Token Ring
Token Ring
R R
R
IEEE 802.5 (Token Ring)
Operation
The token bit sequence circulates around the ring.
Each station forwards the token if it does not have a frame to
transmit.
A station with data to send seizes the token (repeater now in
transmit state) and begins sending it’s frame. It can transmit for
length of time called the Token Hold Time (THT) = 10
mseconds.
Each station forwards the frame.
The destination station notices its address and saves a copy of the
frame as it also forwards the frame.
When the sender sees its frame return, it drains it from the ring
and reinserts a token. When the last bit of the returning frame
has been drained, the repeater switches immediately to the listen
state.
IEEE 802.5 (Token Ring) using a
Hub
Lost Token:
Monitor station knows the number of stations on the ring and so
calculates maxTHT = n * THT (n is the number of stations on the ring). It
keeps a timer of how long since it last saw the token pass by. If this is
more than maxTRT, it drains the ring and inserts a new token in the ring.
Orphan frame:
A frame can get orphaned if the sending station goes down before it can
drain it’s frame. As a frame passes by the monitor, it sets the "monitor"
bit in the header of the frame. If it sees a frame with this bit already set,
it knows it is an orphan frame. Then the monitor drains the ring and
inserts a new token in the ring.
IEEE 802.5 (Token Ring)
Performance
Under light load conditions where few stations have data to send,
token ring performance is fair but there is an overhead of passing
the token.
Under heavy load condition where most of the stations have data
to send, performance is excellent and utilization approaches
100%. The token is fully utilized in this case.
IEEE 802.3 (Ethernet) vs
IEEE 802.5 (Token Ring)
Ethernet is widely used at present (> 90% market share). People
are experienced in using this technology.
Ethernet uses CSMA/CD as the MAC protocol while Token Ring
uses Round Robin protocol.
Token Ring uses point-to-point connections between ring
interfaces so that the electronic hardware can be fully digital and
simple. There is no need for collision detection. The Ethernet NIC
card requires some analog circuitry to be able to detect
collisions.
Token Ring has excellent throughput at high loads since there is
no possibility of collisions unlike 802.3.
Under light load, Token Ring experiences token passing
overhead. Ethernet has no such overhead and has excellent
performance at light loads.
IEEE 802.5 (Token Ring)
Token Frame Format
IEEE 802.5 (Token Ring)Frame Format Details
The access control byte contains the priority and reservation fields, as well as a
token bit (used to differentiate a token from a data/command frame) and a monitor
bit (used by the active monitor to determine whether a frame is circling the ring
endlessly).
The frame control byte indicates whether the frame contains data or control
information. In control frames, this byte specifies the type of control information.
The frame status byte is only present in Token Ring frames. It contains the A and C
bits.When a frame arrives at the interface of a station with the destination address,
the interface sets the A bit (=1), as it passes through. If the interface copies the
frame to the station, it also sets the C bit (=1). A station might fail to copy a frame
due to lack of buffer space or other reasons.
When the station which sent the frame strips it from the ring, it examines
the A and C bits.The three possible combinations are;
1. A=0 and C=0; Destination not present or powered up.
2. A=1 and C=0; Destination present but frame not accepted.
3. A=1 and C=1; Destination present and frame copied.
This arrangement provides an automatic acknowledgment of the delivery
status of each frame.
IEEE 802.5 (Token Ring)
Hierarchical Setup