SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Computer Networks
Token Rings 802.5
2
Token Rings
• IBM Token Ring & IEEE 802.5
• FDDI
• Resilient Packet Ring IEEE 802.17…
•
IBM Token Rings are the most famous of this series
3
About IBM Token Rings
• Network consists of a set of nodes connected in a
ring & data always flows in particular direction
• Each node receives frames from its upstream node
and transmits to its downstream node
• Token rings share two features with Ethernets
– Requires an algorithm that controls when each node is allowed
to transmit
– All nodes see all frames with destination saving a copy of it
4
Tokens
• Special sequence of bits that circulates around
the ring
– 24 bits in case of 802.5
• When node with a frame to transmit sees the
token, it takes the token off the ring and instead
inserts its own frame on the network
– Frame is forwarded by all nodes while destination too makes a
copy of it and forwards it
– Packet is received again by sender which strips its frame off
the ring and reinserts the token
5
Physical Properties
• Link failure in ring may disrupt transmission of the
whole network
• Electromechanical relay is used to overcome this
problem
• As long as the station is healthy, the relay is open
• When the stations stops powering the relay, it
gets closed and the station is removed from the
network
6
Use of Electromechanical relay
From Previous Host To Next Host
Host
Relay
7
Use of Electromechanical relay
From Previous Host To Next Host
Host
Relay
8
Multi Station Access Unit… MSAU
• Several Electromechanical relays packed into a
single box
• It makes token rings look like a star topology
• Systems are plugged in and out of MSAU
• One of the main differences between 802.5 and
IBM Token Rings is that the latter requires MSAU
– The other difference however can be that that IBM Token
Rings can have up to 260 stations per ring while 802.5 supports
250
– Physical media for IBM is twisted pair but not defined for
802.5
9
Multi Station Access Unit… MSAU
Previous MAUS
Next MAUS
10
Token Ring Media Access Control
• Any station that wants to transmit data, has to
seize the token from the network
• Once the token is seized, transmission can be done
• In 802.5, seizing process involves simply modifying
1 bit in the token, and it acts as a preamble for
the subsequent data packet
11
Data Transmission
• Each transmitted packet contains a destination
address
• As the packet flows past each node on the ring,
each node looks inside the packet to see if it is
the intended recipient
• If so, it copies the packet into its buffer as it
flows through the network adapter
• But it does not remove the packet form the
network
• The sending station has the responsibility of
removing the packet from the ring
• Other stations don’t harm the packet
12
Token Holding Time
• Setting THT to infinity will be dangerous because
other devices wont have fair access to the ring
• Setting THT to one message will be silly
– If node has more packets to send, after every THT it would let
the token circulate around the whole ring before seizing it
again
• Hence it is set to 10ms
– A device should take care of the fact that before transmission
of a packet, whether it got sufficient THT left to transmit this
packet
13
Token Rotation Time
• Time required by token to traverse the ring
• TRT < ActiveNodes * THT + RingLatency
• Active Nodes are the number of nodes that have
data to transmit and Ring Latency is the time a
packet takes to traverse the ring when no node
has data to send… Ideal
14
Reliable Delivery
• A & C bits contained in frame status byte
• Both set to 0 by transmitter
• As the destination station sees the packet, it set
the A-bit to 1
• When the destination station copies the packet
into its buffer successfully, the C bit is set to 1
• At Sender again
– A=1 & C=1 means Successful Delivery
– A=1 & C=0 means Host is alive but frame could not be copied
15
Priority
• Priority allows a particular host to access the
token
• Token contains a 3-bit priority field
• Token has certain priority n at any time
• Each host that wants to transmit a packet, has
to assign a priority to the data packet
• The host that holds the token, before releasing
the token sets its priority to the priority of
the data packet it received
16
Token Ring Maintenance
• Monitor Station
• A monitor periodically announces its presence by
special control messages
• If these periodic messages stop arriving, the
monitor will be assumed to have failed
• And a new monitor is elected
– Each station that wants to be monitor sends a claim frame
– If the token circulates back to the sender, it will be the
monitor
– If more than one claim frames, break the tie by some algorithm
(say the highest address wins)
17
Monitor
• Monitor is to take care of the health of the token
ring network
– Clocking… In case of Token
– Setting bits… In Case of Data Frame
• Reinserts a new token if token is not seen by
monitor after the interval
– (NumStations * THT) + RingLatency
• Checks for orphaned & Corrupted frames
o M-bit is set to 0 by transmitter and set to 1 as it passes the
monitor
o If a token passes the monitor with the m-bit already set to 1, it is
removed from the network
18
Frame Format
• Take it as a Reading Assignment
– Included in Exam 
19
Recommended Text
• Computer Networks: A System Approach
by Lary Peterson and Bruce Davie

Weitere ähnliche Inhalte

Was ist angesagt?

Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame format
myrajendra
 
I2C Bus (Inter-Integrated Circuit)
I2C Bus (Inter-Integrated Circuit)I2C Bus (Inter-Integrated Circuit)
I2C Bus (Inter-Integrated Circuit)
Varun Mahajan
 

Was ist angesagt? (20)

Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
ETHERNET
ETHERNETETHERNET
ETHERNET
 
I2C Protocol
I2C ProtocolI2C Protocol
I2C Protocol
 
Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame format
 
Csma
CsmaCsma
Csma
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Token bus
Token busToken bus
Token bus
 
Rs 232 interface
Rs 232 interfaceRs 232 interface
Rs 232 interface
 
Design and implementation of uart on soc
Design and implementation of uart on socDesign and implementation of uart on soc
Design and implementation of uart on soc
 
PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
I2C Bus (Inter-Integrated Circuit)
I2C Bus (Inter-Integrated Circuit)I2C Bus (Inter-Integrated Circuit)
I2C Bus (Inter-Integrated Circuit)
 
Token ring
Token ringToken ring
Token ring
 
The I2C Interface
The I2C InterfaceThe I2C Interface
The I2C Interface
 
Network layer
Network layerNetwork layer
Network layer
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 

Andere mochten auch

Breve história do teatro
Breve história do teatroBreve história do teatro
Breve história do teatro
beonline5
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
kuramartin
 
EvoluçãO Do Teatro Ao Longo Da HistóRia Da
EvoluçãO Do Teatro Ao Longo Da HistóRia DaEvoluçãO Do Teatro Ao Longo Da HistóRia Da
EvoluçãO Do Teatro Ao Longo Da HistóRia Da
mega
 

Andere mochten auch (20)

Token ring
Token ringToken ring
Token ring
 
token bus
 token bus token bus
token bus
 
Token ring
Token ringToken ring
Token ring
 
Token bus standard
Token bus standardToken bus standard
Token bus standard
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Introduction to DNS
Introduction to DNSIntroduction to DNS
Introduction to DNS
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Token ring
Token ringToken ring
Token ring
 
Token Ring
Token RingToken Ring
Token Ring
 
Token Ring
Token RingToken Ring
Token Ring
 
Man
ManMan
Man
 
Ieee 802
Ieee 802Ieee 802
Ieee 802
 
Breve história do teatro
Breve história do teatroBreve história do teatro
Breve história do teatro
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Csma
CsmaCsma
Csma
 
EvoluçãO Do Teatro Ao Longo Da HistóRia Da
EvoluçãO Do Teatro Ao Longo Da HistóRia DaEvoluçãO Do Teatro Ao Longo Da HistóRia Da
EvoluçãO Do Teatro Ao Longo Da HistóRia Da
 
Csmaca
CsmacaCsmaca
Csmaca
 
Mascaras teatro griego y romano
Mascaras teatro griego y romanoMascaras teatro griego y romano
Mascaras teatro griego y romano
 

Ähnlich wie Token ring 802.5

Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
RiteshKumar630578
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
welcometofacebook
 

Ähnlich wie Token ring 802.5 (20)

Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptx
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
FDDI
FDDIFDDI
FDDI
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Token Bus.pptx
Token Bus.pptxToken Bus.pptx
Token Bus.pptx
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
A427 nic card
A427 nic cardA427 nic card
A427 nic card
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 
Token_Ring.pdf
Token_Ring.pdfToken_Ring.pdf
Token_Ring.pdf
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 
Adhoc
AdhocAdhoc
Adhoc
 
Network architecture
Network architectureNetwork architecture
Network architecture
 

Mehr von Adil Mehmoood

Diseases caused by Computer
Diseases caused by ComputerDiseases caused by Computer
Diseases caused by Computer
Adil Mehmoood
 

Mehr von Adil Mehmoood (19)

Docker + Node "hello world" Application
Docker + Node "hello world" ApplicationDocker + Node "hello world" Application
Docker + Node "hello world" Application
 
Java database connectivity with MYSQL
Java database connectivity with MYSQLJava database connectivity with MYSQL
Java database connectivity with MYSQL
 
What is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its typeWhat is feasibility study and what is contracts and its type
What is feasibility study and what is contracts and its type
 
Inner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in javaInner classes ,annoumous and outer classes in java
Inner classes ,annoumous and outer classes in java
 
Exception handling in java
Exception handling in javaException handling in java
Exception handling in java
 
Project Engineer and Deputy project manger
Project Engineer and Deputy project manger Project Engineer and Deputy project manger
Project Engineer and Deputy project manger
 
Swing and AWT in java
Swing and AWT in javaSwing and AWT in java
Swing and AWT in java
 
Software Engineering 2 lecture slide
Software Engineering 2 lecture slideSoftware Engineering 2 lecture slide
Software Engineering 2 lecture slide
 
Expert system
Expert systemExpert system
Expert system
 
Sliding window and error control
Sliding window and error controlSliding window and error control
Sliding window and error control
 
Proposal defence format
Proposal defence formatProposal defence format
Proposal defence format
 
Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...Shading and two type of shading flat shading and gauraud shading with coding ...
Shading and two type of shading flat shading and gauraud shading with coding ...
 
Computer vesion
Computer vesionComputer vesion
Computer vesion
 
System quality attributes
System quality attributes System quality attributes
System quality attributes
 
Graph Clustering and cluster
Graph Clustering and clusterGraph Clustering and cluster
Graph Clustering and cluster
 
diseases caused by computer
diseases caused by computerdiseases caused by computer
diseases caused by computer
 
Diseases caused by Computer
Diseases caused by ComputerDiseases caused by Computer
Diseases caused by Computer
 
What is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resumeWhat is Resume ,purpose and objective of resume and type of resume
What is Resume ,purpose and objective of resume and type of resume
 
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
Multiplexing and switching(TDM ,FDM, Data gram, circuit switching)
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

Token ring 802.5

  • 2. 2 Token Rings • IBM Token Ring & IEEE 802.5 • FDDI • Resilient Packet Ring IEEE 802.17… • IBM Token Rings are the most famous of this series
  • 3. 3 About IBM Token Rings • Network consists of a set of nodes connected in a ring & data always flows in particular direction • Each node receives frames from its upstream node and transmits to its downstream node • Token rings share two features with Ethernets – Requires an algorithm that controls when each node is allowed to transmit – All nodes see all frames with destination saving a copy of it
  • 4. 4 Tokens • Special sequence of bits that circulates around the ring – 24 bits in case of 802.5 • When node with a frame to transmit sees the token, it takes the token off the ring and instead inserts its own frame on the network – Frame is forwarded by all nodes while destination too makes a copy of it and forwards it – Packet is received again by sender which strips its frame off the ring and reinserts the token
  • 5. 5 Physical Properties • Link failure in ring may disrupt transmission of the whole network • Electromechanical relay is used to overcome this problem • As long as the station is healthy, the relay is open • When the stations stops powering the relay, it gets closed and the station is removed from the network
  • 6. 6 Use of Electromechanical relay From Previous Host To Next Host Host Relay
  • 7. 7 Use of Electromechanical relay From Previous Host To Next Host Host Relay
  • 8. 8 Multi Station Access Unit… MSAU • Several Electromechanical relays packed into a single box • It makes token rings look like a star topology • Systems are plugged in and out of MSAU • One of the main differences between 802.5 and IBM Token Rings is that the latter requires MSAU – The other difference however can be that that IBM Token Rings can have up to 260 stations per ring while 802.5 supports 250 – Physical media for IBM is twisted pair but not defined for 802.5
  • 9. 9 Multi Station Access Unit… MSAU Previous MAUS Next MAUS
  • 10. 10 Token Ring Media Access Control • Any station that wants to transmit data, has to seize the token from the network • Once the token is seized, transmission can be done • In 802.5, seizing process involves simply modifying 1 bit in the token, and it acts as a preamble for the subsequent data packet
  • 11. 11 Data Transmission • Each transmitted packet contains a destination address • As the packet flows past each node on the ring, each node looks inside the packet to see if it is the intended recipient • If so, it copies the packet into its buffer as it flows through the network adapter • But it does not remove the packet form the network • The sending station has the responsibility of removing the packet from the ring • Other stations don’t harm the packet
  • 12. 12 Token Holding Time • Setting THT to infinity will be dangerous because other devices wont have fair access to the ring • Setting THT to one message will be silly – If node has more packets to send, after every THT it would let the token circulate around the whole ring before seizing it again • Hence it is set to 10ms – A device should take care of the fact that before transmission of a packet, whether it got sufficient THT left to transmit this packet
  • 13. 13 Token Rotation Time • Time required by token to traverse the ring • TRT < ActiveNodes * THT + RingLatency • Active Nodes are the number of nodes that have data to transmit and Ring Latency is the time a packet takes to traverse the ring when no node has data to send… Ideal
  • 14. 14 Reliable Delivery • A & C bits contained in frame status byte • Both set to 0 by transmitter • As the destination station sees the packet, it set the A-bit to 1 • When the destination station copies the packet into its buffer successfully, the C bit is set to 1 • At Sender again – A=1 & C=1 means Successful Delivery – A=1 & C=0 means Host is alive but frame could not be copied
  • 15. 15 Priority • Priority allows a particular host to access the token • Token contains a 3-bit priority field • Token has certain priority n at any time • Each host that wants to transmit a packet, has to assign a priority to the data packet • The host that holds the token, before releasing the token sets its priority to the priority of the data packet it received
  • 16. 16 Token Ring Maintenance • Monitor Station • A monitor periodically announces its presence by special control messages • If these periodic messages stop arriving, the monitor will be assumed to have failed • And a new monitor is elected – Each station that wants to be monitor sends a claim frame – If the token circulates back to the sender, it will be the monitor – If more than one claim frames, break the tie by some algorithm (say the highest address wins)
  • 17. 17 Monitor • Monitor is to take care of the health of the token ring network – Clocking… In case of Token – Setting bits… In Case of Data Frame • Reinserts a new token if token is not seen by monitor after the interval – (NumStations * THT) + RingLatency • Checks for orphaned & Corrupted frames o M-bit is set to 0 by transmitter and set to 1 as it passes the monitor o If a token passes the monitor with the m-bit already set to 1, it is removed from the network
  • 18. 18 Frame Format • Take it as a Reading Assignment – Included in Exam 
  • 19. 19 Recommended Text • Computer Networks: A System Approach by Lary Peterson and Bruce Davie