1
Token Ring
krraju.in
2
What you’ll learn
Token Ring
krraju.in
Token
3
krraju.in
Token Ring
4
krraju.in
Token Ring Protocol
5
Topology of the network defines the order in which stations send.
krraju.in
IEEE 802.5 Frame Formats
6
Dest. Addr
AC
FC
Bytes
1
Data Frame
Source Addr
FCS
Data
1
2 or 6
2 or 6
Upto 4500
4
SD
FS
ED
1
1
1
AC
Token
SD
ED
Abort Sequence
SD
ED
Start Delimiter
Access Control
Frame Control
End Delimiter
Frame Status
krraju.in
Start Delimiter (SD)
7
This 8-bit field is used to:
J | K | 0 | J | K | 0 | 0 | 0 |
krraju.in
Access Control (AC)
8
This 8-bit field is used to:
P | P | P | T | M | r | r | r |
krraju.in
Access Control (AC)
9
The Priority Bits are used to indicate the priority of the Token. Each workstation is assigned a priority for their transmissions: 000 is the lowest and 111 is the highest (7 levels of priorities). The LAN administrator sets the priority levels. For a workstation to claim a Token, it must have a priority equal to or greater than the priority of the Token.
It is the responsibility of the node when finished transmitting data, to release the Token and to return the priority bits to the Reservation Bits.
The Reservation Bits are used to negotiate the priority of the next token as a transmission passes by. When a Token or Token Frame goes by, a node is allowed to reserve the priority of the next Token to be released by placing its priority in the Reservation Bits. In order to change the Reservation Bits, the node's priority must be greater than the existing Reservation bits.
P | P | P | T | M | r | r | r |
krraju.in
Access Control (AC)
10
The Token Bit is used to indicate whether the frame is a Token or Token Frame (information frame).
The Monitor Bit is used by the Active Monitor (AM) to stop frames from continuously circulating the ring.
P | P | P | T | M | r | r | r |
krraju.in
Frame Control (FC)
11
This field Indicates frame type (MAC or LLC)
It consists of 8 bits where
F | F | Z | Z | Z | Z | Z | Z |
krraju.in
Address Fields
12
Destination Address (DA) indicates the destination address of the Token Frame (information frame). It consists of 48 address bits.
Source Address (SA) is identical to the DA field except that the I/G bit is always set to Individual (0) for IEEE 802.5.
krraju.in
Data (Information) Field
13
This Field is used to carry data communication to:
The Frame Control bits FF determine whether the information is for the MAC (FF=00) or LLC (FF=01) layer.
The Routing Bit determines whether the frame uses normal MAC layer communication or if Source Routing is used. Only, IBM Token Ring uses Source Routing, IEEE 802.5 does not.
No size limitation. The token holding time will decide the maximum size of the data field.
krraju.in
End Delimiter (ED)
14
This 8-bit field is used to indicate the end of the frame.
J | K | 1 | J | K | 1 | I | E |
krraju.in
Frame Status (FS)
15
This is used to indicate whether the address was recognized by the destination and if the frame was copied.
This FS field consists of 8 bits, where
Note: The A/C bits are provided twice for redundancy.
A | C | r | r | A | C | r | r |
krraju.in
Ring Operation
16
krraju.in
Token Release
17
Release after Transmission
Release after Reception
Physical ring is not needed to implement token passing. All that is needed is a logical ring, where each station knows its predecessor and successor
krraju.in
Frame Removal
18
To stop the frame circulating indefinitely (like the token), some station needs to remove it from the ring.
Frame removal is done at
Repeater regenerates and retransmits each bit
krraju.in
Listen State
19
krraju.in
Transmit State
Bypass State
20
krraju.in
Design Issues
21
krraju.in
Token Ring Advantages
22
krraju.in
Token Ring Advantages
23
krraju.in
Token Ring Disadvantages
24
Heavy Traffic: A queue to transmit frames is formed at each station. Station finishes transmitting, regenerates token. Next station downstream sees token and takes it. Process continues - round robin fashion.
Light Traffic: Token circles endlessly except for the rare occasion when a station grabs it and transmits a frame.
krraju.in
25
Token Ring (IEEE 802.5) | Ethernet (IEEE 802.3) |
Token passing mechanism is used. Only one station stays active at a time to send data | Uses CSMA/CD mechanism. More than one station stays active at a time. |
Deterministic. | Non-deterministic. |
Ring (or Star shaped) topology. | Bus topology. |
Handles priority | Does not employ priority. |
Costs more than Ethernet. | Costs 70% less than token ring. |
Telephone wire is used. | Coaxial cable is used. |
Contains routing information. | Does not contain routing information. |
Transmission speed is 4 to 16 Mbps. | Transmission speed is 10 to 100 Mbps. |
Unidirectional data flow from a station to another only when the token is received. | Data frames can be transmitted by any of the station if the network is idle. |
krraju.in
Recap
26
krraju.in
Video Links
27
krraju.in
Potpourri
28
krraju.in