0% found this document useful (0 votes)
112 views10 pages

Token Ring

IEEE 802.5 describes the Token Ring protocol. It uses a token that circulates around a ring of nodes to provide medium access control, allowing only the node possessing the token to transmit. When a node transmits, its frame travels around the ring until returning to the sender. The token is then reinserted to allow the next node to transmit, providing fair round-robin access. A key component is the active ring monitor which handles issues like lost or duplicated tokens by inserting delays or regenerating tokens to maintain proper token circulation.

Uploaded by

Dheeren Umre
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views10 pages

Token Ring

IEEE 802.5 describes the Token Ring protocol. It uses a token that circulates around a ring of nodes to provide medium access control, allowing only the node possessing the token to transmit. When a node transmits, its frame travels around the ring until returning to the sender. The token is then reinserted to allow the next node to transmit, providing fair round-robin access. A key component is the active ring monitor which handles issues like lost or duplicated tokens by inserting delays or regenerating tokens to maintain proper token circulation.

Uploaded by

Dheeren Umre
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

IEEE 802.

Token Ring ::
Consists of a set of nodes connected in a ring.

Data flows in a particular direction.


Data received from upstream neighbor

forwarded to downstream neighbor.

TOKEN :: Medium access control is provided by a small frame, the token, that circulates around the ring when all stations are idle. Only the station possessing the token is allowed to transmit at any given time.

It is a special sequence of bits.

Each node receives and forwards token.


Frame makes its way back to sender frame removed by sender sender reinsert token.

As token circulates around ring, each station gets a chance to transmit Service round - robin fashion

Advantages fair access Disadvantages Ring is single point of failure, added issues due to token maintenance

Token Ring (Characteristics)


Data Rate : 4 Mbps or 16 Mbps
Maximum no. of station : 250

Encoding : Differential manchester

Token Ring Frame Format


SD AC FC DA SA DATA FCS ED FS

Starting Delimiter (SD) : 1 byte Access Control (AC) : 1 byte Frame control (FC) : 1 byte Destination Address (DA) : 6 bytes Source Address (SA) : 6 bytes Frame Check Sum (FCS) : 4 bytes Ending Delimiter (ED) : 1 byte Frame Status (FS) : 1 byte

TOKEN RING ISSUES


Loss of Token(no token circulating) Duplication of Token(mistakes) - need to designate one station as active ring

monitor
Any link or node failure

- network rendered useless

Token Ring Maintenance


Active Ring Monitor
any station can become a monitor defined procedures for becoming a monitor if a station does not see that packet for sometime - then it sends a claim token if claim token comes back to station then it is monitor

Token Ring Maintenance


Role of monitor
insert additional delay in the ring ensure always that there is a token somewhere in the ring regenerate a vanished token no token seen for TRT(token rotation time) - regenerate

You might also like