SlideShare a Scribd company logo
IEEE 802.4

Token Bus
Token Passing Bus Access Method
Physically, it is a Bus network. Logically, it is a Ring network
Stations are organized as a circular doubly-linked list
A distributed polling algorithm is used to avoid bus contention
Token - Right of access

Token Holder (The station receiving the token)
       Transmit one or more MAC-frame
       Poll other stations
       Receive responses

Non-Token Holder
       Listen to the channel
       Respond to a poll
       Send Acknowledgement
A Token Bus Network
Token Bus Frame



                     0 - 8182/8174
                     Bytes
     SD Field



   ED Field Format
Encoding and Signaling for Carrier Band,
           Phase Continuous
Encoding and Signaling for Carrier Band,
            Phase Coherent
Encoding and Signaling for Broadband
Encoding and Signaling for Optical Fiber
Token Passing in a Token Bus Network




Once received the token, the station either starts to transmit
or passes the token to the next station within one response
window.
Token must be released if no data / control frame is required
to be transmitted. Token control frame is destinated for the
successor.
Token Passing in a Token Bus Network




Token can be held maximum up to th – Token Holding Time.
This value is set at the system initialization time by the
network management process.
Frame priority must be handled within the station itself.
Queues for Service Classes




Each station is internally divided into different priority sub
stations. Token holder first passes the token to the highest
priority substation.
Ring Management
     60                  50                  40
20        50        60        30

                                                  Node
                                                  P      S

10                  20                  30
               30        60        50        20
FC Field Format
Adding a Station
Token holder has the responsibility of periodically granting an
opportunity for new stations to enter the logical ring before it
passes the token.

A Solicit-Successor-1 (SS1) control frame is issued with

   DA         =      Successor’s Address
   Data       =      Null
   Type       =      Control Frame SS1

One response window is reserved for those stations desired to
enter the logical ring and their address is between DA and SA.

If the address of the token-holder has the smallest address in the
logical ring, then a Solicit-Successor-2 frame is issued
Adding a Station … contd
The station desired to enter the logical ring will respond with
a Set-Successor frame with

   DA         =      Token-holder address
   SA                =     Its address
   Data       =      Address of the Sender ( SA )

The Token holder detects the event in the response window
and takes appropriate actions ….

   No Response       : Pass token to the next station
   One Response      : Pass token to the newly added station.

   The newly added station will update its Successor value
   by the DA field of the previously received Solicit-
   Successor-1 frame.
Adding a Station … contd
Multiple Responses
A Resolve-Contention frame is issued by the token-holder with

DA      =        Garbage
SA      =        TS

A station desired to enter the logical ring will response with a Set-
Successor frame as before at the K th window, where K is determined by
the value of the first two bits of its address. However, if the channel is
detected busy before the Kth window, it will give up.

If no valid Set-Successor frame is received by the token-holder, the token-
holder will issue another Resolve-Contention frame.

Now only those stations involved in the contention may try again. The
value of K now is determined by the next two bits. The above procedure is
repeated until a valid Set-Successor frame is received by the token-
holder. A new station is thus successfully added to the logical ring.
Adding a Station … Graphical Illustration
                                                    40
                                                              A
                                                          D AT 0
                                                        SA 0 4 S
                                                          4
                                                    DA 50
                   50
                            30
                                                                                                          ion
                                                2

                  60                                                                                   tat
                     SA 0 S1
                                                                                                     dS
                   A 0 5S
                                                                                                de
                                                                30                            ad
 60
                  D 3
                                                                         20                ly
       50                                                                               New
                                                               50
             1

20

                                 20                                           40
                                      60                                           30
                             30                                               50

                                            50
                                                    40
                                           60

                                                                                    30
             60                                                                            20
                       50
                                                                                   40
            20

                                                          20
                                                                    60
                                                         30
Adding a Station … Graphical Illustration
Adding a Station … Special Case
Usually, Successor < Node. But there is one station whose
Successor > Node (The one with the smallest address in the
logical ring). In this case Solicit-Successor-2 (SS2) frame is
issued followed by two Response Windows.

The first response window is reserved for stations (X) whose
address is less than this station.

The second response window is reserved for stations (Y) whose
address is greater than its successor.

Stations in Y will respond with the Set-Successor frame only if
there is no response in the first response window.
Adding a Station … Graphical Illustration
Deleting a Station
The station wishes to be deleted may wait until it receives the
token, then sends a Set-Successor frame to its Predecessor, with
       DA     =       Predecessor Address
       SA     =       This Node
       Data   =       Successor Address

The previous station ( DA ) once receives the Set-Successor
frame will modify its Successor and send a token to its new next
station.
The Successor station once receives the Token frame will modify
its Predecessor accordingly.
After these two modifications, the station is removed from the
logical ring automatically.
If the station fails, it will not receive the token. This will be
detected by the token-sender as explained later.
Deleting a Station … Graphical Illustration
Fault Management

One of the most important issues of the token-bus protocol is to
maintain the logical ring under the following possible conditions

   Multiple Tokens
   Unaccepted Token
   Failed Station
   Failed Receiver
   No Token
Multiple Token

Cause
   Noise
   Duplicate Address, each one may "receive" a token

Detection
   While holding the token, the station may hear a frame on
   the bus which indicating that another station also has a
   token.

Action
   Drop the token
   If all stations drop the token, the network becomes the case
   of no token (see the procedure of handling no token later)
Unaccepted Token or Failed Station
Cause
   The token passed to the next station may be garbled
   The next station fails

Detection
   No response (Channel is idle) in one response window

Action
   Try to pass token one more time
   It still no response, then the next station is assumed to have
   failed
   The token holder then issues a Who-Follows frame with

       DA   =        Garbage
       SA   =        This Node
       Data =        Successor
Unaccepted Token or Failed Station
All other stations once received Who-Follows frame will
compare the data with its Predecessor value. If there is a
match, it will issue a Set-Successor frame back. 3 response
windows are reserved after Who-Follows. The first 2 are
needed to make a comparison.

If no response to the Who-Follows frame, the above
procedure will be tried one more time.

If still no response to the Who-Follows frame, then it could
be that the next station to the next station has also failed.

The token-holder will try to establish the ring by issuing a
Solicit-Successor-2 frame, with
DA   =      This Node
Failed Station … Graphical Illustration

                 60                                   50
           10              50                    60         30

                 1
                          DA SA
                 2              50     T
                                      60
                          DA SA DATA                                  DA SA DATA
                 3           XX 60  W
                                   50                            4        60 30  30   S
     10                                          20                       30
20         60                               30         10            50         20



                     60                                50
            10              30
                           DA SA
                      5
                                 30    60
                                        T




      10                                          20                       30
 20         60                               30            10         60         20
Unaccepted Token or Failed Station
DA = SA = This Node implies that every station is invited to
respond. Two response windows are reserved after this frame.
The first response window is reserved for stations whose
address is less than the sender.
The second response window is reserved for stations whose
address is greater than the sender.
The procedure of add a station is then used.
If still no response to the Solicit frame, then either all stations
have failed (Left the ring) or its own receiver has failed (so it
cannot listen).
If the only one station has something to send, it sends the data.
Then repeat the token passing process. Otherwise, listen to the
channel.
Failed Station … Graphical Illustration
No Token or Initialization
Cause
  The Token-holder station fails
  The token is destroyed
  Network Initialization
Detection
  No channel activity has been heard for a certain amount
   of time (Bus-Idle Timer expired)
Action
  Any station when its Bus-Idle timer is expired will issue a
   Claim-Token frame, with

     DA      =     Garbage
     SA      =     This Node
No Token or Initialization
The station with the greatest address will get the
token. This is done by comparing the address. Two
bits of the address are compared at a time.
In each pass, only those stations who transmitted
the longest frame on the previous pass try again.
The station that succeeds on the last pass considers
itself the token holder.
The difference is 2 slots in the frame padding. The
station waits one slot for its or other frame to pass.
It then samples the channel at the second slot.
The logical ring can then be established by issuing
Solicit-Successor frames as described before.

More Related Content

What's hot

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi
 
Sonet
Sonet Sonet
Sonet
kongara
 
wired lans
wired lanswired lans
wired lanshoadqbk
 
IPv6
IPv6IPv6
The Network Layer
The Network LayerThe Network Layer
The Network Layer
adil raja
 
Data link layer
Data link layerData link layer
Data link layer
Abdul MaTéèñ
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde
 
The Physical Layer
The Physical LayerThe Physical Layer
The Physical Layer
adil raja
 
25 DNS
25 DNS25 DNS
25 DNS
Ahmar Hashmi
 
Subnetting
SubnettingSubnetting
Subnetting
selvakumar_b1985
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDon Norwood
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmissionSaba Rathinam
 
4. block coding
4. block coding 4. block coding
4. block coding
MdFazleRabbi18
 
frequency re use nb
frequency re use nbfrequency re use nb
frequency re use nb
AJAL A J
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
Faisal Mehmood
 
Network Layer
Network LayerNetwork Layer
Network LayerGhaffar Khan
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 

What's hot (20)

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
C I D R
C I D RC I D R
C I D R
 
Sonet
Sonet Sonet
Sonet
 
wired lans
wired lanswired lans
wired lans
 
IPv6
IPv6IPv6
IPv6
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
Data link layer
Data link layerData link layer
Data link layer
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
The Physical Layer
The Physical LayerThe Physical Layer
The Physical Layer
 
25 DNS
25 DNS25 DNS
25 DNS
 
Subnetting
SubnettingSubnetting
Subnetting
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
4. block coding
4. block coding 4. block coding
4. block coding
 
frequency re use nb
frequency re use nbfrequency re use nb
frequency re use nb
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 

Viewers also liked

token bus
 token bus token bus
token busiamvisakh
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
Vicky Kumar
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Token ring
Token ringToken ring
Token ring
selvakumar_b1985
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
Adil Mehmoood
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess)
Rajan Kandel
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
Eslam Abdou
 
Ieee 802
Ieee 802Ieee 802
Ieee 802
Ankita Tiwari
 
Panduit EMEA SI Webinar 6
Panduit EMEA SI Webinar 6Panduit EMEA SI Webinar 6
Panduit EMEA SI Webinar 6
Panduit
 
Panduit EMEA SI Webinar 4
Panduit EMEA SI Webinar 4Panduit EMEA SI Webinar 4
Panduit EMEA SI Webinar 4
Panduit
 
Panduit Signature Core Fiber Optic Cabling System
Panduit Signature Core Fiber Optic Cabling SystemPanduit Signature Core Fiber Optic Cabling System
Panduit Signature Core Fiber Optic Cabling System
Panduit
 
Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8
Panduit
 
Panduit EMEA SI Webinar 10
Panduit EMEA SI Webinar 10Panduit EMEA SI Webinar 10
Panduit EMEA SI Webinar 10
Panduit
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
Panduit EMEA SI Webinar 3
Panduit EMEA SI Webinar 3Panduit EMEA SI Webinar 3
Panduit EMEA SI Webinar 3
Panduit
 
Panduit EMEA SI Webinar 1
Panduit EMEA SI Webinar 1Panduit EMEA SI Webinar 1
Panduit EMEA SI Webinar 1
Panduit
 
Panduit EMEA SI Webinar 2
Panduit EMEA SI Webinar 2Panduit EMEA SI Webinar 2
Panduit EMEA SI Webinar 2
Panduit
 

Viewers also liked (20)

token bus
 token bus token bus
token bus
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Token ring
Token ringToken ring
Token ring
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess)
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Man
ManMan
Man
 
Ieee 802
Ieee 802Ieee 802
Ieee 802
 
Panduit EMEA SI Webinar 6
Panduit EMEA SI Webinar 6Panduit EMEA SI Webinar 6
Panduit EMEA SI Webinar 6
 
Panduit EMEA SI Webinar 4
Panduit EMEA SI Webinar 4Panduit EMEA SI Webinar 4
Panduit EMEA SI Webinar 4
 
Panduit Signature Core Fiber Optic Cabling System
Panduit Signature Core Fiber Optic Cabling SystemPanduit Signature Core Fiber Optic Cabling System
Panduit Signature Core Fiber Optic Cabling System
 
Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8
 
Panduit EMEA SI Webinar 10
Panduit EMEA SI Webinar 10Panduit EMEA SI Webinar 10
Panduit EMEA SI Webinar 10
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Panduit EMEA SI Webinar 3
Panduit EMEA SI Webinar 3Panduit EMEA SI Webinar 3
Panduit EMEA SI Webinar 3
 
Panduit EMEA SI Webinar 1
Panduit EMEA SI Webinar 1Panduit EMEA SI Webinar 1
Panduit EMEA SI Webinar 1
 
Panduit EMEA SI Webinar 2
Panduit EMEA SI Webinar 2Panduit EMEA SI Webinar 2
Panduit EMEA SI Webinar 2
 

Similar to Token bus standard

Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloysConstitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
Alumat Almax Group
 
Villar ciasem 2007
Villar ciasem 2007Villar ciasem 2007
Villar ciasem 2007Karina Mello
 
Q-Learning and Pontryagin's Minimum Principle
Q-Learning and Pontryagin's Minimum PrincipleQ-Learning and Pontryagin's Minimum Principle
Q-Learning and Pontryagin's Minimum Principle
Sean Meyn
 
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
Tsuyoshi Horigome
 
SPICE MODEL of PAT160-50T in SPICE PARK
SPICE MODEL of PAT160-50T in SPICE PARKSPICE MODEL of PAT160-50T in SPICE PARK
SPICE MODEL of PAT160-50T in SPICE PARK
Tsuyoshi Horigome
 
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
Tsuyoshi Horigome
 
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
Tsuyoshi Horigome
 

Similar to Token bus standard (8)

Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloysConstitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
 
Villar ciasem 2007
Villar ciasem 2007Villar ciasem 2007
Villar ciasem 2007
 
Q-Learning and Pontryagin's Minimum Principle
Q-Learning and Pontryagin's Minimum PrincipleQ-Learning and Pontryagin's Minimum Principle
Q-Learning and Pontryagin's Minimum Principle
 
5
55
5
 
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
 
SPICE MODEL of PAT160-50T in SPICE PARK
SPICE MODEL of PAT160-50T in SPICE PARKSPICE MODEL of PAT160-50T in SPICE PARK
SPICE MODEL of PAT160-50T in SPICE PARK
 
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
 
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
 

More from Dhaval Kaneria

Swine flu
Swine flu Swine flu
Swine flu
Dhaval Kaneria
 
Introduction of Xcode
Introduction of XcodeIntroduction of Xcode
Introduction of Xcode
Dhaval Kaneria
 
Objective-C for iOS Application Development
Objective-C for iOS Application DevelopmentObjective-C for iOS Application Development
Objective-C for iOS Application Development
Dhaval Kaneria
 
Gpu with cuda architecture
Gpu with cuda architectureGpu with cuda architecture
Gpu with cuda architecture
Dhaval Kaneria
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and Algorithm
Dhaval Kaneria
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and AlgorithmDhaval Kaneria
 
open source hardware
open source hardwareopen source hardware
open source hardware
Dhaval Kaneria
 
Serial Peripheral Interface(SPI)
Serial Peripheral Interface(SPI)Serial Peripheral Interface(SPI)
Serial Peripheral Interface(SPI)
Dhaval Kaneria
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
Dhaval Kaneria
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedureDhaval Kaneria
 
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
Dhaval Kaneria
 
VERILOG CODE
VERILOG CODEVERILOG CODE
VERILOG CODE
Dhaval Kaneria
 
8 bit single cycle processor
8 bit single cycle processor8 bit single cycle processor
8 bit single cycle processor
Dhaval Kaneria
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
PAPER ON MEMS TECHNOLOGY
PAPER ON MEMS TECHNOLOGYPAPER ON MEMS TECHNOLOGY
PAPER ON MEMS TECHNOLOGY
Dhaval Kaneria
 
VIdeo Compression using sum of Absolute Difference
VIdeo Compression using sum of Absolute DifferenceVIdeo Compression using sum of Absolute Difference
VIdeo Compression using sum of Absolute Difference
Dhaval Kaneria
 
Mems technology
Mems technologyMems technology
Mems technology
Dhaval Kaneria
 
Network security
Network securityNetwork security
Network security
Dhaval Kaneria
 

More from Dhaval Kaneria (20)

Swine flu
Swine flu Swine flu
Swine flu
 
Introduction of Xcode
Introduction of XcodeIntroduction of Xcode
Introduction of Xcode
 
Objective-C for iOS Application Development
Objective-C for iOS Application DevelopmentObjective-C for iOS Application Development
Objective-C for iOS Application Development
 
Gpu with cuda architecture
Gpu with cuda architectureGpu with cuda architecture
Gpu with cuda architecture
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and Algorithm
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and Algorithm
 
HDMI
HDMIHDMI
HDMI
 
Hdmi
HdmiHdmi
Hdmi
 
open source hardware
open source hardwareopen source hardware
open source hardware
 
Serial Peripheral Interface(SPI)
Serial Peripheral Interface(SPI)Serial Peripheral Interface(SPI)
Serial Peripheral Interface(SPI)
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
 
VERILOG CODE
VERILOG CODEVERILOG CODE
VERILOG CODE
 
8 bit single cycle processor
8 bit single cycle processor8 bit single cycle processor
8 bit single cycle processor
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
PAPER ON MEMS TECHNOLOGY
PAPER ON MEMS TECHNOLOGYPAPER ON MEMS TECHNOLOGY
PAPER ON MEMS TECHNOLOGY
 
VIdeo Compression using sum of Absolute Difference
VIdeo Compression using sum of Absolute DifferenceVIdeo Compression using sum of Absolute Difference
VIdeo Compression using sum of Absolute Difference
 
Mems technology
Mems technologyMems technology
Mems technology
 
Network security
Network securityNetwork security
Network security
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Token bus standard

  • 2. Token Passing Bus Access Method Physically, it is a Bus network. Logically, it is a Ring network Stations are organized as a circular doubly-linked list A distributed polling algorithm is used to avoid bus contention Token - Right of access Token Holder (The station receiving the token) Transmit one or more MAC-frame Poll other stations Receive responses Non-Token Holder Listen to the channel Respond to a poll Send Acknowledgement
  • 3. A Token Bus Network
  • 4. Token Bus Frame 0 - 8182/8174 Bytes SD Field ED Field Format
  • 5. Encoding and Signaling for Carrier Band, Phase Continuous
  • 6. Encoding and Signaling for Carrier Band, Phase Coherent
  • 7. Encoding and Signaling for Broadband
  • 8. Encoding and Signaling for Optical Fiber
  • 9. Token Passing in a Token Bus Network Once received the token, the station either starts to transmit or passes the token to the next station within one response window. Token must be released if no data / control frame is required to be transmitted. Token control frame is destinated for the successor.
  • 10. Token Passing in a Token Bus Network Token can be held maximum up to th – Token Holding Time. This value is set at the system initialization time by the network management process. Frame priority must be handled within the station itself.
  • 11. Queues for Service Classes Each station is internally divided into different priority sub stations. Token holder first passes the token to the highest priority substation.
  • 12. Ring Management 60 50 40 20 50 60 30 Node P S 10 20 30 30 60 50 20
  • 14. Adding a Station Token holder has the responsibility of periodically granting an opportunity for new stations to enter the logical ring before it passes the token. A Solicit-Successor-1 (SS1) control frame is issued with DA = Successor’s Address Data = Null Type = Control Frame SS1 One response window is reserved for those stations desired to enter the logical ring and their address is between DA and SA. If the address of the token-holder has the smallest address in the logical ring, then a Solicit-Successor-2 frame is issued
  • 15. Adding a Station … contd The station desired to enter the logical ring will respond with a Set-Successor frame with DA = Token-holder address SA = Its address Data = Address of the Sender ( SA ) The Token holder detects the event in the response window and takes appropriate actions …. No Response : Pass token to the next station One Response : Pass token to the newly added station. The newly added station will update its Successor value by the DA field of the previously received Solicit- Successor-1 frame.
  • 16. Adding a Station … contd Multiple Responses A Resolve-Contention frame is issued by the token-holder with DA = Garbage SA = TS A station desired to enter the logical ring will response with a Set- Successor frame as before at the K th window, where K is determined by the value of the first two bits of its address. However, if the channel is detected busy before the Kth window, it will give up. If no valid Set-Successor frame is received by the token-holder, the token- holder will issue another Resolve-Contention frame. Now only those stations involved in the contention may try again. The value of K now is determined by the next two bits. The above procedure is repeated until a valid Set-Successor frame is received by the token- holder. A new station is thus successfully added to the logical ring.
  • 17. Adding a Station … Graphical Illustration 40 A D AT 0 SA 0 4 S 4 DA 50 50 30 ion 2 60 tat SA 0 S1 dS A 0 5S de 30 ad 60 D 3 20 ly 50 New 50 1 20 20 40 60 30 30 50 50 40 60 30 60 20 50 40 20 20 60 30
  • 18. Adding a Station … Graphical Illustration
  • 19. Adding a Station … Special Case Usually, Successor < Node. But there is one station whose Successor > Node (The one with the smallest address in the logical ring). In this case Solicit-Successor-2 (SS2) frame is issued followed by two Response Windows. The first response window is reserved for stations (X) whose address is less than this station. The second response window is reserved for stations (Y) whose address is greater than its successor. Stations in Y will respond with the Set-Successor frame only if there is no response in the first response window.
  • 20. Adding a Station … Graphical Illustration
  • 21. Deleting a Station The station wishes to be deleted may wait until it receives the token, then sends a Set-Successor frame to its Predecessor, with DA = Predecessor Address SA = This Node Data = Successor Address The previous station ( DA ) once receives the Set-Successor frame will modify its Successor and send a token to its new next station. The Successor station once receives the Token frame will modify its Predecessor accordingly. After these two modifications, the station is removed from the logical ring automatically. If the station fails, it will not receive the token. This will be detected by the token-sender as explained later.
  • 22. Deleting a Station … Graphical Illustration
  • 23. Fault Management One of the most important issues of the token-bus protocol is to maintain the logical ring under the following possible conditions Multiple Tokens Unaccepted Token Failed Station Failed Receiver No Token
  • 24. Multiple Token Cause Noise Duplicate Address, each one may "receive" a token Detection While holding the token, the station may hear a frame on the bus which indicating that another station also has a token. Action Drop the token If all stations drop the token, the network becomes the case of no token (see the procedure of handling no token later)
  • 25. Unaccepted Token or Failed Station Cause The token passed to the next station may be garbled The next station fails Detection No response (Channel is idle) in one response window Action Try to pass token one more time It still no response, then the next station is assumed to have failed The token holder then issues a Who-Follows frame with DA = Garbage SA = This Node Data = Successor
  • 26. Unaccepted Token or Failed Station All other stations once received Who-Follows frame will compare the data with its Predecessor value. If there is a match, it will issue a Set-Successor frame back. 3 response windows are reserved after Who-Follows. The first 2 are needed to make a comparison. If no response to the Who-Follows frame, the above procedure will be tried one more time. If still no response to the Who-Follows frame, then it could be that the next station to the next station has also failed. The token-holder will try to establish the ring by issuing a Solicit-Successor-2 frame, with DA = This Node
  • 27. Failed Station … Graphical Illustration 60 50 10 50 60 30 1 DA SA 2 50 T 60 DA SA DATA DA SA DATA 3 XX 60 W 50 4 60 30 30 S 10 20 30 20 60 30 10 50 20 60 50 10 30 DA SA 5 30 60 T 10 20 30 20 60 30 10 60 20
  • 28. Unaccepted Token or Failed Station DA = SA = This Node implies that every station is invited to respond. Two response windows are reserved after this frame. The first response window is reserved for stations whose address is less than the sender. The second response window is reserved for stations whose address is greater than the sender. The procedure of add a station is then used. If still no response to the Solicit frame, then either all stations have failed (Left the ring) or its own receiver has failed (so it cannot listen). If the only one station has something to send, it sends the data. Then repeat the token passing process. Otherwise, listen to the channel.
  • 29. Failed Station … Graphical Illustration
  • 30. No Token or Initialization Cause The Token-holder station fails The token is destroyed Network Initialization Detection No channel activity has been heard for a certain amount of time (Bus-Idle Timer expired) Action Any station when its Bus-Idle timer is expired will issue a Claim-Token frame, with DA = Garbage SA = This Node
  • 31. No Token or Initialization The station with the greatest address will get the token. This is done by comparing the address. Two bits of the address are compared at a time. In each pass, only those stations who transmitted the longest frame on the previous pass try again. The station that succeeds on the last pass considers itself the token holder. The difference is 2 slots in the frame padding. The station waits one slot for its or other frame to pass. It then samples the channel at the second slot. The logical ring can then be established by issuing Solicit-Successor frames as described before.