Token Ring
Token Ring
Token ring networks are another widely used family of LANs. The token ring
networks were developed by IBM in the early 1980s. We will first explain the
operations of some token ring MAC protocols, and we will calculate their
efficiency. We will then discuss the IEEE 802.5 standard, which specifies the
physical layer and the MAC protocol of a token ring network.
and it retransmits these bits on the output cable. The rate of the bit transmission is controlled by a
quartz oscillator in the transmitter. This transmission rate differs from the bit reception rate,
which is the transmission rate of the upstream node, because no two quartz oscillators have
exactly the same rate. This difference in rates means that each node must have a buffer. This
node, called the elasticity buffer, stores the bits that accumulate when the input rate is higher
than the transmission rate. A transmission rate higher than the input rate is handled as follows:
the node starts transmitting when the buffer contains a specified number B of received bits; it
stops when the complete incoming packet is repeated. The network designer selects a large
enough number B for the buffer to prevent the buffer’s becoming empty during the packet
retransmission.
The steps of the release after transmission (RAT) protocol are shown in Figure 5.13. With this
protocol, the node releases the token as soon as it has completely transmitted the packet.
We will calculate the efficiency ηRAT of the RAT protocol, defined as the fraction of time that
the nodes transmit packets when they use that protocol and when all the nodes have packets to
transmit. From the analysis, you will see that:
where N is the number of nodes, TRANSP is the time to transmit a packet, and PROP is the
propagation time of a signal around the ring.Consider the timing diagram in Figure 5.14. Node 1
starts transmitting a packet and the transmission lasts TRANSP. The transmission of a token
lasts TRANST. After TRANSP + TRANST, the last bit of the token has just been transmitted
by node 1. That bit arrives at node 2 at time TRANSP + TRANST + PROP(1 → 2), where
PROP(1 → 2) designates the propagation time of a signal from node 1 to node 2.The first bit of
the packet sent by node 2 leaves that node at time TRANSP + TRANST + PROP(1 → 2) + 1,
where the last 1 refers to the one-bit delay in node 2. That is, we assume that the nodes delay the
signal by one bit to be able to replace the token with an SFD.
The result of the analysis would not change if the node delay were a small number of bits
different from one. Such a small delay is negligible compared with the packet transmission time.
Each station takes an equivalent amount of time to transmit a packet and the token. Figure 5.14
shows that the N nodes transmit one packet each in a time:
/www.sce.carleton.ca/faculty/lambadaris/courses/521/supplementary/token.pdf