SlideShare a Scribd company logo
1 of 11
Token Ring
Token Ring
• IEEE 802.5 – Token ring
Token Ring
– set of nodes connected in a ring.
– Data always flow in a particular direction around the ring.
– Each node in the ring receiving the frame from its upstream neighbor and
then forwarding them to its downstream neighbor.
Token – used to access the ring
• Token is a special sequence of bits, circulates around the ring.
• Each node receives and forwards the token.
– When a node sees the token,
• If it has a frame to transmit, it takes the token off the ring and inserts the frame
into the ring.
• Each node along the way simply forwards the frame. Destination node saving
the copy of the frame into the adaptor and forwards the message to the next
node.
• When the frame reaches the sender, it strips the frame off the ring and reinserts
the token.
Token Ring Contd…
– Each node in the ring gets a chance to transmit.
– Nodes are serviced in a round robin manner.
Physical Properties
– Uses ring topology.
– Problem – any node or link failure leads to entire network failure.
Solution:
• Connecting each station into the ring using electromechanical relay.
– If station is healthy, relay is opened. i.e., station is included in the ring.
– If station fails, it stops providing power. So relay is closed and the ring
automatically bypasses the station.
Token Ring Contd…
Multi station Access Unit (MSAU)
– Several relays packed into a single box.
– Easy to add / remove stations from the network.
Characteristics:
– Supports 4Mbps or 16Mbps data rate.
– Differential Manchester encoding scheme is used.
– Number of stations in the ring is limited to 250 for IEEE802.5 (260 for IBM
Token ring).
Token Ring Contd…
Token ring Media Access Control
– Network adaptor of the token ring contains a receiver, transmitter and one
or more bits of data storage between them.
– When none of the stations has anything to send, the token circulates around
the ring.
– Ring has enough storage capacity to hold an entire token.
• 1 bit / station
– For example, 24 bit token can circulate in the network having maximum 24
stations.
• But it will not work proper for network having lesser number of stations than
24.
– This will be avoided by “Monitor”
Token Operation:
– Token circulates around the ring, any station that has data to send may seize the
token.
• i.e., it drains the token off the ring and begin sending data.
• Seizing process just involves modifying 1bit in second byte of the token
Token Ring Contd…
– Station that has token can send data.
– Each transmitted packet contains the destination address of the intended
receiver.
• It may be unicast address, multicast address or broadcast address.
– Each node in the ring look inside the packet to see if it is the intended
receiver.
• If so, copies the data frame and pass it to the ring and the packet find the way
back to the sender.
– Then sending station remove the frame from the ring and reinserts the token
to the ring.
Issues:
– How much data a given node is allowed to transmit?
Token Holding Time (THT) – time period given to nodes to hold the token.
• But unfair to stations to other than the station holding the token
• This will be avoided using TRT (Token Rotation Time)
TRT ≤ Active nodes * THT + Ring Latency
Token Ring Contd…
Ring Latency – how long it takes the token to circulate around the ring when
no one has data to send.
Active nodes – number of nodes that have data to send.
Reliable Transmission
– IEEE 802.5 provides reliable data delivery using 2 bits (A&C) in the packet trailer.
– Initially these bits are set to 0.
– When a station sees a frame for which it is the intended recipient,
• It sets A bit into ‘1’
– When it copies the frame into local adaptor buffer,
• It sets the C bit into ‘1’
– When the sender sees the frame come back over the ring
• If A = 0 – receiver is not functioning well.
• If A = 1, but C = 0 then destination does not accepted the frame due to some reason (eg., Lack of
buffer)
Priority Bits:
• The token contains 3 bit priority field.
• Each device that want to transmit the packet assigns a priority to that packet & the device can hold the
token, if the priority is at least as great as tokens priority.
• Lower priority packets circulate for long in ring
Token Release
– Early Release
• After transmitting packet
– Delayed Release
• After removing the packet when it returns to the sender
Token Ring Contd…
Token Ring Maintenance:
– Token rings have a designated monitor.
– The monitor’s job is ensure the health of the token.
– Any station in the ring can become the monitor.
• Monitor is first elected when the ring is first connected or failure of the current
monitor.
– Healthy monitor periodically announces its presence with a special control
message.
• If a station fails to see the control message for some period of time, it will
assume that the monitor has failed and will try to become the monitor.
– When a station decides that a new monitor is needed, it transmits a “Claim
Token” frame, announcing its intent to become the new monitor.
• If the token circulates back to the sender, it can assume that it is OK for it to
become a monitor.
• If some other is trying to become the monitor at the same instant, the sender
might see the “claim token” message from that other station first,
– Highest Address wins
Token Ring Contd…
Roles of Monitor:
• May need to insert additional delay into the ring
• Detecting the missing token
• Watches for a passing token and maintains a timer equal to the maximum
possible token rotation time.
(NumStations * THT) + Ring Latency
Ring Latency – total propagation delay on the ring.
• Checks for corrupted or orphaned frame.
 Corrupted frame – checksum error or invalid formats.
 Orphaned frame – transmitted correctly on the ring, but whose parent died.
i.e., sending station went down before it could remove the frame from the ring.
• Its detected by using a “Monitor” bit.
• Monitor bit is “0” on transmission
• Set to ‘1’ when it passes the monitor first time.
• If the monitor sees a frame with this bit is set, it knows the frame is going by
for the second time and it drains the frame off the ring.
• Detection of dead stations.
 If any station suspects failure on the ring, it can send “beacon” frame to suspect
destination.
• Status of the ring can be established and malfunctioning station can be bypassed in the MSAU
Token Ring Contd…
Frame Format:
– “illegal” Manchester codes in the start and end delimiters.
– Access Control – includes frame priority, reservation priority.
– Frame Control – Demux key that identifies the higher layer protocol.
– 48 bit Destination and source hardware addresses
– Checksum – error detection code
– Frame Status – includes A & C bits

More Related Content

What's hot

Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)sonangrai
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control anuragjagetiya
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
The mac layer
The mac layerThe mac layer
The mac layeraazamk
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 

What's hot (20)

Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
FDDI
FDDIFDDI
FDDI
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Data link layer
Data link layer Data link layer
Data link layer
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
WLAN
WLANWLAN
WLAN
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Transport layer
Transport layer Transport layer
Transport layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 

Similar to Token ring

Token ring protocol
Token ring protocolToken ring protocol
Token ring protocolpriyabogra1
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area networkRiteshKumar630578
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxAkarshTomar3
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5Pnkj_Sharma
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptxpatrickwang85
 
A427 nic card
A427 nic cardA427 nic card
A427 nic cardsurajbhai
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks Nt Arvind
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
 

Similar to Token ring (20)

Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Token ring protocol
Token ring protocolToken ring protocol
Token ring protocol
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptx
 
Token Bus.pptx
Token Bus.pptxToken Bus.pptx
Token Bus.pptx
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
FDDI
FDDIFDDI
FDDI
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Token_Ring.pdf
Token_Ring.pdfToken_Ring.pdf
Token_Ring.pdf
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
Data link layer
Data link layerData link layer
Data link layer
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Different protocols for data communication networks
Different protocols for data communication networks Different protocols for data communication networks
Different protocols for data communication networks
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 

More from selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Ethernet
EthernetEthernet
Ethernet
 
Error control
Error controlError control
Error control
 
DNS
DNS DNS
DNS
 
DHCP
DHCPDHCP
DHCP
 

Recently uploaded

Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Token ring

  • 2. Token Ring • IEEE 802.5 – Token ring Token Ring – set of nodes connected in a ring. – Data always flow in a particular direction around the ring. – Each node in the ring receiving the frame from its upstream neighbor and then forwarding them to its downstream neighbor. Token – used to access the ring • Token is a special sequence of bits, circulates around the ring. • Each node receives and forwards the token. – When a node sees the token, • If it has a frame to transmit, it takes the token off the ring and inserts the frame into the ring. • Each node along the way simply forwards the frame. Destination node saving the copy of the frame into the adaptor and forwards the message to the next node. • When the frame reaches the sender, it strips the frame off the ring and reinserts the token.
  • 3. Token Ring Contd… – Each node in the ring gets a chance to transmit. – Nodes are serviced in a round robin manner. Physical Properties – Uses ring topology. – Problem – any node or link failure leads to entire network failure. Solution: • Connecting each station into the ring using electromechanical relay. – If station is healthy, relay is opened. i.e., station is included in the ring. – If station fails, it stops providing power. So relay is closed and the ring automatically bypasses the station.
  • 4. Token Ring Contd… Multi station Access Unit (MSAU) – Several relays packed into a single box. – Easy to add / remove stations from the network. Characteristics: – Supports 4Mbps or 16Mbps data rate. – Differential Manchester encoding scheme is used. – Number of stations in the ring is limited to 250 for IEEE802.5 (260 for IBM Token ring).
  • 5. Token Ring Contd… Token ring Media Access Control – Network adaptor of the token ring contains a receiver, transmitter and one or more bits of data storage between them. – When none of the stations has anything to send, the token circulates around the ring. – Ring has enough storage capacity to hold an entire token. • 1 bit / station – For example, 24 bit token can circulate in the network having maximum 24 stations. • But it will not work proper for network having lesser number of stations than 24. – This will be avoided by “Monitor” Token Operation: – Token circulates around the ring, any station that has data to send may seize the token. • i.e., it drains the token off the ring and begin sending data. • Seizing process just involves modifying 1bit in second byte of the token
  • 6. Token Ring Contd… – Station that has token can send data. – Each transmitted packet contains the destination address of the intended receiver. • It may be unicast address, multicast address or broadcast address. – Each node in the ring look inside the packet to see if it is the intended receiver. • If so, copies the data frame and pass it to the ring and the packet find the way back to the sender. – Then sending station remove the frame from the ring and reinserts the token to the ring. Issues: – How much data a given node is allowed to transmit? Token Holding Time (THT) – time period given to nodes to hold the token. • But unfair to stations to other than the station holding the token • This will be avoided using TRT (Token Rotation Time) TRT ≤ Active nodes * THT + Ring Latency
  • 7. Token Ring Contd… Ring Latency – how long it takes the token to circulate around the ring when no one has data to send. Active nodes – number of nodes that have data to send. Reliable Transmission – IEEE 802.5 provides reliable data delivery using 2 bits (A&C) in the packet trailer. – Initially these bits are set to 0. – When a station sees a frame for which it is the intended recipient, • It sets A bit into ‘1’ – When it copies the frame into local adaptor buffer, • It sets the C bit into ‘1’ – When the sender sees the frame come back over the ring • If A = 0 – receiver is not functioning well. • If A = 1, but C = 0 then destination does not accepted the frame due to some reason (eg., Lack of buffer) Priority Bits: • The token contains 3 bit priority field. • Each device that want to transmit the packet assigns a priority to that packet & the device can hold the token, if the priority is at least as great as tokens priority. • Lower priority packets circulate for long in ring
  • 8. Token Release – Early Release • After transmitting packet – Delayed Release • After removing the packet when it returns to the sender
  • 9. Token Ring Contd… Token Ring Maintenance: – Token rings have a designated monitor. – The monitor’s job is ensure the health of the token. – Any station in the ring can become the monitor. • Monitor is first elected when the ring is first connected or failure of the current monitor. – Healthy monitor periodically announces its presence with a special control message. • If a station fails to see the control message for some period of time, it will assume that the monitor has failed and will try to become the monitor. – When a station decides that a new monitor is needed, it transmits a “Claim Token” frame, announcing its intent to become the new monitor. • If the token circulates back to the sender, it can assume that it is OK for it to become a monitor. • If some other is trying to become the monitor at the same instant, the sender might see the “claim token” message from that other station first, – Highest Address wins
  • 10. Token Ring Contd… Roles of Monitor: • May need to insert additional delay into the ring • Detecting the missing token • Watches for a passing token and maintains a timer equal to the maximum possible token rotation time. (NumStations * THT) + Ring Latency Ring Latency – total propagation delay on the ring. • Checks for corrupted or orphaned frame.  Corrupted frame – checksum error or invalid formats.  Orphaned frame – transmitted correctly on the ring, but whose parent died. i.e., sending station went down before it could remove the frame from the ring. • Its detected by using a “Monitor” bit. • Monitor bit is “0” on transmission • Set to ‘1’ when it passes the monitor first time. • If the monitor sees a frame with this bit is set, it knows the frame is going by for the second time and it drains the frame off the ring. • Detection of dead stations.  If any station suspects failure on the ring, it can send “beacon” frame to suspect destination. • Status of the ring can be established and malfunctioning station can be bypassed in the MSAU
  • 11. Token Ring Contd… Frame Format: – “illegal” Manchester codes in the start and end delimiters. – Access Control – includes frame priority, reservation priority. – Frame Control – Demux key that identifies the higher layer protocol. – 48 bit Destination and source hardware addresses – Checksum – error detection code – Frame Status – includes A & C bits