SlideShare une entreprise Scribd logo
1  sur  19
Computer Networks
Token Rings 802.5
2
Token Rings
• IBM Token Ring & IEEE 802.5
• FDDI
• Resilient Packet Ring IEEE 802.17…
•
IBM Token Rings are the most famous of this series
3
About IBM Token Rings
• Network consists of a set of nodes connected in a
ring & data always flows in particular direction
• Each node receives frames from its upstream node
and transmits to its downstream node
• Token rings share two features with Ethernets
– Requires an algorithm that controls when each node is allowed
to transmit
– All nodes see all frames with destination saving a copy of it
4
Tokens
• Special sequence of bits that circulates around
the ring
– 24 bits in case of 802.5
• When node with a frame to transmit sees the
token, it takes the token off the ring and instead
inserts its own frame on the network
– Frame is forwarded by all nodes while destination too makes a
copy of it and forwards it
– Packet is received again by sender which strips its frame off
the ring and reinserts the token
5
Physical Properties
• Link failure in ring may disrupt transmission of the
whole network
• Electromechanical relay is used to overcome this
problem
• As long as the station is healthy, the relay is open
• When the stations stops powering the relay, it
gets closed and the station is removed from the
network
6
Use of Electromechanical relay
From Previous Host To Next Host
Host
Relay
7
Use of Electromechanical relay
From Previous Host To Next Host
Host
Relay
8
Multi Station Access Unit… MSAU
• Several Electromechanical relays packed into a
single box
• It makes token rings look like a star topology
• Systems are plugged in and out of MSAU
• One of the main differences between 802.5 and
IBM Token Rings is that the latter requires MSAU
– The other difference however can be that that IBM Token
Rings can have up to 260 stations per ring while 802.5 supports
250
– Physical media for IBM is twisted pair but not defined for
802.5
9
Multi Station Access Unit… MSAU
Previous MAUS
Next MAUS
10
Token Ring Media Access Control
• Any station that wants to transmit data, has to
seize the token from the network
• Once the token is seized, transmission can be done
• In 802.5, seizing process involves simply modifying
1 bit in the token, and it acts as a preamble for
the subsequent data packet
11
Data Transmission
• Each transmitted packet contains a destination
address
• As the packet flows past each node on the ring,
each node looks inside the packet to see if it is
the intended recipient
• If so, it copies the packet into its buffer as it
flows through the network adapter
• But it does not remove the packet form the
network
• The sending station has the responsibility of
removing the packet from the ring
• Other stations don’t harm the packet
12
Token Holding Time
• Setting THT to infinity will be dangerous because
other devices wont have fair access to the ring
• Setting THT to one message will be silly
– If node has more packets to send, after every THT it would let
the token circulate around the whole ring before seizing it
again
• Hence it is set to 10ms
– A device should take care of the fact that before transmission
of a packet, whether it got sufficient THT left to transmit this
packet
13
Token Rotation Time
• Time required by token to traverse the ring
• TRT < ActiveNodes * THT + RingLatency
• Active Nodes are the number of nodes that have
data to transmit and Ring Latency is the time a
packet takes to traverse the ring when no node
has data to send… Ideal
14
Reliable Delivery
• A & C bits contained in frame status byte
• Both set to 0 by transmitter
• As the destination station sees the packet, it set
the A-bit to 1
• When the destination station copies the packet
into its buffer successfully, the C bit is set to 1
• At Sender again
– A=1 & C=1 means Successful Delivery
– A=1 & C=0 means Host is alive but frame could not be copied
15
Priority
• Priority allows a particular host to access the
token
• Token contains a 3-bit priority field
• Token has certain priority n at any time
• Each host that wants to transmit a packet, has
to assign a priority to the data packet
• The host that holds the token, before releasing
the token sets its priority to the priority of
the data packet it received
16
Token Ring Maintenance
• Monitor Station
• A monitor periodically announces its presence by
special control messages
• If these periodic messages stop arriving, the
monitor will be assumed to have failed
• And a new monitor is elected
– Each station that wants to be monitor sends a claim frame
– If the token circulates back to the sender, it will be the
monitor
– If more than one claim frames, break the tie by some algorithm
(say the highest address wins)
17
Monitor
• Monitor is to take care of the health of the token
ring network
– Clocking… In case of Token
– Setting bits… In Case of Data Frame
• Reinserts a new token if token is not seen by
monitor after the interval
– (NumStations * THT) + RingLatency
• Checks for orphaned & Corrupted frames
o M-bit is set to 0 by transmitter and set to 1 as it passes the
monitor
o If a token passes the monitor with the m-bit already set to 1, it is
removed from the network
18
Frame Format
• Take it as a Reading Assignment
– Included in Exam 
19
Recommended Text
• Computer Networks: A System Approach
by Lary Peterson and Bruce Davie

Contenu connexe

Tendances

Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring Hareem Naz
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
Network standardization
Network standardizationNetwork standardization
Network standardizationAbinaya B
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking ConceptTushar Ranjan
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT Vpkaviya
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)Anand Biradar
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layerPREMAL GAJJAR
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Data link layer
Data link layerData link layer
Data link layersbkbca
 

Tendances (20)

Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
Token ring
Token ringToken ring
Token ring
 
Ethernet
EthernetEthernet
Ethernet
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
HDLC
HDLCHDLC
HDLC
 
Network delay
Network delayNetwork delay
Network delay
 
Network standardization
Network standardizationNetwork standardization
Network standardization
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Frame relay
Frame relayFrame relay
Frame relay
 
Ripple Carry Adder
Ripple Carry AdderRipple Carry Adder
Ripple Carry Adder
 
Framming data link layer
Framming data link layerFramming data link layer
Framming data link layer
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Data link layer
Data link layerData link layer
Data link layer
 
Chapter 20
Chapter 20Chapter 20
Chapter 20
 

En vedette

Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNSAkshay Tiwari
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name SystemPeter R. Egli
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Token Ring
Token RingToken Ring
Token Ringmarva
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Eslam Abdou
 
Breve história do teatro
Breve história do teatroBreve história do teatro
Breve história do teatrobeonline5
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
EvoluçãO Do Teatro Ao Longo Da HistóRia Da
EvoluçãO Do Teatro Ao Longo Da HistóRia DaEvoluçãO Do Teatro Ao Longo Da HistóRia Da
EvoluçãO Do Teatro Ao Longo Da HistóRia Damega
 

En vedette (20)

Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Token ring
Token ringToken ring
Token ring
 
token bus
 token bus token bus
token bus
 
Token ring
Token ringToken ring
Token ring
 
Token bus standard
Token bus standardToken bus standard
Token bus standard
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Introduction to DNS
Introduction to DNSIntroduction to DNS
Introduction to DNS
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Token ring
Token ringToken ring
Token ring
 
Token Ring
Token RingToken Ring
Token Ring
 
Token Ring
Token RingToken Ring
Token Ring
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Man
ManMan
Man
 
Ieee 802
Ieee 802Ieee 802
Ieee 802
 
Breve história do teatro
Breve história do teatroBreve história do teatro
Breve história do teatro
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Csma
CsmaCsma
Csma
 
EvoluçãO Do Teatro Ao Longo Da HistóRia Da
EvoluçãO Do Teatro Ao Longo Da HistóRia DaEvoluçãO Do Teatro Ao Longo Da HistóRia Da
EvoluçãO Do Teatro Ao Longo Da HistóRia Da
 

Similaire à Token ring 802.5

Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area networkRiteshKumar630578
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxAkarshTomar3
 
A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptHODElex
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkNiharikaDubey17
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdfShanthalaKV
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20rajeshvbe
 

Similaire à Token ring 802.5 (20)

Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptx
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
FDDI
FDDIFDDI
FDDI
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Token Bus.pptx
Token Bus.pptxToken Bus.pptx
Token Bus.pptx
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 
Token_Ring.pdf
Token_Ring.pdfToken_Ring.pdf
Token_Ring.pdf
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 
Adhoc
AdhocAdhoc
Adhoc
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
 

Plus de Adil Mehmoood

Docker + Node "hello world" Application
Docker + Node "hello world" ApplicationDocker + Node "hello world" Application
Docker + Node "hello world" ApplicationAdil Mehmoood
 
Java database connectivity with MYSQL
Java database connectivity with MYSQLJava database connectivity with MYSQL
Java database connectivity with MYSQLAdil Mehmoood
 
What is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeWhat is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeAdil Mehmoood
 
Inner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in javaInner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in javaAdil Mehmoood
 
Exception handling in java
Exception handling in javaException handling in java
Exception handling in javaAdil Mehmoood
 
Project Engineer and Deputy project manger
Project Engineer and Deputy project manger Project Engineer and Deputy project manger
Project Engineer and Deputy project manger Adil Mehmoood
 
Swing and AWT in java
Swing and AWT in javaSwing and AWT in java
Swing and AWT in javaAdil Mehmoood
 
Software Engineering 2 lecture slide
Software Engineering 2 lecture slideSoftware Engineering 2 lecture slide
Software Engineering 2 lecture slideAdil Mehmoood
 
Sliding window and error control
Sliding window and error controlSliding window and error control
Sliding window and error controlAdil Mehmoood
 
Proposal defence format
Proposal defence formatProposal defence format
Proposal defence formatAdil Mehmoood
 
Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...Adil Mehmoood
 
System quality attributes
System quality attributes System quality attributes
System quality attributes Adil Mehmoood
 
Graph Clustering and cluster
Graph Clustering and clusterGraph Clustering and cluster
Graph Clustering and clusterAdil Mehmoood
 
diseases caused by computer
diseases caused by computerdiseases caused by computer
diseases caused by computerAdil Mehmoood
 
Diseases caused by Computer
Diseases caused by ComputerDiseases caused by Computer
Diseases caused by ComputerAdil Mehmoood
 
What is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resumeWhat is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resumeAdil Mehmoood
 
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Adil Mehmoood
 

Plus de Adil Mehmoood (19)

Docker + Node "hello world" Application
Docker + Node "hello world" ApplicationDocker + Node "hello world" Application
Docker + Node "hello world" Application
 
Java database connectivity with MYSQL
Java database connectivity with MYSQLJava database connectivity with MYSQL
Java database connectivity with MYSQL
 
What is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeWhat is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its type
 
Inner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in javaInner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in java
 
Exception handling in java
Exception handling in javaException handling in java
Exception handling in java
 
Project Engineer and Deputy project manger
Project Engineer and Deputy project manger Project Engineer and Deputy project manger
Project Engineer and Deputy project manger
 
Swing and AWT in java
Swing and AWT in javaSwing and AWT in java
Swing and AWT in java
 
Software Engineering 2 lecture slide
Software Engineering 2 lecture slideSoftware Engineering 2 lecture slide
Software Engineering 2 lecture slide
 
Expert system
Expert systemExpert system
Expert system
 
Sliding window and error control
Sliding window and error controlSliding window and error control
Sliding window and error control
 
Proposal defence format
Proposal defence formatProposal defence format
Proposal defence format
 
Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...
 
Computer vesion
Computer vesionComputer vesion
Computer vesion
 
System quality attributes
System quality attributes System quality attributes
System quality attributes
 
Graph Clustering and cluster
Graph Clustering and clusterGraph Clustering and cluster
Graph Clustering and cluster
 
diseases caused by computer
diseases caused by computerdiseases caused by computer
diseases caused by computer
 
Diseases caused by Computer
Diseases caused by ComputerDiseases caused by Computer
Diseases caused by Computer
 
What is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resumeWhat is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resume
 
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
 

Dernier

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Dernier (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Token ring 802.5

  • 2. 2 Token Rings • IBM Token Ring & IEEE 802.5 • FDDI • Resilient Packet Ring IEEE 802.17… • IBM Token Rings are the most famous of this series
  • 3. 3 About IBM Token Rings • Network consists of a set of nodes connected in a ring & data always flows in particular direction • Each node receives frames from its upstream node and transmits to its downstream node • Token rings share two features with Ethernets – Requires an algorithm that controls when each node is allowed to transmit – All nodes see all frames with destination saving a copy of it
  • 4. 4 Tokens • Special sequence of bits that circulates around the ring – 24 bits in case of 802.5 • When node with a frame to transmit sees the token, it takes the token off the ring and instead inserts its own frame on the network – Frame is forwarded by all nodes while destination too makes a copy of it and forwards it – Packet is received again by sender which strips its frame off the ring and reinserts the token
  • 5. 5 Physical Properties • Link failure in ring may disrupt transmission of the whole network • Electromechanical relay is used to overcome this problem • As long as the station is healthy, the relay is open • When the stations stops powering the relay, it gets closed and the station is removed from the network
  • 6. 6 Use of Electromechanical relay From Previous Host To Next Host Host Relay
  • 7. 7 Use of Electromechanical relay From Previous Host To Next Host Host Relay
  • 8. 8 Multi Station Access Unit… MSAU • Several Electromechanical relays packed into a single box • It makes token rings look like a star topology • Systems are plugged in and out of MSAU • One of the main differences between 802.5 and IBM Token Rings is that the latter requires MSAU – The other difference however can be that that IBM Token Rings can have up to 260 stations per ring while 802.5 supports 250 – Physical media for IBM is twisted pair but not defined for 802.5
  • 9. 9 Multi Station Access Unit… MSAU Previous MAUS Next MAUS
  • 10. 10 Token Ring Media Access Control • Any station that wants to transmit data, has to seize the token from the network • Once the token is seized, transmission can be done • In 802.5, seizing process involves simply modifying 1 bit in the token, and it acts as a preamble for the subsequent data packet
  • 11. 11 Data Transmission • Each transmitted packet contains a destination address • As the packet flows past each node on the ring, each node looks inside the packet to see if it is the intended recipient • If so, it copies the packet into its buffer as it flows through the network adapter • But it does not remove the packet form the network • The sending station has the responsibility of removing the packet from the ring • Other stations don’t harm the packet
  • 12. 12 Token Holding Time • Setting THT to infinity will be dangerous because other devices wont have fair access to the ring • Setting THT to one message will be silly – If node has more packets to send, after every THT it would let the token circulate around the whole ring before seizing it again • Hence it is set to 10ms – A device should take care of the fact that before transmission of a packet, whether it got sufficient THT left to transmit this packet
  • 13. 13 Token Rotation Time • Time required by token to traverse the ring • TRT < ActiveNodes * THT + RingLatency • Active Nodes are the number of nodes that have data to transmit and Ring Latency is the time a packet takes to traverse the ring when no node has data to send… Ideal
  • 14. 14 Reliable Delivery • A & C bits contained in frame status byte • Both set to 0 by transmitter • As the destination station sees the packet, it set the A-bit to 1 • When the destination station copies the packet into its buffer successfully, the C bit is set to 1 • At Sender again – A=1 & C=1 means Successful Delivery – A=1 & C=0 means Host is alive but frame could not be copied
  • 15. 15 Priority • Priority allows a particular host to access the token • Token contains a 3-bit priority field • Token has certain priority n at any time • Each host that wants to transmit a packet, has to assign a priority to the data packet • The host that holds the token, before releasing the token sets its priority to the priority of the data packet it received
  • 16. 16 Token Ring Maintenance • Monitor Station • A monitor periodically announces its presence by special control messages • If these periodic messages stop arriving, the monitor will be assumed to have failed • And a new monitor is elected – Each station that wants to be monitor sends a claim frame – If the token circulates back to the sender, it will be the monitor – If more than one claim frames, break the tie by some algorithm (say the highest address wins)
  • 17. 17 Monitor • Monitor is to take care of the health of the token ring network – Clocking… In case of Token – Setting bits… In Case of Data Frame • Reinserts a new token if token is not seen by monitor after the interval – (NumStations * THT) + RingLatency • Checks for orphaned & Corrupted frames o M-bit is set to 0 by transmitter and set to 1 as it passes the monitor o If a token passes the monitor with the m-bit already set to 1, it is removed from the network
  • 18. 18 Frame Format • Take it as a Reading Assignment – Included in Exam 
  • 19. 19 Recommended Text • Computer Networks: A System Approach by Lary Peterson and Bruce Davie