Professional Documents
Culture Documents
NETWORK
• Number of stations interconnected in the form
of a ring through point-to-point links.
• Each station acts as a repeater and regenerates
the signals it receives on one link and sends
them forward on the next link after a delay of
at least one bit.
• When A wants to send data to D, A breaks the ring and
inserts its frame with the destination (D) and source (A)
addresses.
• The frame passes through the stations B and C which
act as repeaters and forward the frame to the next link.
• Station D finds its address on the frame and copies it.
• The frame continues its journey and returns back to
station A.
• Station A removes the frame from the ring and stops
further transmission.
Three modes of stations
1. Repeater mode: The received signals are regenerated and transmitted n
the outgoing link. There is at least one bit delay in the shift register.
2. Insert mode: The ring is broken and the station sends its own frame on
the outgoing link. The incoming signals are received but are not sent on
the ring again.
3. Copy mode: The station regenerates the received signals and sends them
on the outgoing link. It also copies the received signals for its use.
MEDIA ACCESS CONTROL IN
TOKEN RING LAN
• Access to the ring for transmitting a frame is
controlled by use of a token.
• The token is passed from station to station around
the ring.
• The physical locations of the stations on the ring
determine the sequence of passing the token.
• When a station has frames to transmit, it seizes
the token.
• It holds the token and sends its one or more
frames and then releases the token for the next
station on the ring.
• Token Holding Time
– A station can hold the token for a maximum predefined period called
Token Holding Time (THT)
– Typical value is 10 ms, which limits the maximum frame size to about
4500 octets at 4 Mbps
• Early Token Release
– A station can release the token immediately after transmitting the last
octet of its data frame. This is called early release option and is adopted
in 16 Mbps token ring.
• Alternatively, it holds the token till it removes the entire frame
from the ring, i.e. till the last octet of the frame returns to it.
RING SIZE
• When none of the stations on the ring has any frame to send, the
token circulates in the ring for any station to pick up. In such
situation the leading bits of the token frame may corrupt the trailing
bits of the frame if the size of the ring is not long enough.
• Let us calculate the minimum size (circumference) of the ring for a
4 Mbps token ring LAN. The token is 3 octets long as we shall see
later.
• Time for transmitting a bit at 4 Mbps : 0.25 ms
• Time required for transmitting 24 bits of the token frame : 6 ms
• Cable length travelled by the leading bit in 6 ms : 198x6 = 1188 m
• (Propagation speed = 1.98 x108 m/s)
• If the ring size is less than 1188 m, the leading bits of the token will
hit the trailing bits and corrupt the token frame.
• For 16 Mbps minimum token ring size comes
to about 300 metres.
• This limitation is overcome by providing a
constant 24-bit shift register in the ring. This
shift register is introduced in the ring by one of
the stations designated as active monitor
station.
• Active monitor station carries out several other
functions also.
STANDARDS FOR TOKEN
RING LAN
• At the physical layer, the specified bit rates are 4 and 16
Mbps.
• The line code used is differential Manchester.
• Usually STP(Shielded Twisted pair) cable is used for
token rings.
• Typical values maximum segment length between two
stations and maximum number of stations in a ring are
as follows:
• 4 Mbps (STP cable) : Segment length 385 m, number of
stations 260
• 16 Mbps (STP cable) : Segment length 173 m, number
of stations 136
IEEE 802.5 MAC Frame Format
• Token frame Format is three byte long and
consists of start delimiter byte, access control
byte, and end delimiter byte.
• Data frames vary in size depending on the size
of data field.
• Control frames do not have data field
• Preamble is not required
• Start delimiter (SD). It is one octet long unique symbol pattern that marks
the start of the frame. J and K enable identification of the start delimiter.
Differential Manchester Code violation property of J and K bits is used for
their detection
• Access control (AC). It is one octet long field containing priority bits (P),
token bit (T), monitoring bit (M), and reservation bits (R).
• The token bit (T) distinguishes a token frame from data/control frame. It is 0
in the token frame and 1 in the data/control frame.
• A station in repeater mode waits for the token bit to send the data. If it finds
that token bit is 0, it seizes the token by changing over to insert mode and
breaks the ring. The station then inserts 1 in place of 0 at the token bit
position and the token frame gets converted into data/control frame.
• Frame control (FC). It is one octet long field and distinguishes data
and control frames.
– FF=01 Data frame that contains LLC frame in the data field.
– FF=00, Control frame. The six Z bits indicate the control function.
– Z-bits.................Control function
– 000011..............Claim Token (CT)
– 000010..............Beacon
– 000100..............Purge
– 000101..............Active Monitor Present (AMP)
– 000000..............Standby Monitor Present (SMP)