Professional Documents
Culture Documents
Submitted BY:: Deba Prasad Agasti Regd. No: 0701294124
Submitted BY:: Deba Prasad Agasti Regd. No: 0701294124
1
CERTIFICATE
This is to certify that the seminar report based on
Submitted by:
DEBA PRASAD AGASTI(Regd. No:0701294124)
2
ACKNOWLEDGEMENT
Behind every student who ascends the height of success and achievement has a
group effort and it is reflected in this seminar. I cannot forget the role and
responsibility of the people who were instrumental in extending all possible support
for preparation of this seminar report.
I further take this opportunity to thank all the staff members of my college for
taking active participation and providing me all the necessary data and statistics
during the preparation of my report so as to make it a great success.
Submitted by:
3
CONTENTS
SL. NO. TOPIC PAGE NO.
1 ABSTRACT 05
2 INTRODUCTION 06
3 TOKEN RING OPERATION 07
4 TOKEN RING SELF MAINTAINANCE 09
5 CABLES USED IN TOKEN RING 10
6 TOKEN RING OPERATION USING 11
A HUB
7 TOKEN RING/IEEE 802.5 12
8 BEACONING 13
9 PRIORITY SYSTEM 14
10 FAULT MANAGEMENT MECHANISMS 15
11 TOKEN RING INSERTION PROCESS 17
12 TOKEN RING ERRORS 18
13 CONCLUSION 19
14 REFERENCES 20
4
ABSTRACT
5
INTRODUCTION
Token ring local area network (LAN) technology is a local area
network protocol which resides at the data link layer (DLL) of
the OSI model. It uses a special three-byte frame called a token
that travels around the ring. Token-possession grants the
possessor permission to transmit on the medium. Token ring
frames travel completely around the loop.
6
TOKEN RING OPERATION
At the start, a free Token is circulating on the ring, this is a data frame
which to all intents and purposes is an empty vessel for transporting
data. To use the network, a machine first has to capture the free
Token and replace the data with its own message.
The packet of data is then sent to machine 2 who reads the address,
realizes it is not its own, so passes it on to machine 3. Machine 3 does
the same and passes the Token on to machine 4.
Machine 6 does the same and forwards the data to number 1, who
sent the original message.
That's the basics of Token Ring and it shows how data is sent,
received and acknowledged, but Token Ring also has a built in
management and recovery system which makes it very fault tolerant.
Below is a brief outline of Token Ring's self maintenance system.
7
8
TOKEN RING SELF MAINTAINANCE
When a Token Ring network starts up, the machines all take part in a
negotiation to decide who will control the ring, or become the 'Active
Monitor' to give it its proper title. This is won by the machine with the
highest MAC address who is participating in the contention
procedure, and all other machines become 'Standby Monitors'.
The job of the Active Monitor is to make sure that none of the
machines are causing problems on the network, and to re-establish
the ring after a break or an error has occurred. The Active Monitor
performs Ring Polling every seven seconds and ring purges when
there appears to be a problem. The ring polling allows all machines
on the network to find out who is participating in the ring and to learn
the address of their Nearest Active Upstream Neighbour (NAUN). Ring
purges reset the ring after an interruption or loss of data is reported.
When a machine enters the ring it performs a lobe test to verify that
its own connection is working properly, if it passes, it sends a voltage
to the hub which operates a relay to insert it into the ring.
9
CABLES USED IN TOKEN RING
UTP or STP cabling is used as a media for token ring networks.
Token Ring uses an IBM cabling system based on American Wire
Gauge (AWG) standards that specify wire diameters. The larger
the AWG number, the small diameter the cable has.
Type Description
Two 22 AWG solid core pair of STP cable with a braided
1 shield. This cable is normally used between MAUs and
computers.
Two 22 AWG solid core pair with four 26 AWG solid core of
2
STP cable.
Four 22 or 24 AWG UTP cable. This is voice-grade cable and
3
cannot transmit at a rate above 4Mbps.
4 Undefined.
5 Fiber-optic cable. Usually used to link MAUs.
Two 26 AWG stranded core pair of STP cable with a braided
6 shield. The stranded-core allows more flexibility but limits the
transmission distance to two-thirds that of type 1.
7 Undefined.
8 Type 6 cable with a flat casing to be used under carpets.
9 Type 6 cable with plenum-rating for safety.
10
TOKEN RING OPERATION USING A HUB
11
The Token Ring network was originally developed by IBM in the 1970s. It is still
IBM's primary local-area network (LAN) technology. The related IEEE 802.5
specification is almost identical to and completely compatible with IBM's Token
Ring network. In fact, the IEEE 802.5 specification was modeled after IBM Token
Ring, and it continues to shadow IBM's Token Ring development. The term Token
Ring generally is used to refer to both IBM's Token Ring network and IEEE 802.5
networks. This chapter addresses both Token Ring and IEEE 802.5.
Token Ring and IEEE 802.5 networks are basically compatible, although the
specifications differ in minor ways. IBM's Token Ring network specifies a star,
with all end stations attached to a device called a multistation access unit
(MSAU). In contrast, IEEE 802.5 does not specify a topology, although virtually all
IEEE 802.5 implementations are based on a star. Other differences exist,
including media type (IEEE 802.5 does not specify a media type, although IBM
Token Ring networks use twisted-pair wire) and routing information field size.
Figure 9-1 summarizes IBM Token Ring network and IEEE 802.5 specifications.
12
BEACONING
The first computer turned on a token ring will be
the active monitor. Every seven seconds it sends a
frame to its nearest active downstream neighbor.
The data gives the address of the active monitor
and advertised the fact that the upstream neighbor
is the active monitor. That station changes the
packets upstream address and sends it to its
nearest active downstream neighbor. When the
packet has traveled around the ring, all stations
13
know the address of their upstream neighbor and
the active monitor knows the state of the network.
If a computer has not heard from its upstream
neighbor after seven seconds, it will send a packet
that announces its own address, and the NAUN that
is not responding. This packet will cause all
computers to check their configuration. The ring
can thereby route around the problem area giving
some fault tolerance to the network.
14
Priority System
15
Fault-Management Mechanisms
Token Ring networks employ several mechanisms for detecting
and compensating for network faults. For example, one station in
the Token Ring network is selected to be the active monitor. This
station, which potentially can be any station on the network, acts
as a centralized source of timing information for other ring stations
and performs a variety of ring-maintenance functions. One of
these functions is the removal of continuously circulating frames
from the ring. When a sending device fails, its frame may continue
to circle the ring. This can prevent other stations from transmitting
their own frames and essentially can lock up the network. The
active monitor can detect such frames, remove them from the
ring, and generate a new token.
The IBM Token Ring network's star topology also contributes to
overall network reliability. Because all information in a Token Ring
network is seen by active MSAUs, these devices can be
programmed to check for problems and selectively remove
stations from the ring, if necessary.
A Token Ring algorithm called beaconing detects and tries to
repair certain network faults. Whenever a station detects a
serious problem with the network (such as a cable break), it
sends a beacon frame, which defines a failure domain. This
domain includes the station reporting the failure, its nearest active
upstream neighbor (NAUN), and everything in between.
Beaconing initiates a process called autoreconfiguration, in which
nodes within the failure domain automatically perform diagnostics
in an attempt to reconfigure the network around the failed areas.
Physically, the MSAU can accomplish this through electrical
reconfiguration
16
FRAME FORMAT
IEEE 802.5 and Token Ring Specify Tokens and Data/Command Frames
17
18
TOKEN RING INSERTION PROCESS
Token ring stations must go through a 5-phase ring insertion
process before being allowed to participate in the ring network. If
any of these phases fail, the token ring station will not insert into
the ring and the token ring driver may report an error.
19
TOKEN RING ERRORS
TYPES OF ERRORS
o ARI/FCI ERROR
o LOST FRAME
o LINE ERROR
o BURST ERROR
o BEACON ERROR
o FREQUENCY ERROR
20
CONCLUSION
21
REFERENCES
USENET comp.dcom.lans.misc
Castelli, Matthew (2002). Network Consultants
Handbook. Cisco Press. ISBN 1-58705-039-0.
22