Professional Documents
Culture Documents
WWW Imt Edu
WWW Imt Edu
WWW Imt Edu
edu
Token Ring
www.imt.edu
Features
Network of heavy traffic, token passing is the most efficient network
architecture.
www.imt.edu
Token Passing
the first computer that comes online on the token ring network generates
this token. This station is called as : Active Monitor.
www.imt.edu
The signal will travel from one station to the other until it reaches its initiator .
When the destination
computer receives the data
frame, the data frame is
modified and sent on the
network back to the source
computer, indicating that the
transmission of data was S
successful.
D
When S want to transmit data it grabs the token
and then begin transmission. After receiving the
token, S will attach the data frame with the address
of destination computer . Each frame transmitted
on the ring is transmitted from one computer to the
next, until it ultimately returns to the initiator of the
transmission.
www.imt.edu
Priorities
Token passing is also called as deterministic.
( we can calculate the maximum time before a workstation can grab the
token and begin to transmit)
This way when the next token is generated, it includes the higher reserving
station. Stations must change the priority back to its previous value after
their transmission has completed.
www.imt.edu
Token Ring Frame
www.imt.edu
Token
www.imt.edu
Data/Command Frame
www.imt.edu
Start delimiter - which alerts the stations of a
token arrival (or data/command frame).
www.imt.edu
Access Control.
Priority field/Reservation field.
Permits designated high-priority stations to use
the network more frequently.
Token bit.
Distinguishes token from data/command frame.
Monitor bit.
Determines whether a frame is continuously
circling the ring endlessly.
www.imt.edu
Frame Control Byte
Only present in data/command frames
Indicates whether frame contains data or
control information
If control, this byte specifies type
www.imt.edu
Destination/Source addresses
6 bytes
www.imt.edu
Data Field
Length limited by the maximum time a station may hold
the token
www.imt.edu
FCS Field
Frame Check Sequence
Source fills field with calculated value
Dependent on frame contents
Destination recalculates to check data
integrity
Frame is discarded if damaged
www.imt.edu
End Delimiter
Completes the token or data/command frame
Contains damage indicator
Last of logical sequence
www.imt.edu
Token Ring Fault Management
Active monitoring
Beaconing
www.imt.edu
Active Monitoring
www.imt.edu
Beaconing
Frame is sent to the nearest active upstream neighbor (NAUN) until the
frame stops.
When the frame stops, beaconing determines that the next upstream
neighbor has a problem.
If the station that initiated the beacon receive its own beacon, it
assumes the link failure has been fixed, and then regenerates the token.
www.imt.edu
Multi Station Access Units
MSAU
Can see all information in a Token
Ring Network
Check for problems
Selectively remove stations from the
ring if needed
www.imt.edu
Overview of FDDI(Fiber
distributed data interconnect)
FDDI (Fiber Distributed Data Interconnect) is an improved
token ring specification based on fiber as the physical
medium.
www.imt.edu
Token is passed simultaneously
on the network's inner and outer
rings which backup each other.
www.imt.edu
in case of broken connection or station malfunction, the closest
station closes the network loop by sending the token it received from
the outer/inner ring back using the inner/outer ring. This feature is
www.imt.edu
www.imt.edu
SAS/DAS/DAC
www.imt.edu
Single-Attachment Stations
SAS
Attach to one ring (primary)
Attached through a concentrator
Provides connection for multiple SASs
Ensures that no one SAS can interrupt
the ring
www.imt.edu
Dual Attachment Stations
DAS
Class A
Attach to both rings
Has two ports to connect to the dual ring
Both ports connect to both rings
www.imt.edu
Preamble
Prepares each station for the upcoming frame
Start delimiter
Frame Control
Indicates the size of the address fields
Indicates whether frame contains asynchronous
or synchronous data
Other control information
www.imt.edu
Destination address
6 bytes
Unicast: to one address
Multicast: to several addresses
Broadcast: to all addresses
Source address
Data
Frame Check Sequence
End Delimiter
Frame Status
www.imt.edu
FDDI Token
www.imt.edu
Advantages of Optical Fiber
Security
Fiber does not emit electrical signals that
can be tapped
Reliability
Fiber is immune to electrical interference
Speed
Optical fiber has much higher
throughput potential than copper cable
www.imt.edu
FDDI Rings
FDDI specifies dual rings for physical
connections
Traffic on each ring travels in opposite
directions
Rings consist of two or more point-to-point
connections between adjacent stations
Primary ring is for data transmission
Secondary ring is for back up
www.imt.edu
Ethernet
www.imt.edu
Ethernet
www.imt.edu
Ethernet
www.imt.edu
Ethernet
www.imt.edu
NICs
Provides ports for network connection
Communicate with network via serial
connection
Communication with computer through
parallel connection
Resources required:
IRQ, I/O address, upper memory addresses
www.imt.edu
Selection Factors for NICs
Type of network
Ethernet, Token Ring, FDDI
Type of media
Twisted pair, coax, fiber
Type of system bus
PCI, ISA
www.imt.edu
NIC Operations
Layer 1 & Layer 2 device
Primarily Layer 2
Communicates with upper layers in the computer
Logical Link Control (LLC)
Has MAC address burned in
Encapsulates data into frames
Provides access to the media
Also Layer 1
Creates signals and interfaces with the media
On-board transceiver
www.imt.edu
Bridges
Connects two network segments
Can connect different layer 2 protocols
Ethernet, Token Ring, FDDI
Makes intelligent decisions about traffic
Reduces unnecessary traffic
Minimizes collisions
Filters traffic based on MAC address
Maintains address tables
Rarely implemented today
Conceptually important
www.imt.edu
Bridge Operations
www.imt.edu
Bridge Operations
Transparent to upper layers
Best used in low traffic areas
Can cause bottlenecks
Must examine every packet
Broadcasts
Messages sent to all devices
Destination MAC address unknown
Bridge will always forward
Can cause Broadcast Storm
• Network time outs, traffic slowdowns,
unacceptable performance
www.imt.edu
Switching Operation
Microsegmentation
Each switch port acts as a micro bridge (Layer 2 device)
Multiple traffic paths within the switch
• Virtual circuits
• Temporarily exist - only when needed
Each data frame has a dedicated path
No collisions
Increases bandwidth availability
• Each host gets full bandwidth
www.imt.edu
Advantages of Switches
www.imt.edu
Advantages of Switches
Allows many users to communicate in parallel
Creates virtual circuits
Creates dedicated segments
Collision free
Maximizes bandwidth
Cost effective
Can simply replace hubs in same cable infrastructure
Minimal disruption
Flexible network management
Software based configuration
www.imt.edu
Broadcast Domains
www.imt.edu
Two primary reasons for
segmenting a LAN
www.imt.edu
Bridge Drawback
Bridges increase the latency (delay) in
a network by 10-30%
A bridge is considered a store-and-
forward device slowing network
transmissions, thus causing delay.
www.imt.edu
Layer 2 Technologies
www.imt.edu
The Router is a layer 3 (Network) device,
but operates at layers 1-3.
Routers create the highest level of
segmentation because of their ability to make
exact determinations of where to send the data
packet.
Because routers perform more functions than
bridges, they operate with a higher rate of
latency.
www.imt.edu