SlideShare a Scribd company logo
1 of 11
Token Ring
Token Ring
• IEEE 802.5 – Token ring
Token Ring
– set of nodes connected in a ring.
– Data always flow in a particular direction around the ring.
– Each node in the ring receiving the frame from its upstream neighbor and
then forwarding them to its downstream neighbor.
Token – used to access the ring
• Token is a special sequence of bits, circulates around the ring.
• Each node receives and forwards the token.
– When a node sees the token,
• If it has a frame to transmit, it takes the token off the ring and inserts the frame
into the ring.
• Each node along the way simply forwards the frame. Destination node saving
the copy of the frame into the adaptor and forwards the message to the next
node.
• When the frame reaches the sender, it strips the frame off the ring and reinserts
the token.
Token Ring Contd…
– Each node in the ring gets a chance to transmit.
– Nodes are serviced in a round robin manner.
Physical Properties
– Uses ring topology.
– Problem – any node or link failure leads to entire network failure.
Solution:
• Connecting each station into the ring using electromechanical relay.
– If station is healthy, relay is opened. i.e., station is included in the ring.
– If station fails, it stops providing power. So relay is closed and the ring
automatically bypasses the station.
Token Ring Contd…
Multi station Access Unit (MSAU)
– Several relays packed into a single box.
– Easy to add / remove stations from the network.
Characteristics:
– Supports 4Mbps or 16Mbps data rate.
– Differential Manchester encoding scheme is used.
– Number of stations in the ring is limited to 250 for IEEE802.5 (260 for IBM
Token ring).
Token Ring Contd…
Token ring Media Access Control
– Network adaptor of the token ring contains a receiver, transmitter and one
or more bits of data storage between them.
– When none of the stations has anything to send, the token circulates around
the ring.
– Ring has enough storage capacity to hold an entire token.
• 1 bit / station
– For example, 24 bit token can circulate in the network having maximum 24
stations.
• But it will not work proper for network having lesser number of stations than
24.
– This will be avoided by “Monitor”
Token Operation:
– Token circulates around the ring, any station that has data to send may seize the
token.
• i.e., it drains the token off the ring and begin sending data.
• Seizing process just involves modifying 1bit in second byte of the token
Token Ring Contd…
– Station that has token can send data.
– Each transmitted packet contains the destination address of the intended
receiver.
• It may be unicast address, multicast address or broadcast address.
– Each node in the ring look inside the packet to see if it is the intended
receiver.
• If so, copies the data frame and pass it to the ring and the packet find the way
back to the sender.
– Then sending station remove the frame from the ring and reinserts the token
to the ring.
Issues:
– How much data a given node is allowed to transmit?
Token Holding Time (THT) – time period given to nodes to hold the token.
• But unfair to stations to other than the station holding the token
• This will be avoided using TRT (Token Rotation Time)
TRT ≤ Active nodes * THT + Ring Latency
Token Ring Contd…
Ring Latency – how long it takes the token to circulate around the ring when
no one has data to send.
Active nodes – number of nodes that have data to send.
Reliable Transmission
– IEEE 802.5 provides reliable data delivery using 2 bits (A&C) in the packet trailer.
– Initially these bits are set to 0.
– When a station sees a frame for which it is the intended recipient,
• It sets A bit into ‘1’
– When it copies the frame into local adaptor buffer,
• It sets the C bit into ‘1’
– When the sender sees the frame come back over the ring
• If A = 0 – receiver is not functioning well.
• If A = 1, but C = 0 then destination does not accepted the frame due to some reason (eg., Lack of
buffer)
Priority Bits:
• The token contains 3 bit priority field.
• Each device that want to transmit the packet assigns a priority to that packet & the device can hold the
token, if the priority is at least as great as tokens priority.
• Lower priority packets circulate for long in ring
Token Release
– Early Release
• After transmitting packet
– Delayed Release
• After removing the packet when it returns to the sender
Token Ring Contd…
Token Ring Maintenance:
– Token rings have a designated monitor.
– The monitor’s job is ensure the health of the token.
– Any station in the ring can become the monitor.
• Monitor is first elected when the ring is first connected or failure of the current
monitor.
– Healthy monitor periodically announces its presence with a special control
message.
• If a station fails to see the control message for some period of time, it will
assume that the monitor has failed and will try to become the monitor.
– When a station decides that a new monitor is needed, it transmits a “Claim
Token” frame, announcing its intent to become the new monitor.
• If the token circulates back to the sender, it can assume that it is OK for it to
become a monitor.
• If some other is trying to become the monitor at the same instant, the sender
might see the “claim token” message from that other station first,
– Highest Address wins
Token Ring Contd…
Roles of Monitor:
• May need to insert additional delay into the ring
• Detecting the missing token
• Watches for a passing token and maintains a timer equal to the maximum
possible token rotation time.
(NumStations * THT) + Ring Latency
Ring Latency – total propagation delay on the ring.
• Checks for corrupted or orphaned frame.
 Corrupted frame – checksum error or invalid formats.
 Orphaned frame – transmitted correctly on the ring, but whose parent died.
i.e., sending station went down before it could remove the frame from the ring.
• Its detected by using a “Monitor” bit.
• Monitor bit is “0” on transmission
• Set to ‘1’ when it passes the monitor first time.
• If the monitor sees a frame with this bit is set, it knows the frame is going by
for the second time and it drains the frame off the ring.
• Detection of dead stations.
 If any station suspects failure on the ring, it can send “beacon” frame to suspect
destination.
• Status of the ring can be established and malfunctioning station can be bypassed in the MSAU
Token Ring Contd…
Frame Format:
– “illegal” Manchester codes in the start and end delimiters.
– Access Control – includes frame priority, reservation priority.
– Frame Control – Demux key that identifies the higher layer protocol.
– 48 bit Destination and source hardware addresses
– Checksum – error detection code
– Frame Status – includes A & C bits

More Related Content

What's hot

Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)ymghorpade
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingDr Rajiv Srivastava
 

What's hot (20)

Connection( less & oriented)
Connection( less & oriented)Connection( less & oriented)
Connection( less & oriented)
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Data link layer
Data link layer Data link layer
Data link layer
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
 

Similar to Token ring

Token ring protocol
Token ring protocolToken ring protocol
Token ring protocolpriyabogra1
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area networkRiteshKumar630578
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxAkarshTomar3
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptxpatrickwang85
 
A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks Nt Arvind
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 

Similar to Token ring (20)

Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Token ring protocol
Token ring protocolToken ring protocol
Token ring protocol
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptx
 
Token Bus.pptx
Token Bus.pptxToken Bus.pptx
Token Bus.pptx
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
FDDI
FDDIFDDI
FDDI
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Token_Ring.pdf
Token_Ring.pdfToken_Ring.pdf
Token_Ring.pdf
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
Data link layer
Data link layerData link layer
Data link layer
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 

More from selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Ethernet
EthernetEthernet
Ethernet
 
Error control
Error controlError control
Error control
 
DNS
DNS DNS
DNS
 
DHCP
DHCPDHCP
DHCP
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 

Token ring

  • 2. Token Ring • IEEE 802.5 – Token ring Token Ring – set of nodes connected in a ring. – Data always flow in a particular direction around the ring. – Each node in the ring receiving the frame from its upstream neighbor and then forwarding them to its downstream neighbor. Token – used to access the ring • Token is a special sequence of bits, circulates around the ring. • Each node receives and forwards the token. – When a node sees the token, • If it has a frame to transmit, it takes the token off the ring and inserts the frame into the ring. • Each node along the way simply forwards the frame. Destination node saving the copy of the frame into the adaptor and forwards the message to the next node. • When the frame reaches the sender, it strips the frame off the ring and reinserts the token.
  • 3. Token Ring Contd… – Each node in the ring gets a chance to transmit. – Nodes are serviced in a round robin manner. Physical Properties – Uses ring topology. – Problem – any node or link failure leads to entire network failure. Solution: • Connecting each station into the ring using electromechanical relay. – If station is healthy, relay is opened. i.e., station is included in the ring. – If station fails, it stops providing power. So relay is closed and the ring automatically bypasses the station.
  • 4. Token Ring Contd… Multi station Access Unit (MSAU) – Several relays packed into a single box. – Easy to add / remove stations from the network. Characteristics: – Supports 4Mbps or 16Mbps data rate. – Differential Manchester encoding scheme is used. – Number of stations in the ring is limited to 250 for IEEE802.5 (260 for IBM Token ring).
  • 5. Token Ring Contd… Token ring Media Access Control – Network adaptor of the token ring contains a receiver, transmitter and one or more bits of data storage between them. – When none of the stations has anything to send, the token circulates around the ring. – Ring has enough storage capacity to hold an entire token. • 1 bit / station – For example, 24 bit token can circulate in the network having maximum 24 stations. • But it will not work proper for network having lesser number of stations than 24. – This will be avoided by “Monitor” Token Operation: – Token circulates around the ring, any station that has data to send may seize the token. • i.e., it drains the token off the ring and begin sending data. • Seizing process just involves modifying 1bit in second byte of the token
  • 6. Token Ring Contd… – Station that has token can send data. – Each transmitted packet contains the destination address of the intended receiver. • It may be unicast address, multicast address or broadcast address. – Each node in the ring look inside the packet to see if it is the intended receiver. • If so, copies the data frame and pass it to the ring and the packet find the way back to the sender. – Then sending station remove the frame from the ring and reinserts the token to the ring. Issues: – How much data a given node is allowed to transmit? Token Holding Time (THT) – time period given to nodes to hold the token. • But unfair to stations to other than the station holding the token • This will be avoided using TRT (Token Rotation Time) TRT ≤ Active nodes * THT + Ring Latency
  • 7. Token Ring Contd… Ring Latency – how long it takes the token to circulate around the ring when no one has data to send. Active nodes – number of nodes that have data to send. Reliable Transmission – IEEE 802.5 provides reliable data delivery using 2 bits (A&C) in the packet trailer. – Initially these bits are set to 0. – When a station sees a frame for which it is the intended recipient, • It sets A bit into ‘1’ – When it copies the frame into local adaptor buffer, • It sets the C bit into ‘1’ – When the sender sees the frame come back over the ring • If A = 0 – receiver is not functioning well. • If A = 1, but C = 0 then destination does not accepted the frame due to some reason (eg., Lack of buffer) Priority Bits: • The token contains 3 bit priority field. • Each device that want to transmit the packet assigns a priority to that packet & the device can hold the token, if the priority is at least as great as tokens priority. • Lower priority packets circulate for long in ring
  • 8. Token Release – Early Release • After transmitting packet – Delayed Release • After removing the packet when it returns to the sender
  • 9. Token Ring Contd… Token Ring Maintenance: – Token rings have a designated monitor. – The monitor’s job is ensure the health of the token. – Any station in the ring can become the monitor. • Monitor is first elected when the ring is first connected or failure of the current monitor. – Healthy monitor periodically announces its presence with a special control message. • If a station fails to see the control message for some period of time, it will assume that the monitor has failed and will try to become the monitor. – When a station decides that a new monitor is needed, it transmits a “Claim Token” frame, announcing its intent to become the new monitor. • If the token circulates back to the sender, it can assume that it is OK for it to become a monitor. • If some other is trying to become the monitor at the same instant, the sender might see the “claim token” message from that other station first, – Highest Address wins
  • 10. Token Ring Contd… Roles of Monitor: • May need to insert additional delay into the ring • Detecting the missing token • Watches for a passing token and maintains a timer equal to the maximum possible token rotation time. (NumStations * THT) + Ring Latency Ring Latency – total propagation delay on the ring. • Checks for corrupted or orphaned frame.  Corrupted frame – checksum error or invalid formats.  Orphaned frame – transmitted correctly on the ring, but whose parent died. i.e., sending station went down before it could remove the frame from the ring. • Its detected by using a “Monitor” bit. • Monitor bit is “0” on transmission • Set to ‘1’ when it passes the monitor first time. • If the monitor sees a frame with this bit is set, it knows the frame is going by for the second time and it drains the frame off the ring. • Detection of dead stations.  If any station suspects failure on the ring, it can send “beacon” frame to suspect destination. • Status of the ring can be established and malfunctioning station can be bypassed in the MSAU
  • 11. Token Ring Contd… Frame Format: – “illegal” Manchester codes in the start and end delimiters. – Access Control – includes frame priority, reservation priority. – Frame Control – Demux key that identifies the higher layer protocol. – 48 bit Destination and source hardware addresses – Checksum – error detection code – Frame Status – includes A & C bits