Token Ring Networks Token Ring and FDDI 1

  • Slides: 15
Download presentation
Token Ring Networks: Token Ring and FDDI 1

Token Ring Networks: Token Ring and FDDI 1

IEEE 802. 5 and Token Ring • Proposed in 1969 and initially referred to

IEEE 802. 5 and Token Ring • Proposed in 1969 and initially referred to as a Newhall ring. Token ring : : a number of stations connected by transmission links in a ring topology. Information flows in one direction along the ring from source to destination and back to source. Medium access control is provided by a small frame, the token, that circulates around the ring when all stations are idle. Only the station possessing the token is allowed to transmit at any given time. Networks: Token Ring and FDDI 2

Token Ring Operation • When a station wishes to transmit, it must wait for

Token Ring Operation • When a station wishes to transmit, it must wait for token to pass by and seize the token. – One approach: change one bit in token which transforms it into a “start-of-frame sequence” and appends frame for transmission. – Second approach: station claims token by removing it from the ring. • Frame circles the ring and is removed by the transmitting station. • Each station interrogates passing frame, if destined for station, it copies the frame into local buffer. {Normally, there is a one bit delay as the frame passes through a station. } Networks: Token Ring and FDDI 3

Token Ring Network with star topology Copyright © 2000 The Mc. Graw Hill Companies

Token Ring Network with star topology Copyright © 2000 The Mc. Graw Hill Companies Leon-Garcia & Widjaja: Communication Networks: Token Ring and FDDI Figure 6. 58 4

Re-inserting token on the ring Choices: 1. After station has completed transmission of the

Re-inserting token on the ring Choices: 1. After station has completed transmission of the frame. 2. After leading edge of transmitted frame has returned to the sending station The essential issue is whether more than one frame is allowed on the ring at the same time. Networks: Token Ring and FDDI 5

(a) Low Latency Ring A t=0, A begins frame (b) A A t=90, return

(a) Low Latency Ring A t=0, A begins frame (b) A A t=90, return of first bit t=400, transmit last bit A t=490, reinsert token High Latency Ring A t=0, A begins frame A A t=400, last bit of frame enters ring t=840, return of first bit Networks: Token Ring and FDDI Copyright © 2000 The Mc. Graw Hill Companies Leon-Garcia & Widjaja: Communication Networks A t=1240, reinsert token 6 Figure 6. 59

(a) Low Latency Ring A t=0, A begins frame (b) High Latency Ring A

(a) Low Latency Ring A t=0, A begins frame (b) High Latency Ring A t=0, A begins frame A A t=90, return of first bit t=210, return of header A A t=400, transmit last bit t=840, arrival first frame bit Networks: Token Ring and FDDI Copyright © 2000 The Mc. Graw Hill Companies Leon-Garcia & Widjaja: Communication Networks A t=400, last bit enters ring, reinsert token A t=960, reinsert token 7 Figure 6. 60

IEEE 802. 5 Token Ring • 4 and 16 Mbps using twisted-pair cabling with

IEEE 802. 5 Token Ring • 4 and 16 Mbps using twisted-pair cabling with differential Manchester line encoding. • Maximum number of stations is 250. • Waits for last byte of frame to arrive before reinserting token on ring {new token after received}. • 8 priority levels provided via two 3 -bit fields (priority and reservation) in data and token frames. • Permits 16 -bit and 48 -bit addresses (same as 802. 3). Networks: Token Ring and FDDI 8

Token Ring • Under light load – delay is added due to waiting for

Token Ring • Under light load – delay is added due to waiting for the token. • Under heavy load – ring is “round-robin” • The ring must be long enough to hold the complete token. • Advantages – fair access • Disadvantages – ring is single point of failure, added issues due to token maintenance. Networks: Token Ring and FDDI 9

Token Maintenance Issues What can go wrong? • Loss of token (no token circulating)

Token Maintenance Issues What can go wrong? • Loss of token (no token circulating) • Duplication of token (forgeries or mistakes) ➔The need to designate one station as the active ring monitor. • Persistently circulating frame • Deal with active monitor going down. Networks: Token Ring and FDDI 10

IEEE 802. 5 Token and data frame structure Token Frame Format Data Frame Format

IEEE 802. 5 Token and data frame structure Token Frame Format Data Frame Format 1 1 1 SD AC 2 or 6 Destination Address FC SD J K 0 Access control PPP Frame control Ending delimiter Frame status T Information FCS 0 0 J K 1 C xx A I C ED 1 FS J, K non-data symbols (line code) E x x FF frame type ZZZZZZ control bit I E intermediate-frame bit error-detection bit A address-recognized bit xx undefined C frame-copied bit Networks: Token Ring and FDDI Copyright © 2000 The Mc. Graw Hill Companies 1 PPP Priority; T Token bit M Monitor bit; RRR Reservation M RRR Z Z Z FF A 4 2 or 6 Source Address Starting delimiter ED AC Leon-Garcia & Widjaja: Communication Networks 11 Figure 6. 61

IEEE STD 802. 4: Token Bus • Example: GM (MAP) • Logically, all stations

IEEE STD 802. 4: Token Bus • Example: GM (MAP) • Logically, all stations are organized into a ring • Note: 802. 4 MAC protocol is very complex, with each station having to maintain 10 different times and more than 2 dozen state variables. More than 200 pages. • Token ≡ A special control frame, and only the token holder is permitted to transmit frames. CSE 422 12

IEEE STD 802. 4: Token Bus (cont. ) A token bus CSE 422 13

IEEE STD 802. 4: Token Bus (cont. ) A token bus CSE 422 13

Token Bus MAC Sublayer Protocol • Stations are inserted into ring in order of

Token Bus MAC Sublayer Protocol • Stations are inserted into ring in order of station address, from highest to lowest. • Token passing is also done from high to low addresses. • Four priority classes: (0, 2, 4, 6) for traffic, with 0 the lowest and 6 the highest. When the token comes into the station, it passes to priority 6 substation, which may begin transmitting frames, if it has any. When it is done, (or when its timer expires), the token is passed to the priority 4 substations, etc. CSE 422 14

Frame Format of 802. 4 CSE 422

Frame Format of 802. 4 CSE 422