SlideShare a Scribd company logo
Token Ring
Token Ring
• IEEE 802.5 – Token ring
Token Ring
– set of nodes connected in a ring.
– Data always flow in a particular direction around the ring.
– Each node in the ring receiving the frame from its upstream neighbor and
then forwarding them to its downstream neighbor.
Token – used to access the ring
• Token is a special sequence of bits, circulates around the ring.
• Each node receives and forwards the token.
– When a node sees the token,
• If it has a frame to transmit, it takes the token off the ring and inserts the frame
into the ring.
• Each node along the way simply forwards the frame. Destination node saving
the copy of the frame into the adaptor and forwards the message to the next
node.
• When the frame reaches the sender, it strips the frame off the ring and reinserts
the token.
Token Ring Contd…
– Each node in the ring gets a chance to transmit.
– Nodes are serviced in a round robin manner.
Physical Properties
– Uses ring topology.
– Problem – any node or link failure leads to entire network failure.
Solution:
• Connecting each station into the ring using electromechanical relay.
– If station is healthy, relay is opened. i.e., station is included in the ring.
– If station fails, it stops providing power. So relay is closed and the ring
automatically bypasses the station.
Token Ring Contd…
Multi station Access Unit (MSAU)
– Several relays packed into a single box.
– Easy to add / remove stations from the network.
Characteristics:
– Supports 4Mbps or 16Mbps data rate.
– Differential Manchester encoding scheme is used.
– Number of stations in the ring is limited to 250 for IEEE802.5 (260 for IBM
Token ring).
Token Ring Contd…
Token ring Media Access Control
– Network adaptor of the token ring contains a receiver, transmitter and one
or more bits of data storage between them.
– When none of the stations has anything to send, the token circulates around
the ring.
– Ring has enough storage capacity to hold an entire token.
• 1 bit / station
– For example, 24 bit token can circulate in the network having maximum 24
stations.
• But it will not work proper for network having lesser number of stations than
24.
– This will be avoided by “Monitor”
Token Operation:
– Token circulates around the ring, any station that has data to send may seize the
token.
• i.e., it drains the token off the ring and begin sending data.
• Seizing process just involves modifying 1bit in second byte of the token
Token Ring Contd…
– Station that has token can send data.
– Each transmitted packet contains the destination address of the intended
receiver.
• It may be unicast address, multicast address or broadcast address.
– Each node in the ring look inside the packet to see if it is the intended
receiver.
• If so, copies the data frame and pass it to the ring and the packet find the way
back to the sender.
– Then sending station remove the frame from the ring and reinserts the token
to the ring.
Issues:
– How much data a given node is allowed to transmit?
Token Holding Time (THT) – time period given to nodes to hold the token.
• But unfair to stations to other than the station holding the token
• This will be avoided using TRT (Token Rotation Time)
TRT ≤ Active nodes * THT + Ring Latency
Token Ring Contd…
Ring Latency – how long it takes the token to circulate around the ring when
no one has data to send.
Active nodes – number of nodes that have data to send.
Reliable Transmission
– IEEE 802.5 provides reliable data delivery using 2 bits (A&C) in the packet trailer.
– Initially these bits are set to 0.
– When a station sees a frame for which it is the intended recipient,
• It sets A bit into ‘1’
– When it copies the frame into local adaptor buffer,
• It sets the C bit into ‘1’
– When the sender sees the frame come back over the ring
• If A = 0 – receiver is not functioning well.
• If A = 1, but C = 0 then destination does not accepted the frame due to some reason (eg., Lack of
buffer)
Priority Bits:
• The token contains 3 bit priority field.
• Each device that want to transmit the packet assigns a priority to that packet & the device can hold the
token, if the priority is at least as great as tokens priority.
• Lower priority packets circulate for long in ring
Token Release
– Early Release
• After transmitting packet
– Delayed Release
• After removing the packet when it returns to the sender
Token Ring Contd…
Token Ring Maintenance:
– Token rings have a designated monitor.
– The monitor’s job is ensure the health of the token.
– Any station in the ring can become the monitor.
• Monitor is first elected when the ring is first connected or failure of the current
monitor.
– Healthy monitor periodically announces its presence with a special control
message.
• If a station fails to see the control message for some period of time, it will
assume that the monitor has failed and will try to become the monitor.
– When a station decides that a new monitor is needed, it transmits a “Claim
Token” frame, announcing its intent to become the new monitor.
• If the token circulates back to the sender, it can assume that it is OK for it to
become a monitor.
• If some other is trying to become the monitor at the same instant, the sender
might see the “claim token” message from that other station first,
– Highest Address wins
Token Ring Contd…
Roles of Monitor:
• May need to insert additional delay into the ring
• Detecting the missing token
• Watches for a passing token and maintains a timer equal to the maximum
possible token rotation time.
(NumStations * THT) + Ring Latency
Ring Latency – total propagation delay on the ring.
• Checks for corrupted or orphaned frame.
 Corrupted frame – checksum error or invalid formats.
 Orphaned frame – transmitted correctly on the ring, but whose parent died.
i.e., sending station went down before it could remove the frame from the ring.
• Its detected by using a “Monitor” bit.
• Monitor bit is “0” on transmission
• Set to ‘1’ when it passes the monitor first time.
• If the monitor sees a frame with this bit is set, it knows the frame is going by
for the second time and it drains the frame off the ring.
• Detection of dead stations.
 If any station suspects failure on the ring, it can send “beacon” frame to suspect
destination.
• Status of the ring can be established and malfunctioning station can be bypassed in the MSAU
Token Ring Contd…
Frame Format:
– “illegal” Manchester codes in the start and end delimiters.
– Access Control – includes frame priority, reservation priority.
– Frame Control – Demux key that identifies the higher layer protocol.
– 48 bit Destination and source hardware addresses
– Checksum – error detection code
– Frame Status – includes A & C bits

More Related Content

Token ring

  • 2. Token Ring • IEEE 802.5 – Token ring Token Ring – set of nodes connected in a ring. – Data always flow in a particular direction around the ring. – Each node in the ring receiving the frame from its upstream neighbor and then forwarding them to its downstream neighbor. Token – used to access the ring • Token is a special sequence of bits, circulates around the ring. • Each node receives and forwards the token. – When a node sees the token, • If it has a frame to transmit, it takes the token off the ring and inserts the frame into the ring. • Each node along the way simply forwards the frame. Destination node saving the copy of the frame into the adaptor and forwards the message to the next node. • When the frame reaches the sender, it strips the frame off the ring and reinserts the token.
  • 3. Token Ring Contd… – Each node in the ring gets a chance to transmit. – Nodes are serviced in a round robin manner. Physical Properties – Uses ring topology. – Problem – any node or link failure leads to entire network failure. Solution: • Connecting each station into the ring using electromechanical relay. – If station is healthy, relay is opened. i.e., station is included in the ring. – If station fails, it stops providing power. So relay is closed and the ring automatically bypasses the station.
  • 4. Token Ring Contd… Multi station Access Unit (MSAU) – Several relays packed into a single box. – Easy to add / remove stations from the network. Characteristics: – Supports 4Mbps or 16Mbps data rate. – Differential Manchester encoding scheme is used. – Number of stations in the ring is limited to 250 for IEEE802.5 (260 for IBM Token ring).
  • 5. Token Ring Contd… Token ring Media Access Control – Network adaptor of the token ring contains a receiver, transmitter and one or more bits of data storage between them. – When none of the stations has anything to send, the token circulates around the ring. – Ring has enough storage capacity to hold an entire token. • 1 bit / station – For example, 24 bit token can circulate in the network having maximum 24 stations. • But it will not work proper for network having lesser number of stations than 24. – This will be avoided by “Monitor” Token Operation: – Token circulates around the ring, any station that has data to send may seize the token. • i.e., it drains the token off the ring and begin sending data. • Seizing process just involves modifying 1bit in second byte of the token
  • 6. Token Ring Contd… – Station that has token can send data. – Each transmitted packet contains the destination address of the intended receiver. • It may be unicast address, multicast address or broadcast address. – Each node in the ring look inside the packet to see if it is the intended receiver. • If so, copies the data frame and pass it to the ring and the packet find the way back to the sender. – Then sending station remove the frame from the ring and reinserts the token to the ring. Issues: – How much data a given node is allowed to transmit? Token Holding Time (THT) – time period given to nodes to hold the token. • But unfair to stations to other than the station holding the token • This will be avoided using TRT (Token Rotation Time) TRT ≤ Active nodes * THT + Ring Latency
  • 7. Token Ring Contd… Ring Latency – how long it takes the token to circulate around the ring when no one has data to send. Active nodes – number of nodes that have data to send. Reliable Transmission – IEEE 802.5 provides reliable data delivery using 2 bits (A&C) in the packet trailer. – Initially these bits are set to 0. – When a station sees a frame for which it is the intended recipient, • It sets A bit into ‘1’ – When it copies the frame into local adaptor buffer, • It sets the C bit into ‘1’ – When the sender sees the frame come back over the ring • If A = 0 – receiver is not functioning well. • If A = 1, but C = 0 then destination does not accepted the frame due to some reason (eg., Lack of buffer) Priority Bits: • The token contains 3 bit priority field. • Each device that want to transmit the packet assigns a priority to that packet & the device can hold the token, if the priority is at least as great as tokens priority. • Lower priority packets circulate for long in ring
  • 8. Token Release – Early Release • After transmitting packet – Delayed Release • After removing the packet when it returns to the sender
  • 9. Token Ring Contd… Token Ring Maintenance: – Token rings have a designated monitor. – The monitor’s job is ensure the health of the token. – Any station in the ring can become the monitor. • Monitor is first elected when the ring is first connected or failure of the current monitor. – Healthy monitor periodically announces its presence with a special control message. • If a station fails to see the control message for some period of time, it will assume that the monitor has failed and will try to become the monitor. – When a station decides that a new monitor is needed, it transmits a “Claim Token” frame, announcing its intent to become the new monitor. • If the token circulates back to the sender, it can assume that it is OK for it to become a monitor. • If some other is trying to become the monitor at the same instant, the sender might see the “claim token” message from that other station first, – Highest Address wins
  • 10. Token Ring Contd… Roles of Monitor: • May need to insert additional delay into the ring • Detecting the missing token • Watches for a passing token and maintains a timer equal to the maximum possible token rotation time. (NumStations * THT) + Ring Latency Ring Latency – total propagation delay on the ring. • Checks for corrupted or orphaned frame.  Corrupted frame – checksum error or invalid formats.  Orphaned frame – transmitted correctly on the ring, but whose parent died. i.e., sending station went down before it could remove the frame from the ring. • Its detected by using a “Monitor” bit. • Monitor bit is “0” on transmission • Set to ‘1’ when it passes the monitor first time. • If the monitor sees a frame with this bit is set, it knows the frame is going by for the second time and it drains the frame off the ring. • Detection of dead stations.  If any station suspects failure on the ring, it can send “beacon” frame to suspect destination. • Status of the ring can be established and malfunctioning station can be bypassed in the MSAU
  • 11. Token Ring Contd… Frame Format: – “illegal” Manchester codes in the start and end delimiters. – Access Control – includes frame priority, reservation priority. – Frame Control – Demux key that identifies the higher layer protocol. – 48 bit Destination and source hardware addresses – Checksum – error detection code – Frame Status – includes A & C bits