Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send

Similar documents
Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Unit II. Part A (2 Marks)

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Network Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology

1999, Scott F. Midkiff

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSE 461: Multiple Access Networks. This Lecture

Token Ring/IEEE 802.5

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Lecture 4b. Local Area Networks and Bridges

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 3 Medium Access Control. Preface

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

CS 640 Lecture 4: 09/11/2014

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

EECS 122, Lecture 7. Kevin Fall Jean Walrand

Outline: Connecting Many Computers

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Multiple Access Channels

Link Layer and Ethernet

Link Layer and Ethernet

Good day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc.

1. Data Link Layer Protocols

Chapter 15 Local Area Network Overview

In multiple-hub networks, demand priority ensures fairness of access for all nodes and guarantees access time for multimedia applications.

Link Layer (L2) Review

CHAPTER 8: LAN Standards

Lecture 9: Bridging & Switching"

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Shared Access Networks

Medium Access Protocols

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Reliable Transmission

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Summary of MAC protocols

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Direct Link Networks (II)

Direct Link Communication II: Wired Media. Multi-Access Communication

FDDI. L26 - Fibre Distributed Data Interface (FDDI) L26 - Fibre Distributed Data Interface (FDDI) FDDI - Fiber Distributed Data Interface

CSE/EE 461 Section 2

Multiple Access Protocols

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Chapter 8 LAN Topologies

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

ET4254 Communications and Networking 1

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

COMPUTER NETWORKS CS CS 55201

COMPUTER NETWORKS CS CS 55201

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Housekeeping. Fall /5 CptS/EE 555 1

ECE 4450:427/527 - Computer Networks Spring 2017

Computer Networks รศ.ดร.อน นต ผลเพ ม. Assoc. Prof. Anan Phonphoem, Ph.D. Kasetsart University, Bangkok, Thailand

Introduction to Networks and the Internet

Local Area Network Overview

Lecture 6 Datalink Framing, Switching. From Signals to Packets

Switching / Forwarding

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

LAN PROTOCOLS. Beulah A AP/CSE

ECE 4450:427/527 - Computer Networks Spring 2017

Data Link Layer Lecture 7

CS 716: Introduction to communication networks th class; 7 th Oct Instructor: Sridhar Iyer IIT Bombay

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

CS 455/555 Intro to Networks and Communications. Link Layer

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Data Transport over IP Networks

Layer 2 functionality bridging and switching

Chapter 11 in Stallings 10 th Edition

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?

Media Access Control (MAC) Sub-layer and Ethernet

STEVEN R. BAGLEY PACKETS

Computer Networks. Wenzhong Li. Nanjing University

NetWare Link-Services Protocol

CCNA Exploration1 Chapter 7: OSI Data Link Layer

M242 COMPUTER NETWORS AND SECURITY

Protocol Characteristics Overview

Part3. Local Area Networks (LAN)

CSE/EE 461 Wireless and Contention-Free Protocols

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 2: Getting Connected

IEEE 802 LANs SECTION C

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Introduction to Networks and the Internet

Introduction to Ethernet. Guy Hutchison 8/30/2006

Computer and Network Security

Internet Architecture and Protocol

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Transcription:

Token Ring Developed by IBM, adopted by IEEE as 802.5 standard Token rings latter extended to FDDI (Fiber Distributed Data Interface) and 802.17 (Resilient Packet Ring) standards Nodes connected in a ring Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send Sep. 16. 2005 CS 440 Lecture Notes 1

Tokens Token ring named because token (a special sequence of bits) is passed around the ring Each node receives and retransmits token A node with something to transmit can take token off ring and insert frame Destination node copies frame, but sends on When sender receives frame, node drops it and reinserts the token All nodes get chance to transmit (round-robin) Sep. 16. 2005 CS 440 Lecture Notes 2

Physical Properties Nodes connected to ring using electromechanical relay Prevents node failure from crashing ring Several relays often packed into one multistation access unit (MSAU) Provide easy addition and removal of nodes Required by IBM Token Ring, not 802.5 Sep. 16. 2005 CS 440 Lecture Notes 3

Physical Properties (cont.) Data rate either 4 or 16 Mbps Uses Manchester encoding IBM Token Rings can have up to 260 stations per ring, 802.5 up to 250 Physical medium for IBM is twisted pair, not specified for 802.5 Sep. 16. 2005 CS 440 Lecture Notes 4

Media Access Control Each node includes receiver, transmitter, one or more bits of memory between Ring must contain enough memory to hold entire ring 802.5 token is 24 bits long, so if each station can hold only 1 bit, must have at least 24 stations, or more than one bit-time distance between stations Alternative is monitor station that adds delay Sep. 16. 2005 CS 440 Lecture Notes 5

Seizing token When node wants to send, modifies one bit in second byte of token this changes first two bytes into transmission preamble Station then inserts one or more packets onto ring Each packet contains destination address, can also contain multicast or broadcast address Sep. 16. 2005 CS 440 Lecture Notes 6

Receiving If node recognizes address, copies data from transceiver into buffer, but still forwards it Sending station responsible for removing packet from the ring Station might be draining first part of packet from ring while transmitting end of packet, if ring is small enough Sep. 16. 2005 CS 440 Lecture Notes 7

Transmission Limits Control how long sender can transmit (token hold time, THT) The more bits a node can send, the better the ring utilization, but the poorer the response time for other nodes In 802.5, THT defaults to 10 ms Sender responsible for knowing how long it has already held token, how long next packet will take to transmit Sep. 16. 2005 CS 440 Lecture Notes 8

Transmission Limits (cont.) Nodes also compute token rotation time (TRT) TRT ActiveNodes * THT + RingLatency ActiveNodes are # that have data to send RingLatency is time to send token around ring if no node has anything to send Sep. 16. 2005 CS 440 Lecture Notes 9

Reliable Delivery Receiver sets the A bit in packet trailer if it recognizes itself as addressed node Sets the C bit in the trailer when it finishes copying packet into its buffer Sender can check for missing A or C bits when it gets packet back to verify that sender was there and was able to buffer entire packet Sep. 16. 2005 CS 440 Lecture Notes 10

Priority Token includes 3-bit priority field Each device assigns priority to each packet it needs to send Only captures token if packet priority >= token s Frame header includes 3 reservation bits Node X can set reservation bits to priority of its packet if bits don t already have >= value Token holder escalates priority to that value when it releases token Node X must reset priority to old value when done Sep. 16. 2005 CS 440 Lecture Notes 11

Ring Maintenance Any node can become monitor Procedure defined to elect monitor when ring first connected or monitor fails Monitor periodically announces its presence If this is missed, another station will send claim token to attempt to become monitor Tie broken by rule like highest address wins If sender gets claim back, it becomes monitor Sep. 16. 2005 CS 440 Lecture Notes 12

Ring Monitor Monitor can insert delay into ring if needed Makes sure that there is always a token Timeout after NumStations*THT+RingLatency Generate new token Removes packets if sender dies Monitor bit in header set first time packet passes monitor Packet with bit set is removed by monitor Sep. 16. 2005 CS 440 Lecture Notes 13

Ring Monitor (cont.) Also detects dead stations Catch more subtle errors than MSAU switch Send beacon packet to suspected dead node Instruct MSAU to bypass malfunctioning node Sep. 16. 2005 CS 440 Lecture Notes 14

Frame Format 8 8 8 48 48 Variable 32 8 8 Start Delimiter Access Control Frame Control Dest Address Src Address Body CRC End Delimiter Frame Status Start and end delimiters use invalid Manchester codes Access control includes priority and reservation bits Frame control indicates higher level protocol Sep. 16. 2005 CS 440 Lecture Notes 15

Frame Format (cont.) Addresses identical to Ethernet addresses Standard allows for 16-bit addresses, but they are not typically used Frame status byte includes A and C bits Sep. 16. 2005 CS 440 Lecture Notes 16