SlideShare une entreprise Scribd logo
1  sur  26
COMPILED BY:
PANKAJ SHARMA

1
CONTENTS





WHAT IS PROJECT 802 ?
TOKEN PROTOCOL
OVERVIEW OF TOKEN BUS
TOKEN RING
TOKEN RING OPERATIONS
TOKEN RING FRAME FORMAT
MAINTENANCE

 COMPARISON OF TOKEN RING AND TOKEN BUS
 APPLICATIONS AND REASONS FOR WHY IT IS NOT IN

USE THESE DAYS.

2
PROJECT 802
Project 802 defined network standards for the
physical components of a network. It got started in the
month February of the year 1980 , that is why the
project name 802.

3
TOKEN PASSING PROTOCOLS
 Before workstation can transmit it must possess the one and

only token.
 Two types:
 Token ring
 Token bus

4
TOKEN BUS : IEEE STANDARD 802.4
 This standard 802.4(Dirvin and Miller and IEEE, 1986)





described a LAN called a token bus.
A simple system in which stations takes turns sending a frame
was introduced know as a TOKEN BUS SYSTEM.
The token bus is linear tree shaped cable onto which stations
are attached.
Logically stations are organized into a ring with each station
knowing the address of the station to its left and right.
During logical ring initialization the highest number station
may send the first frame.
5
 It passes permission to its immediate neighbor by sending the

neighbor a special control frame called a TOKEN.
 Only the token holder is permitted to transmit frames.
 Only one station at a time holds the token therefore no collision
occurs.
 It uses a broadcast medium for each station to receive frames .

6
TOKEN RING
IBM created TOKEN RINGS to compete with DIX
(DEC/Intel/Xerox) standard of Ethernet to improve upon its
previous token bus technology.

7
IEEE 802.5 TOKEN RING
Proposed in 1969 and initially referred to as a Newhall ring.
Token ring :: a number of stations connected by transmission
links in a ring topology. Information flows in one direction
along the ring from source to destination and back to
source. Can both be implemented using star as well as ring
topologies but basically it uses ring topology logically and
star topology physically.
Medium access control :: is provided by a small frame, the
token, that circulates around the ring when all stations are
idle. Only the station possessing the token is allowed to
transmit at any given time.
8
IEEE 802.5 TOKEN RING
 There is a point to point link

between stations that form a ring.
 Physical Layer Topology: Ring
 Stations connected in a loop
 Signals go in only one direction,

station-to-station

 In a token ring a special bit

format called a token circulated
around all the stations.

9
TOKEN RING OPERATION
 When a station wishes to transmit, it must wait for
the token to pass by and seize the token.
 One approach: change one bit in token which transforms it into a

normal data frame and appends frame for transmission.
 Second approach: station claims token by removing it from the
ring.

 The data frame circles the ring and is removed by the
transmitting station.
 Each station interrogates passing frame. If destined
for station, it copies the frame into local buffer.

10
 Ring interfaces have three operating modes.
 Repeater
 Insert

 Copy

Repeater: the input bits are simply copied to output with a delay
of 1 bit time.
Insert: the interface breaks the connection b/w the input &output
entering its own data onto the ring.
Copy: the interface or the station simply copies data into its local
buffer as it is the destined station.
As bits have propagated around the ring & they come back, they
are removed from the ring by the sender.
11
TOKEN RING NETWORK
WITH STAR TOPOLOGY
A

Wiring center Or the multistation attachment unit
E

B

C

D

12
Multistation Attachment Unit
Earlier there was problem of segmentation using just
by - pass relays , but that problem got easily solved
using multistation attachment unit because there were
many stations attached to this single unit . Also the
problem of going down of stations got corrected.

13
Token Frame Format
S

AC

(1 Byte)

E

(1 Byte)

(1 Byte)

Start Frame Delimiter

End Frame Delimiter

P

Priority Bits
000 – lowest
111 - highest

Access Control

P

P

Token Bit
0 – Token frame
1 – nontoken
frame

T

M

R

R

R

Monitor Bit
0 = “clean” frame
1 = “orphaned" frame

Reservation Bits
3-bit field used for
reserving a token
at a prescribed
priority level

14
IEEE 802.5 Data Frame Structure
Data Frame Format
1
SD

1

1

AC

FC

Starting
delimiter

2 or 6

Ending
delimiter
Frame
status

4

Destination Source Information FCS
Address
Address
J

Access
control
Frame
control

2 or 6

K

0

J

M

PPP T

FF
J

A

K

C

Z
1

K 0

Z

Z

A

0

Z

C

J, K

1

ED

FS

non-data symbols

PPP Priority; T Token bit
M Monitor bit; RRR Reservation

RRR

J K1 I

xx

0

1

Z
E

x x

Z

FF
ZZZZZZ
I
E

frame type
control bit

intermediate-frame bit
error-detection bit

A addressrecognized bit
xx undefined
C frame-copied bit
15
Frame
control

FC

00000000 = duplicate address
test; used if two
lobes have the same
address.
00000010 = beacon; used to
locate breaks in the
ring
00000011 = claim token; used to
recover from an
inactive monitor
00000100 = purge; used to
reinitialize the ring.
00000101 = active monitor
present;used by the
active monitor to
inform all lobes that
it is alive.
00000110 = standby monitor
present; used to
notify all lobes that
a standby
monitor is present.

Frame
Status

FS

00xx00xx = address not
recognized;
nothing copied.
10xx10xx = address
recognized;
nothing copied
01xx01xx = address not
recognized; data
copied(major
error)
11xx11xx = address
recognized; data
copied (implies
transmission was
successful).

16
 Starting delimiter and ending delimiter mark the
beginning & ending of the frame.
 Access control consist of token bit, monitor bit,
priority bit.
 Destination address & source address fields gives the
address.
 Checksum field is used to detect transmission errors.

17
Frame status field
 When a frame arrives at the interface A bit is turned on.
 If the interface copies the frame to the station the C bit is

turned on.
 3 combinations:
A=0 C=0 : Destination not present or not
powered.
A=1 C=0 : destination present but frame not
accepted.
A=1 C=1 : Destination present and frame copied.

This increases reliability and acts as automatic
acknowledgement.
18
STAR TOPOLOGY OR WIRE CENTER
• Physically each station is connected to the Multistation

Attachment Unit by a cable. While logically it is still a ring.
• A bypass relay that are energized by the current from the
station are inside the Multistation Attachment Unit.
• When station goes down the station is bypassed from the rest
of the ring.
• Multistation Attachment Unit improves the reliability and
maintainability.

19
MAINTANAINCE
Here we use a MONITER STATION that oversees the
ring.
Active Monitor Station Selection takes place using MAC
addresses.
Active Monitor Station Observes the ring for its correct
functioning.

20
Tasks Performed by Active Monitor
Station
•
•
•
•
•
•

Upstream Neighbour Determination
Sending purge-frame in the ring
Loss of token (no token circulating.
Garbled frames appears.
Orphan frames.
Length of the ring.
Monitor cannot handle breaks in the ring.

21
GARBLED AND ORPHAN FRAMES
Both actually refers to the corrupted frames. For e.g.
sometimes what happens that in case a station after
sending data got corrupted. Now as it is the duty of the
sending station to release the token so as there is no
sending station so this frame becomes orphaned
frame. And that needs to be removed by the monitor
station . Similar is the case with garbled frame .
Monitor Station changes monitor bit to 1 and when it
again receives it , it removes it from the ring.

22
802.4 Vs 802.5









802.4 does not use any monitor like 802.5.
Which is more reliable ? (depends upon the situation)
Token ring & token bus both have priorities but not 802.3.
Adding new station to token bus was difficult as compared to
the addition in token ring.
In token bus there is no relation between the physical location
of a station on the bus to its address whereas it was not so in
token ring.
Both uses broadcasting addresing technique.
Basically token ring is primarily used for control of industrial
and factory automation processes.
Main problem : No active Monitor Station.
23
Applications :
 Used in large Local Area Networks.
 Provides security and save time as there was no packet

collision.

Why It Got Down:
 Single point of Failure.

 Very High Cost.
 The era of Switching technique gave ETHERNET an

edge over it.

24
REFERENCE
 A.S. Tanenbaum, “Computer Networks”.

 en.wikipedia.org/wiki/token_bus_network.
 www.ustudy.in/node/6513
 www.fags.org/rfcs/rfc1230

 ntrg.cs.tcd.ie/meplirce/dce/98/token/compare7.htm

25
THANK YOU

26

Contenu connexe

Tendances

TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control ProtocolPeter R. Egli
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Ali Usman
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Modelfarhan516
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaNitish Jadia
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And CorrectionRenu Kewalramani
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 

Tendances (20)

GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
TCP - Transmission Control Protocol
TCP - Transmission Control ProtocolTCP - Transmission Control Protocol
TCP - Transmission Control Protocol
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
TCP/IP Model
TCP/IP ModelTCP/IP Model
TCP/IP Model
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Congestion control
Congestion controlCongestion control
Congestion control
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish Jadia
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Ethernet
EthernetEthernet
Ethernet
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 

En vedette

En vedette (7)

FDDI
FDDIFDDI
FDDI
 
Fddi
FddiFddi
Fddi
 
FDDI
FDDIFDDI
FDDI
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Pure Aloha and Slotted Aloha
Pure Aloha and Slotted AlohaPure Aloha and Slotted Aloha
Pure Aloha and Slotted Aloha
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 

Similaire à Token Ring : 802.5 (20)

Token Ring Basic Concepts
Token Ring Basic ConceptsToken Ring Basic Concepts
Token Ring Basic Concepts
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
Token_Ring.pdf
Token_Ring.pdfToken_Ring.pdf
Token_Ring.pdf
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Synchronous optical networking (SONET)
Synchronous optical networking (SONET) Synchronous optical networking (SONET)
Synchronous optical networking (SONET)
 
Data link layer
Data link layerData link layer
Data link layer
 
Sonet
SonetSonet
Sonet
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 
Intro to Ethernet
Intro to EthernetIntro to Ethernet
Intro to Ethernet
 
Synchronization
SynchronizationSynchronization
Synchronization
 
C C N A Day4
C C N A  Day4C C N A  Day4
C C N A Day4
 
module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptx
 
Token ring
Token ringToken ring
Token ring
 
Networking report
Networking reportNetworking report
Networking report
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 

Dernier

Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 

Dernier (20)

Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 

Token Ring : 802.5

  • 2. CONTENTS     WHAT IS PROJECT 802 ? TOKEN PROTOCOL OVERVIEW OF TOKEN BUS TOKEN RING TOKEN RING OPERATIONS TOKEN RING FRAME FORMAT MAINTENANCE  COMPARISON OF TOKEN RING AND TOKEN BUS  APPLICATIONS AND REASONS FOR WHY IT IS NOT IN USE THESE DAYS. 2
  • 3. PROJECT 802 Project 802 defined network standards for the physical components of a network. It got started in the month February of the year 1980 , that is why the project name 802. 3
  • 4. TOKEN PASSING PROTOCOLS  Before workstation can transmit it must possess the one and only token.  Two types:  Token ring  Token bus 4
  • 5. TOKEN BUS : IEEE STANDARD 802.4  This standard 802.4(Dirvin and Miller and IEEE, 1986)     described a LAN called a token bus. A simple system in which stations takes turns sending a frame was introduced know as a TOKEN BUS SYSTEM. The token bus is linear tree shaped cable onto which stations are attached. Logically stations are organized into a ring with each station knowing the address of the station to its left and right. During logical ring initialization the highest number station may send the first frame. 5
  • 6.  It passes permission to its immediate neighbor by sending the neighbor a special control frame called a TOKEN.  Only the token holder is permitted to transmit frames.  Only one station at a time holds the token therefore no collision occurs.  It uses a broadcast medium for each station to receive frames . 6
  • 7. TOKEN RING IBM created TOKEN RINGS to compete with DIX (DEC/Intel/Xerox) standard of Ethernet to improve upon its previous token bus technology. 7
  • 8. IEEE 802.5 TOKEN RING Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations connected by transmission links in a ring topology. Information flows in one direction along the ring from source to destination and back to source. Can both be implemented using star as well as ring topologies but basically it uses ring topology logically and star topology physically. Medium access control :: is provided by a small frame, the token, that circulates around the ring when all stations are idle. Only the station possessing the token is allowed to transmit at any given time. 8
  • 9. IEEE 802.5 TOKEN RING  There is a point to point link between stations that form a ring.  Physical Layer Topology: Ring  Stations connected in a loop  Signals go in only one direction, station-to-station  In a token ring a special bit format called a token circulated around all the stations. 9
  • 10. TOKEN RING OPERATION  When a station wishes to transmit, it must wait for the token to pass by and seize the token.  One approach: change one bit in token which transforms it into a normal data frame and appends frame for transmission.  Second approach: station claims token by removing it from the ring.  The data frame circles the ring and is removed by the transmitting station.  Each station interrogates passing frame. If destined for station, it copies the frame into local buffer. 10
  • 11.  Ring interfaces have three operating modes.  Repeater  Insert  Copy Repeater: the input bits are simply copied to output with a delay of 1 bit time. Insert: the interface breaks the connection b/w the input &output entering its own data onto the ring. Copy: the interface or the station simply copies data into its local buffer as it is the destined station. As bits have propagated around the ring & they come back, they are removed from the ring by the sender. 11
  • 12. TOKEN RING NETWORK WITH STAR TOPOLOGY A Wiring center Or the multistation attachment unit E B C D 12
  • 13. Multistation Attachment Unit Earlier there was problem of segmentation using just by - pass relays , but that problem got easily solved using multistation attachment unit because there were many stations attached to this single unit . Also the problem of going down of stations got corrected. 13
  • 14. Token Frame Format S AC (1 Byte) E (1 Byte) (1 Byte) Start Frame Delimiter End Frame Delimiter P Priority Bits 000 – lowest 111 - highest Access Control P P Token Bit 0 – Token frame 1 – nontoken frame T M R R R Monitor Bit 0 = “clean” frame 1 = “orphaned" frame Reservation Bits 3-bit field used for reserving a token at a prescribed priority level 14
  • 15. IEEE 802.5 Data Frame Structure Data Frame Format 1 SD 1 1 AC FC Starting delimiter 2 or 6 Ending delimiter Frame status 4 Destination Source Information FCS Address Address J Access control Frame control 2 or 6 K 0 J M PPP T FF J A K C Z 1 K 0 Z Z A 0 Z C J, K 1 ED FS non-data symbols PPP Priority; T Token bit M Monitor bit; RRR Reservation RRR J K1 I xx 0 1 Z E x x Z FF ZZZZZZ I E frame type control bit intermediate-frame bit error-detection bit A addressrecognized bit xx undefined C frame-copied bit 15
  • 16. Frame control FC 00000000 = duplicate address test; used if two lobes have the same address. 00000010 = beacon; used to locate breaks in the ring 00000011 = claim token; used to recover from an inactive monitor 00000100 = purge; used to reinitialize the ring. 00000101 = active monitor present;used by the active monitor to inform all lobes that it is alive. 00000110 = standby monitor present; used to notify all lobes that a standby monitor is present. Frame Status FS 00xx00xx = address not recognized; nothing copied. 10xx10xx = address recognized; nothing copied 01xx01xx = address not recognized; data copied(major error) 11xx11xx = address recognized; data copied (implies transmission was successful). 16
  • 17.  Starting delimiter and ending delimiter mark the beginning & ending of the frame.  Access control consist of token bit, monitor bit, priority bit.  Destination address & source address fields gives the address.  Checksum field is used to detect transmission errors. 17
  • 18. Frame status field  When a frame arrives at the interface A bit is turned on.  If the interface copies the frame to the station the C bit is turned on.  3 combinations: A=0 C=0 : Destination not present or not powered. A=1 C=0 : destination present but frame not accepted. A=1 C=1 : Destination present and frame copied. This increases reliability and acts as automatic acknowledgement. 18
  • 19. STAR TOPOLOGY OR WIRE CENTER • Physically each station is connected to the Multistation Attachment Unit by a cable. While logically it is still a ring. • A bypass relay that are energized by the current from the station are inside the Multistation Attachment Unit. • When station goes down the station is bypassed from the rest of the ring. • Multistation Attachment Unit improves the reliability and maintainability. 19
  • 20. MAINTANAINCE Here we use a MONITER STATION that oversees the ring. Active Monitor Station Selection takes place using MAC addresses. Active Monitor Station Observes the ring for its correct functioning. 20
  • 21. Tasks Performed by Active Monitor Station • • • • • • Upstream Neighbour Determination Sending purge-frame in the ring Loss of token (no token circulating. Garbled frames appears. Orphan frames. Length of the ring. Monitor cannot handle breaks in the ring. 21
  • 22. GARBLED AND ORPHAN FRAMES Both actually refers to the corrupted frames. For e.g. sometimes what happens that in case a station after sending data got corrupted. Now as it is the duty of the sending station to release the token so as there is no sending station so this frame becomes orphaned frame. And that needs to be removed by the monitor station . Similar is the case with garbled frame . Monitor Station changes monitor bit to 1 and when it again receives it , it removes it from the ring. 22
  • 23. 802.4 Vs 802.5         802.4 does not use any monitor like 802.5. Which is more reliable ? (depends upon the situation) Token ring & token bus both have priorities but not 802.3. Adding new station to token bus was difficult as compared to the addition in token ring. In token bus there is no relation between the physical location of a station on the bus to its address whereas it was not so in token ring. Both uses broadcasting addresing technique. Basically token ring is primarily used for control of industrial and factory automation processes. Main problem : No active Monitor Station. 23
  • 24. Applications :  Used in large Local Area Networks.  Provides security and save time as there was no packet collision. Why It Got Down:  Single point of Failure.  Very High Cost.  The era of Switching technique gave ETHERNET an edge over it. 24
  • 25. REFERENCE  A.S. Tanenbaum, “Computer Networks”.  en.wikipedia.org/wiki/token_bus_network.  www.ustudy.in/node/6513  www.fags.org/rfcs/rfc1230  ntrg.cs.tcd.ie/meplirce/dce/98/token/compare7.htm 25