SlideShare une entreprise Scribd logo
1  sur  31
IEEE 802.4

Token Bus
Token Passing Bus Access Method
Physically, it is a Bus network. Logically, it is a Ring network
Stations are organized as a circular doubly-linked list
A distributed polling algorithm is used to avoid bus contention
Token - Right of access

Token Holder (The station receiving the token)
       Transmit one or more MAC-frame
       Poll other stations
       Receive responses

Non-Token Holder
       Listen to the channel
       Respond to a poll
       Send Acknowledgement
A Token Bus Network
Token Bus Frame



                     0 - 8182/8174
                     Bytes
     SD Field



   ED Field Format
Encoding and Signaling for Carrier Band,
           Phase Continuous
Encoding and Signaling for Carrier Band,
            Phase Coherent
Encoding and Signaling for Broadband
Encoding and Signaling for Optical Fiber
Token Passing in a Token Bus Network




Once received the token, the station either starts to transmit
or passes the token to the next station within one response
window.
Token must be released if no data / control frame is required
to be transmitted. Token control frame is destinated for the
successor.
Token Passing in a Token Bus Network




Token can be held maximum up to th – Token Holding Time.
This value is set at the system initialization time by the
network management process.
Frame priority must be handled within the station itself.
Queues for Service Classes




Each station is internally divided into different priority sub
stations. Token holder first passes the token to the highest
priority substation.
Ring Management
     60                  50                  40
20        50        60        30

                                                  Node
                                                  P      S

10                  20                  30
               30        60        50        20
FC Field Format
Adding a Station
Token holder has the responsibility of periodically granting an
opportunity for new stations to enter the logical ring before it
passes the token.

A Solicit-Successor-1 (SS1) control frame is issued with

   DA         =      Successor’s Address
   Data       =      Null
   Type       =      Control Frame SS1

One response window is reserved for those stations desired to
enter the logical ring and their address is between DA and SA.

If the address of the token-holder has the smallest address in the
logical ring, then a Solicit-Successor-2 frame is issued
Adding a Station … contd
The station desired to enter the logical ring will respond with
a Set-Successor frame with

   DA         =      Token-holder address
   SA                =     Its address
   Data       =      Address of the Sender ( SA )

The Token holder detects the event in the response window
and takes appropriate actions ….

   No Response       : Pass token to the next station
   One Response      : Pass token to the newly added station.

   The newly added station will update its Successor value
   by the DA field of the previously received Solicit-
   Successor-1 frame.
Adding a Station … contd
Multiple Responses
A Resolve-Contention frame is issued by the token-holder with

DA      =        Garbage
SA      =        TS

A station desired to enter the logical ring will response with a Set-
Successor frame as before at the K th window, where K is determined by
the value of the first two bits of its address. However, if the channel is
detected busy before the Kth window, it will give up.

If no valid Set-Successor frame is received by the token-holder, the token-
holder will issue another Resolve-Contention frame.

Now only those stations involved in the contention may try again. The
value of K now is determined by the next two bits. The above procedure is
repeated until a valid Set-Successor frame is received by the token-
holder. A new station is thus successfully added to the logical ring.
Adding a Station … Graphical Illustration
                                                    40
                                                              A
                                                          D AT 0
                                                        SA 0 4 S
                                                          4
                                                    DA 50
                   50
                            30
                                                                                                          ion
                                                2

                  60                                                                                   tat
                     SA 0 S1
                                                                                                     dS
                   A 0 5S
                                                                                                de
                                                                30                            ad
 60
                  D 3
                                                                         20                ly
       50                                                                               New
                                                               50
             1

20

                                 20                                           40
                                      60                                           30
                             30                                               50

                                            50
                                                    40
                                           60

                                                                                    30
             60                                                                            20
                       50
                                                                                   40
            20

                                                          20
                                                                    60
                                                         30
Adding a Station … Graphical Illustration
Adding a Station … Special Case
Usually, Successor < Node. But there is one station whose
Successor > Node (The one with the smallest address in the
logical ring). In this case Solicit-Successor-2 (SS2) frame is
issued followed by two Response Windows.

The first response window is reserved for stations (X) whose
address is less than this station.

The second response window is reserved for stations (Y) whose
address is greater than its successor.

Stations in Y will respond with the Set-Successor frame only if
there is no response in the first response window.
Adding a Station … Graphical Illustration
Deleting a Station
The station wishes to be deleted may wait until it receives the
token, then sends a Set-Successor frame to its Predecessor, with
       DA     =       Predecessor Address
       SA     =       This Node
       Data   =       Successor Address

The previous station ( DA ) once receives the Set-Successor
frame will modify its Successor and send a token to its new next
station.
The Successor station once receives the Token frame will modify
its Predecessor accordingly.
After these two modifications, the station is removed from the
logical ring automatically.
If the station fails, it will not receive the token. This will be
detected by the token-sender as explained later.
Deleting a Station … Graphical Illustration
Fault Management

One of the most important issues of the token-bus protocol is to
maintain the logical ring under the following possible conditions

   Multiple Tokens
   Unaccepted Token
   Failed Station
   Failed Receiver
   No Token
Multiple Token

Cause
   Noise
   Duplicate Address, each one may "receive" a token

Detection
   While holding the token, the station may hear a frame on
   the bus which indicating that another station also has a
   token.

Action
   Drop the token
   If all stations drop the token, the network becomes the case
   of no token (see the procedure of handling no token later)
Unaccepted Token or Failed Station
Cause
   The token passed to the next station may be garbled
   The next station fails

Detection
   No response (Channel is idle) in one response window

Action
   Try to pass token one more time
   It still no response, then the next station is assumed to have
   failed
   The token holder then issues a Who-Follows frame with

       DA   =        Garbage
       SA   =        This Node
       Data =        Successor
Unaccepted Token or Failed Station
All other stations once received Who-Follows frame will
compare the data with its Predecessor value. If there is a
match, it will issue a Set-Successor frame back. 3 response
windows are reserved after Who-Follows. The first 2 are
needed to make a comparison.

If no response to the Who-Follows frame, the above
procedure will be tried one more time.

If still no response to the Who-Follows frame, then it could
be that the next station to the next station has also failed.

The token-holder will try to establish the ring by issuing a
Solicit-Successor-2 frame, with
DA   =      This Node
Failed Station … Graphical Illustration

                 60                                   50
           10              50                    60         30

                 1
                          DA SA
                 2              50     T
                                      60
                          DA SA DATA                                  DA SA DATA
                 3           XX 60  W
                                   50                            4        60 30  30   S
     10                                          20                       30
20         60                               30         10            50         20



                     60                                50
            10              30
                           DA SA
                      5
                                 30    60
                                        T




      10                                          20                       30
 20         60                               30            10         60         20
Unaccepted Token or Failed Station
DA = SA = This Node implies that every station is invited to
respond. Two response windows are reserved after this frame.
The first response window is reserved for stations whose
address is less than the sender.
The second response window is reserved for stations whose
address is greater than the sender.
The procedure of add a station is then used.
If still no response to the Solicit frame, then either all stations
have failed (Left the ring) or its own receiver has failed (so it
cannot listen).
If the only one station has something to send, it sends the data.
Then repeat the token passing process. Otherwise, listen to the
channel.
Failed Station … Graphical Illustration
No Token or Initialization
Cause
  The Token-holder station fails
  The token is destroyed
  Network Initialization
Detection
  No channel activity has been heard for a certain amount
   of time (Bus-Idle Timer expired)
Action
  Any station when its Bus-Idle timer is expired will issue a
   Claim-Token frame, with

     DA      =     Garbage
     SA      =     This Node
No Token or Initialization
The station with the greatest address will get the
token. This is done by comparing the address. Two
bits of the address are compared at a time.
In each pass, only those stations who transmitted
the longest frame on the previous pass try again.
The station that succeeds on the last pass considers
itself the token holder.
The difference is 2 slots in the frame padding. The
station waits one slot for its or other frame to pass.
It then samples the channel at the second slot.
The logical ring can then be established by issuing
Solicit-Successor frames as described before.

Contenu connexe

Tendances

Tendances (20)

Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Ch12
Ch12Ch12
Ch12
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II CS8591 Computer Networks - Unit II
CS8591 Computer Networks - Unit II
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Data link layer
Data link layer Data link layer
Data link layer
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Unit 4 data link layer
Unit 4 data link layerUnit 4 data link layer
Unit 4 data link layer
 
Network layer
Network layerNetwork layer
Network layer
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 

En vedette

Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5Pnkj_Sharma
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Rajan Kandel
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Eslam Abdou
 
Panduit EMEA SI Webinar 6
Panduit EMEA SI Webinar 6Panduit EMEA SI Webinar 6
Panduit EMEA SI Webinar 6Panduit
 
Panduit EMEA SI Webinar 4
Panduit EMEA SI Webinar 4Panduit EMEA SI Webinar 4
Panduit EMEA SI Webinar 4Panduit
 
Panduit Signature Core Fiber Optic Cabling System
Panduit Signature Core Fiber Optic Cabling SystemPanduit Signature Core Fiber Optic Cabling System
Panduit Signature Core Fiber Optic Cabling SystemPanduit
 
Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8Panduit
 
Panduit EMEA SI Webinar 10
Panduit EMEA SI Webinar 10Panduit EMEA SI Webinar 10
Panduit EMEA SI Webinar 10Panduit
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
Panduit EMEA SI Webinar 3
Panduit EMEA SI Webinar 3Panduit EMEA SI Webinar 3
Panduit EMEA SI Webinar 3Panduit
 
Panduit EMEA SI Webinar 1
Panduit EMEA SI Webinar 1Panduit EMEA SI Webinar 1
Panduit EMEA SI Webinar 1Panduit
 

En vedette (20)

token bus
 token bus token bus
token bus
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess) Csma(carriers sense-multiple-acess)
Csma(carriers sense-multiple-acess)
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Man
ManMan
Man
 
Ieee 802
Ieee 802Ieee 802
Ieee 802
 
Panduit EMEA SI Webinar 6
Panduit EMEA SI Webinar 6Panduit EMEA SI Webinar 6
Panduit EMEA SI Webinar 6
 
Panduit EMEA SI Webinar 4
Panduit EMEA SI Webinar 4Panduit EMEA SI Webinar 4
Panduit EMEA SI Webinar 4
 
Panduit Signature Core Fiber Optic Cabling System
Panduit Signature Core Fiber Optic Cabling SystemPanduit Signature Core Fiber Optic Cabling System
Panduit Signature Core Fiber Optic Cabling System
 
Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8Panduit EMEA SI Webinar 8
Panduit EMEA SI Webinar 8
 
Panduit EMEA SI Webinar 10
Panduit EMEA SI Webinar 10Panduit EMEA SI Webinar 10
Panduit EMEA SI Webinar 10
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Panduit EMEA SI Webinar 3
Panduit EMEA SI Webinar 3Panduit EMEA SI Webinar 3
Panduit EMEA SI Webinar 3
 
Panduit EMEA SI Webinar 1
Panduit EMEA SI Webinar 1Panduit EMEA SI Webinar 1
Panduit EMEA SI Webinar 1
 

Similaire à Token bus standard

Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloysConstitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloysAlumat Almax Group
 
Villar ciasem 2007
Villar ciasem 2007Villar ciasem 2007
Villar ciasem 2007Karina Mello
 
Q-Learning and Pontryagin's Minimum Principle
Q-Learning and Pontryagin's Minimum PrincipleQ-Learning and Pontryagin's Minimum Principle
Q-Learning and Pontryagin's Minimum PrincipleSean Meyn
 
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARKTsuyoshi Horigome
 
SPICE MODEL of PAT160-50T in SPICE PARK
SPICE MODEL of PAT160-50T in SPICE PARKSPICE MODEL of PAT160-50T in SPICE PARK
SPICE MODEL of PAT160-50T in SPICE PARKTsuyoshi Horigome
 
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARKTsuyoshi Horigome
 
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARKTsuyoshi Horigome
 

Similaire à Token bus standard (8)

Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloysConstitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
Constitutive equations for hot extrusion of AA6005, AA6063, AA7020 alloys
 
Villar ciasem 2007
Villar ciasem 2007Villar ciasem 2007
Villar ciasem 2007
 
Q-Learning and Pontryagin's Minimum Principle
Q-Learning and Pontryagin's Minimum PrincipleQ-Learning and Pontryagin's Minimum Principle
Q-Learning and Pontryagin's Minimum Principle
 
5
55
5
 
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SK4078 (Standard+BDS Model) in SPICE PARK
 
SPICE MODEL of PAT160-50T in SPICE PARK
SPICE MODEL of PAT160-50T in SPICE PARKSPICE MODEL of PAT160-50T in SPICE PARK
SPICE MODEL of PAT160-50T in SPICE PARK
 
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARKSPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Standard+BDS Model) in SPICE PARK
 
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARKSPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
SPICE MODEL of 2SJ656 (Professional+BDP Model) in SPICE PARK
 

Plus de Dhaval Kaneria

Objective-C for iOS Application Development
Objective-C for iOS Application DevelopmentObjective-C for iOS Application Development
Objective-C for iOS Application DevelopmentDhaval Kaneria
 
Gpu with cuda architecture
Gpu with cuda architectureGpu with cuda architecture
Gpu with cuda architectureDhaval Kaneria
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and AlgorithmDhaval Kaneria
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and AlgorithmDhaval Kaneria
 
Serial Peripheral Interface(SPI)
Serial Peripheral Interface(SPI)Serial Peripheral Interface(SPI)
Serial Peripheral Interface(SPI)Dhaval Kaneria
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedureDhaval Kaneria
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedureDhaval Kaneria
 
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1Dhaval Kaneria
 
8 bit single cycle processor
8 bit single cycle processor8 bit single cycle processor
8 bit single cycle processorDhaval Kaneria
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture Dhaval Kaneria
 
PAPER ON MEMS TECHNOLOGY
PAPER ON MEMS TECHNOLOGYPAPER ON MEMS TECHNOLOGY
PAPER ON MEMS TECHNOLOGYDhaval Kaneria
 
VIdeo Compression using sum of Absolute Difference
VIdeo Compression using sum of Absolute DifferenceVIdeo Compression using sum of Absolute Difference
VIdeo Compression using sum of Absolute DifferenceDhaval Kaneria
 

Plus de Dhaval Kaneria (20)

Swine flu
Swine flu Swine flu
Swine flu
 
Introduction of Xcode
Introduction of XcodeIntroduction of Xcode
Introduction of Xcode
 
Objective-C for iOS Application Development
Objective-C for iOS Application DevelopmentObjective-C for iOS Application Development
Objective-C for iOS Application Development
 
Gpu with cuda architecture
Gpu with cuda architectureGpu with cuda architecture
Gpu with cuda architecture
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and Algorithm
 
Introduction to data structures and Algorithm
Introduction to data structures and AlgorithmIntroduction to data structures and Algorithm
Introduction to data structures and Algorithm
 
HDMI
HDMIHDMI
HDMI
 
Hdmi
HdmiHdmi
Hdmi
 
open source hardware
open source hardwareopen source hardware
open source hardware
 
Serial Peripheral Interface(SPI)
Serial Peripheral Interface(SPI)Serial Peripheral Interface(SPI)
Serial Peripheral Interface(SPI)
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
Manage Xilinx ISE 14.5 licence for Windows 8 and 8.1
 
VERILOG CODE
VERILOG CODEVERILOG CODE
VERILOG CODE
 
8 bit single cycle processor
8 bit single cycle processor8 bit single cycle processor
8 bit single cycle processor
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
PAPER ON MEMS TECHNOLOGY
PAPER ON MEMS TECHNOLOGYPAPER ON MEMS TECHNOLOGY
PAPER ON MEMS TECHNOLOGY
 
VIdeo Compression using sum of Absolute Difference
VIdeo Compression using sum of Absolute DifferenceVIdeo Compression using sum of Absolute Difference
VIdeo Compression using sum of Absolute Difference
 
Mems technology
Mems technologyMems technology
Mems technology
 
Network security
Network securityNetwork security
Network security
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Token bus standard

  • 2. Token Passing Bus Access Method Physically, it is a Bus network. Logically, it is a Ring network Stations are organized as a circular doubly-linked list A distributed polling algorithm is used to avoid bus contention Token - Right of access Token Holder (The station receiving the token) Transmit one or more MAC-frame Poll other stations Receive responses Non-Token Holder Listen to the channel Respond to a poll Send Acknowledgement
  • 3. A Token Bus Network
  • 4. Token Bus Frame 0 - 8182/8174 Bytes SD Field ED Field Format
  • 5. Encoding and Signaling for Carrier Band, Phase Continuous
  • 6. Encoding and Signaling for Carrier Band, Phase Coherent
  • 7. Encoding and Signaling for Broadband
  • 8. Encoding and Signaling for Optical Fiber
  • 9. Token Passing in a Token Bus Network Once received the token, the station either starts to transmit or passes the token to the next station within one response window. Token must be released if no data / control frame is required to be transmitted. Token control frame is destinated for the successor.
  • 10. Token Passing in a Token Bus Network Token can be held maximum up to th – Token Holding Time. This value is set at the system initialization time by the network management process. Frame priority must be handled within the station itself.
  • 11. Queues for Service Classes Each station is internally divided into different priority sub stations. Token holder first passes the token to the highest priority substation.
  • 12. Ring Management 60 50 40 20 50 60 30 Node P S 10 20 30 30 60 50 20
  • 14. Adding a Station Token holder has the responsibility of periodically granting an opportunity for new stations to enter the logical ring before it passes the token. A Solicit-Successor-1 (SS1) control frame is issued with DA = Successor’s Address Data = Null Type = Control Frame SS1 One response window is reserved for those stations desired to enter the logical ring and their address is between DA and SA. If the address of the token-holder has the smallest address in the logical ring, then a Solicit-Successor-2 frame is issued
  • 15. Adding a Station … contd The station desired to enter the logical ring will respond with a Set-Successor frame with DA = Token-holder address SA = Its address Data = Address of the Sender ( SA ) The Token holder detects the event in the response window and takes appropriate actions …. No Response : Pass token to the next station One Response : Pass token to the newly added station. The newly added station will update its Successor value by the DA field of the previously received Solicit- Successor-1 frame.
  • 16. Adding a Station … contd Multiple Responses A Resolve-Contention frame is issued by the token-holder with DA = Garbage SA = TS A station desired to enter the logical ring will response with a Set- Successor frame as before at the K th window, where K is determined by the value of the first two bits of its address. However, if the channel is detected busy before the Kth window, it will give up. If no valid Set-Successor frame is received by the token-holder, the token- holder will issue another Resolve-Contention frame. Now only those stations involved in the contention may try again. The value of K now is determined by the next two bits. The above procedure is repeated until a valid Set-Successor frame is received by the token- holder. A new station is thus successfully added to the logical ring.
  • 17. Adding a Station … Graphical Illustration 40 A D AT 0 SA 0 4 S 4 DA 50 50 30 ion 2 60 tat SA 0 S1 dS A 0 5S de 30 ad 60 D 3 20 ly 50 New 50 1 20 20 40 60 30 30 50 50 40 60 30 60 20 50 40 20 20 60 30
  • 18. Adding a Station … Graphical Illustration
  • 19. Adding a Station … Special Case Usually, Successor < Node. But there is one station whose Successor > Node (The one with the smallest address in the logical ring). In this case Solicit-Successor-2 (SS2) frame is issued followed by two Response Windows. The first response window is reserved for stations (X) whose address is less than this station. The second response window is reserved for stations (Y) whose address is greater than its successor. Stations in Y will respond with the Set-Successor frame only if there is no response in the first response window.
  • 20. Adding a Station … Graphical Illustration
  • 21. Deleting a Station The station wishes to be deleted may wait until it receives the token, then sends a Set-Successor frame to its Predecessor, with DA = Predecessor Address SA = This Node Data = Successor Address The previous station ( DA ) once receives the Set-Successor frame will modify its Successor and send a token to its new next station. The Successor station once receives the Token frame will modify its Predecessor accordingly. After these two modifications, the station is removed from the logical ring automatically. If the station fails, it will not receive the token. This will be detected by the token-sender as explained later.
  • 22. Deleting a Station … Graphical Illustration
  • 23. Fault Management One of the most important issues of the token-bus protocol is to maintain the logical ring under the following possible conditions Multiple Tokens Unaccepted Token Failed Station Failed Receiver No Token
  • 24. Multiple Token Cause Noise Duplicate Address, each one may "receive" a token Detection While holding the token, the station may hear a frame on the bus which indicating that another station also has a token. Action Drop the token If all stations drop the token, the network becomes the case of no token (see the procedure of handling no token later)
  • 25. Unaccepted Token or Failed Station Cause The token passed to the next station may be garbled The next station fails Detection No response (Channel is idle) in one response window Action Try to pass token one more time It still no response, then the next station is assumed to have failed The token holder then issues a Who-Follows frame with DA = Garbage SA = This Node Data = Successor
  • 26. Unaccepted Token or Failed Station All other stations once received Who-Follows frame will compare the data with its Predecessor value. If there is a match, it will issue a Set-Successor frame back. 3 response windows are reserved after Who-Follows. The first 2 are needed to make a comparison. If no response to the Who-Follows frame, the above procedure will be tried one more time. If still no response to the Who-Follows frame, then it could be that the next station to the next station has also failed. The token-holder will try to establish the ring by issuing a Solicit-Successor-2 frame, with DA = This Node
  • 27. Failed Station … Graphical Illustration 60 50 10 50 60 30 1 DA SA 2 50 T 60 DA SA DATA DA SA DATA 3 XX 60 W 50 4 60 30 30 S 10 20 30 20 60 30 10 50 20 60 50 10 30 DA SA 5 30 60 T 10 20 30 20 60 30 10 60 20
  • 28. Unaccepted Token or Failed Station DA = SA = This Node implies that every station is invited to respond. Two response windows are reserved after this frame. The first response window is reserved for stations whose address is less than the sender. The second response window is reserved for stations whose address is greater than the sender. The procedure of add a station is then used. If still no response to the Solicit frame, then either all stations have failed (Left the ring) or its own receiver has failed (so it cannot listen). If the only one station has something to send, it sends the data. Then repeat the token passing process. Otherwise, listen to the channel.
  • 29. Failed Station … Graphical Illustration
  • 30. No Token or Initialization Cause The Token-holder station fails The token is destroyed Network Initialization Detection No channel activity has been heard for a certain amount of time (Bus-Idle Timer expired) Action Any station when its Bus-Idle timer is expired will issue a Claim-Token frame, with DA = Garbage SA = This Node
  • 31. No Token or Initialization The station with the greatest address will get the token. This is done by comparing the address. Two bits of the address are compared at a time. In each pass, only those stations who transmitted the longest frame on the previous pass try again. The station that succeeds on the last pass considers itself the token holder. The difference is 2 slots in the frame padding. The station waits one slot for its or other frame to pass. It then samples the channel at the second slot. The logical ring can then be established by issuing Solicit-Successor frames as described before.