BEE08B Computer Networks

You might also like