SlideShare a Scribd company logo
1 of 35
TOKEN BUS
TOKEN RING
Mrs.R.Shanthi Prabha M.Sc., M.Phil.,
Assistant Professor,
DEPARTMENT OF Computer Science
IEEE 802 Subgroups and their
Responsibilities
 802.1
 Internetworking
 802.2
 Logical Link Control (LLC)
 802.3
 CSMA/CD
 802.4
 Token Bus LAN
IEEE 802 Subgroups and their
Responsibilities (Cont.)
 802.5
 Token Ring LAN
 802.6
 Metropolitan Area Network
 802.7
 Broadband Technical Advisory Group
 802.8
 Fiber-Optic Technical Advisory Group
IEEE 802 Subgroups and their
Responsibilities (Cont.)
 802.9
 Integrated Voice/Data Networks
 802.10
 Network Security
 802.11
 Wireless Networks
 802.12
 Demand Priority Access LANs
 Ex: 100BaseVG-AnyLAN
Local Area Network Technology
 There are two types of token-passing
architectures:
 Token Bus is similar to Ethernet because all clients
are on a common bus and can pick up
transmissions from all other stations
 Token Ring is different from Token Bus in that the
clients are set up in a true physical ring structure
Token Passing Standards
 IEEE 802.5
 For the token-ring LANs
 IEEE 802.4
 For the token-bus LANs
 A FDDI protocol is used on large fiber-optic ring
backbones
INTRODUCTION
 Token Ring defines a method for sending and
receiving data between two network-connected
devices
 To communicate in a token-passing environment,
any client must wait until it receives an electronic
token
 The token is a special frame that is transmitted
from one device to the next
TOKEN RING
 Token ring LAN are logically organized in a ring
topology with data being transmitted sequentially
from one ring station to the next with a control token
circulating around the ring controlling access.
 This token passing mechanism is shared
by ARCNET, token bus, and FDDI, and has
theoretical advantages over
the stochastic CSMA/CD of Ethernet.
TOKEN RING
 Token ring local area network (LAN)
technology is a protocol which resides at
the data link layer (DLL) of the OSI model.
 It uses a special three-byte frame called a
token that travels around the ring.
 Token
 Data packet that could carry data
 Circulates around the ring
 Offers an opportunity for each workstation and
server to transmit data.
IEEE 802.5 and Token Ring
 Proposed in 1969 and initially referred to as a
Newhall ring.
Token ring :: a number of stations connected by
transmission links in a ring topology.
Information flows in one direction along the
ring from source to destination and back to
source.
Medium access control is provided by a small
frame, the token, that circulates around the
ring when all stations are idle. Only the
station possessing the token is allowed to
transmit at any given time.
Token Ring Operation
 When a station wishes to transmit, it must wait
for token to pass by and seize the token.
 One approach: change one bit in token which
transforms it into a “start-of-frame sequence” and
appends frame for transmission.
 Second approach: station claims token by removing it
from the ring.
 Frame circles the ring and is removed by the
transmitting station.
 Each station interrogates passing frame, if
destined for station, it copies the frame into
local buffer.
IEEE 802.5 Token Ring
 4 and 16 Mbps using twisted-pair cabling with
differential Manchester line encoding.
 Maximum number of stations is 250.
 Waits for last byte of frame to arrive before
reinserting token on ring {new token after
received}.
 8 priority levels provided via two 3-bit fields
(priority and reservation) in data and token
frames.
 Permits 16-bit and 48-bit addresses (same as
802.3).
Token Ring
 Under light load – delay is added due to
waiting for the token.
 Under heavy load – ring is “round-robin”
 The ring must be long enough to hold the
complete token.
 Advantages – fair access
 Disadvantages – ring is single point of failure,
added issues due to token maintenance.
Token Maintenance Issues
What can go wrong?
 Loss of token (no token circulating)
 Duplication of token (forgeries or mistakes)
The need to designate one station as the active
ring monitor.
 Persistently circulating frame
 Deal with active monitor going down.
A Token Bus Network
Token Passing in a Token Bus Network
Token Passing in a Token Bus Network
Token Bus
Server
Client Client Client
Token
A token is distributed to each client in turn.
TOKEN FRAME
 When no station is transmitting a data frame, a
special token frame circles the loop.
 This special token frame is repeated from station
to station until arriving at a station that needs to
transmit data.
TOKEN FRAME
 When a station needs to transmit data, it converts
the token frame into a data frame for
transmission. Once the sending station receives
its own data frame, it converts the frame back into
a token.
TOKEN FRAME PRIORITY
 Token ring specifies an optional medium access scheme
allowing a station with a high-priority transmission to request
priority access to the token.
 8 priority levels, 0–7, are used.
 When the station wishing to transmit receives a token or data
frame with a priority less than or equal to the station's
requested priority, it sets the priority bits to its desired priority.
The station does not immediately transmit; the token
circulates around the medium until it returns to the station.
FRAME FORMAT
 A data token ring frame is an expanded version of
the token frame that is used by stations to
transmit media access control (MAC)
management frames or data frames from upper
layer protocols and applications.
SD
Destination
Address
Source
Address
Information FCS
1 4
ED
FC
2 or 6 2 or 6
1 1
AC
1
FS
1
SD AC ED
Token Frame Format
P P P T M R R R
Access
control
PPP Priority; T Token bit
M Monitor bit; RRR Reservation
Frame
control
FF frame type
ZZZZZZ control bit
F F Z Z Z Z Z Z
Ending
delimiter
I intermediate-frame bit
E error-detection bit
Frame
status
A address-recognized
bit
xx undefined
C frame-copied bit
I E
J K 1 J K 1
A C x x A C x x
Data Frame Format
Starting
delimiter
J, K non-data symbols (line code)
0 0
J K 0 J K 0
IEEE 802.5 Token and data frame structure
Token Bus Data Pickup
 A token is sent from one node to the other
 The client wanting to transmit grabs an empty
token
 Data is attached
 Token leaves for the next node and its travel on
the bus until it reaches the address to which the
data is destined
Token Bus Data Delivery
 Token delivers the data to the addressee
 Acknowledgement is returned to the sender
 Token is passed to the next node
 The process continues
 If there is an error in delivering the
information, a request for retransmission
attached to the token and it is sent to the
sender
Token Bus Standard and
Applications
 IEEE 802.4
 It can be used in both broadband and baseband
transmission
Token Passing Protocol in
Operation
Circulating
Token
Server Workstation
Workstation
•No collisions
Comparison with CSMA/CD
 Absence of collision
 Offers a systematic method of transmitting
information
 In theory, it is superior to CSMA/CD
 More sophisticated to implement
 Protocols used in the newer and most popular
networks are, however, based on CSMA/CD
The Transmitting Workstation
 Waits for a free token in order to be able to
attach the data to be transmitted to the token
 On finding a free token, attach the following:
 Sender’s address
 Receiver’s address
 Data block to be transmitted
 Error checking details
 etc.
At the Receiving End
 Data is received and checked for errors
 Outcomes at the receiving end
 Data received without errors
 Date received with errors
Error-free Delivery of Data
 An acknowledgment is attached to the token
 Acknowledgment is passed to the sender
 Token is set free for other nodes to transmit
information
 At this time, the next workstation on the ring will
receive an opportunity
Correcting Errors in Delivery
 A request for retransmission is attached to the
token
 Token carries the message for retransmission to
the sender
 The data is thus retransmitted
Token Regeneration
 The token is regenerated at regular intervals to
sustain the timing of circulation of the token
Usage of Token Passing
 Used extensively in ring LANs
 Especially in the IBM token-ring LAN
 A version of this protocol is also used on certain
types of bus LANs
 Token-bus networks
 Used in large fiber-optics backbones
 Used for the construction of very large networks
Usage in Practice
 Used in backbones
 Uses in a number of IBM shops
 Overall, the usage of Ethernet surpasses the
usage of Token-Ring networks that are based on
the Token-Passing protocol

More Related Content

What's hot

Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)ymghorpade
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point ProtocolPhan Vuong
 
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS garishma bhatia
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsPeter R. Egli
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerFaizan Shaikh
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing marwan aldulaimy
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)rahuldaredia21
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring Hareem Naz
 

What's hot (20)

Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
Transport layer
Transport layerTransport layer
Transport layer
 
Token bus
Token busToken bus
Token bus
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Csma
CsmaCsma
Csma
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
TCP IP Model | Computer Science
TCP IP Model | Computer ScienceTCP IP Model | Computer Science
TCP IP Model | Computer Science
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 

Similar to IEEE 802 Subgroups Responsibilities Token Bus Token Ring

Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5Pnkj_Sharma
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area networkRiteshKumar630578
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)Anup Bista
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressingAnitha Selvan
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answersAmit Tiwari
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxMeenaAnusha1
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyDeepak John
 

Similar to IEEE 802 Subgroups Responsibilities Token Bus Token Ring (20)

Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Ethernet
EthernetEthernet
Ethernet
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
III_UNIT.ppt
III_UNIT.pptIII_UNIT.ppt
III_UNIT.ppt
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
 
datalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptxdatalinklayer-200201062315 (1).pptx
datalinklayer-200201062315 (1).pptx
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 

More from shanthishyam

C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptshanthishyam
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptshanthishyam
 
SINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptSINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptshanthishyam
 
FDS- Basic Concepts.ppt
FDS- Basic Concepts.pptFDS- Basic Concepts.ppt
FDS- Basic Concepts.pptshanthishyam
 
Three dimensional geometric transformations
Three dimensional geometric transformationsThree dimensional geometric transformations
Three dimensional geometric transformationsshanthishyam
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelshanthishyam
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityshanthishyam
 

More from shanthishyam (10)

C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
 
SINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.pptSINGLE SOURCE SHORTEST PATH.ppt
SINGLE SOURCE SHORTEST PATH.ppt
 
FDS- Basic Concepts.ppt
FDS- Basic Concepts.pptFDS- Basic Concepts.ppt
FDS- Basic Concepts.ppt
 
Three dimensional geometric transformations
Three dimensional geometric transformationsThree dimensional geometric transformations
Three dimensional geometric transformations
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 
Curve modeling
Curve modelingCurve modeling
Curve modeling
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Computer networks
Computer networksComputer networks
Computer networks
 

Recently uploaded

All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 

Recently uploaded (20)

All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 

IEEE 802 Subgroups Responsibilities Token Bus Token Ring

  • 1. TOKEN BUS TOKEN RING Mrs.R.Shanthi Prabha M.Sc., M.Phil., Assistant Professor, DEPARTMENT OF Computer Science
  • 2. IEEE 802 Subgroups and their Responsibilities  802.1  Internetworking  802.2  Logical Link Control (LLC)  802.3  CSMA/CD  802.4  Token Bus LAN
  • 3. IEEE 802 Subgroups and their Responsibilities (Cont.)  802.5  Token Ring LAN  802.6  Metropolitan Area Network  802.7  Broadband Technical Advisory Group  802.8  Fiber-Optic Technical Advisory Group
  • 4. IEEE 802 Subgroups and their Responsibilities (Cont.)  802.9  Integrated Voice/Data Networks  802.10  Network Security  802.11  Wireless Networks  802.12  Demand Priority Access LANs  Ex: 100BaseVG-AnyLAN
  • 5. Local Area Network Technology  There are two types of token-passing architectures:  Token Bus is similar to Ethernet because all clients are on a common bus and can pick up transmissions from all other stations  Token Ring is different from Token Bus in that the clients are set up in a true physical ring structure
  • 6. Token Passing Standards  IEEE 802.5  For the token-ring LANs  IEEE 802.4  For the token-bus LANs  A FDDI protocol is used on large fiber-optic ring backbones
  • 7. INTRODUCTION  Token Ring defines a method for sending and receiving data between two network-connected devices  To communicate in a token-passing environment, any client must wait until it receives an electronic token  The token is a special frame that is transmitted from one device to the next
  • 8. TOKEN RING  Token ring LAN are logically organized in a ring topology with data being transmitted sequentially from one ring station to the next with a control token circulating around the ring controlling access.  This token passing mechanism is shared by ARCNET, token bus, and FDDI, and has theoretical advantages over the stochastic CSMA/CD of Ethernet.
  • 9. TOKEN RING  Token ring local area network (LAN) technology is a protocol which resides at the data link layer (DLL) of the OSI model.  It uses a special three-byte frame called a token that travels around the ring.  Token  Data packet that could carry data  Circulates around the ring  Offers an opportunity for each workstation and server to transmit data.
  • 10. IEEE 802.5 and Token Ring  Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations connected by transmission links in a ring topology. Information flows in one direction along the ring from source to destination and back to source. Medium access control is provided by a small frame, the token, that circulates around the ring when all stations are idle. Only the station possessing the token is allowed to transmit at any given time.
  • 11. Token Ring Operation  When a station wishes to transmit, it must wait for token to pass by and seize the token.  One approach: change one bit in token which transforms it into a “start-of-frame sequence” and appends frame for transmission.  Second approach: station claims token by removing it from the ring.  Frame circles the ring and is removed by the transmitting station.  Each station interrogates passing frame, if destined for station, it copies the frame into local buffer.
  • 12. IEEE 802.5 Token Ring  4 and 16 Mbps using twisted-pair cabling with differential Manchester line encoding.  Maximum number of stations is 250.  Waits for last byte of frame to arrive before reinserting token on ring {new token after received}.  8 priority levels provided via two 3-bit fields (priority and reservation) in data and token frames.  Permits 16-bit and 48-bit addresses (same as 802.3).
  • 13. Token Ring  Under light load – delay is added due to waiting for the token.  Under heavy load – ring is “round-robin”  The ring must be long enough to hold the complete token.  Advantages – fair access  Disadvantages – ring is single point of failure, added issues due to token maintenance.
  • 14. Token Maintenance Issues What can go wrong?  Loss of token (no token circulating)  Duplication of token (forgeries or mistakes) The need to designate one station as the active ring monitor.  Persistently circulating frame  Deal with active monitor going down.
  • 15. A Token Bus Network
  • 16. Token Passing in a Token Bus Network
  • 17. Token Passing in a Token Bus Network
  • 18. Token Bus Server Client Client Client Token A token is distributed to each client in turn.
  • 19. TOKEN FRAME  When no station is transmitting a data frame, a special token frame circles the loop.  This special token frame is repeated from station to station until arriving at a station that needs to transmit data.
  • 20. TOKEN FRAME  When a station needs to transmit data, it converts the token frame into a data frame for transmission. Once the sending station receives its own data frame, it converts the frame back into a token.
  • 21. TOKEN FRAME PRIORITY  Token ring specifies an optional medium access scheme allowing a station with a high-priority transmission to request priority access to the token.  8 priority levels, 0–7, are used.  When the station wishing to transmit receives a token or data frame with a priority less than or equal to the station's requested priority, it sets the priority bits to its desired priority. The station does not immediately transmit; the token circulates around the medium until it returns to the station.
  • 22. FRAME FORMAT  A data token ring frame is an expanded version of the token frame that is used by stations to transmit media access control (MAC) management frames or data frames from upper layer protocols and applications.
  • 23. SD Destination Address Source Address Information FCS 1 4 ED FC 2 or 6 2 or 6 1 1 AC 1 FS 1 SD AC ED Token Frame Format P P P T M R R R Access control PPP Priority; T Token bit M Monitor bit; RRR Reservation Frame control FF frame type ZZZZZZ control bit F F Z Z Z Z Z Z Ending delimiter I intermediate-frame bit E error-detection bit Frame status A address-recognized bit xx undefined C frame-copied bit I E J K 1 J K 1 A C x x A C x x Data Frame Format Starting delimiter J, K non-data symbols (line code) 0 0 J K 0 J K 0 IEEE 802.5 Token and data frame structure
  • 24. Token Bus Data Pickup  A token is sent from one node to the other  The client wanting to transmit grabs an empty token  Data is attached  Token leaves for the next node and its travel on the bus until it reaches the address to which the data is destined
  • 25. Token Bus Data Delivery  Token delivers the data to the addressee  Acknowledgement is returned to the sender  Token is passed to the next node  The process continues  If there is an error in delivering the information, a request for retransmission attached to the token and it is sent to the sender
  • 26. Token Bus Standard and Applications  IEEE 802.4  It can be used in both broadband and baseband transmission
  • 27. Token Passing Protocol in Operation Circulating Token Server Workstation Workstation •No collisions
  • 28. Comparison with CSMA/CD  Absence of collision  Offers a systematic method of transmitting information  In theory, it is superior to CSMA/CD  More sophisticated to implement  Protocols used in the newer and most popular networks are, however, based on CSMA/CD
  • 29. The Transmitting Workstation  Waits for a free token in order to be able to attach the data to be transmitted to the token  On finding a free token, attach the following:  Sender’s address  Receiver’s address  Data block to be transmitted  Error checking details  etc.
  • 30. At the Receiving End  Data is received and checked for errors  Outcomes at the receiving end  Data received without errors  Date received with errors
  • 31. Error-free Delivery of Data  An acknowledgment is attached to the token  Acknowledgment is passed to the sender  Token is set free for other nodes to transmit information  At this time, the next workstation on the ring will receive an opportunity
  • 32. Correcting Errors in Delivery  A request for retransmission is attached to the token  Token carries the message for retransmission to the sender  The data is thus retransmitted
  • 33. Token Regeneration  The token is regenerated at regular intervals to sustain the timing of circulation of the token
  • 34. Usage of Token Passing  Used extensively in ring LANs  Especially in the IBM token-ring LAN  A version of this protocol is also used on certain types of bus LANs  Token-bus networks  Used in large fiber-optics backbones  Used for the construction of very large networks
  • 35. Usage in Practice  Used in backbones  Uses in a number of IBM shops  Overall, the usage of Ethernet surpasses the usage of Token-Ring networks that are based on the Token-Passing protocol