IEEE 802.5 (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

CS Direct Link Networks (Continued) Slide Set 6.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
Token Ring/IEEE Annida Farhana bt SuibWET Azuna Nurzahra bt KandarWET Ima Shanaz bt Wahidin WET Farah Nawwar bt BidinWET
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
TDC /502, Summer II Unit 2: Underlying Technologies Transmission media (Section 3.1. Read on your own) Local Area Networks (LANs) –Ethernet.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
1 Subnets. 2 Token Ring Access Methodology = token passing Logical topology = sequential Physical = traditionally ring, currently star –Logical ring,
COMPUTER NETWORKS.
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
LOCAL AREA NETWORS. A local area network (LAN) is a data communication system that allows a number of independent devices to communicate directly with.
CSC581 Communication Networks II Chapter 6b: Local Area Network (Token Ring ) Dr. Cheer-Sun Yang.
IEEE Standards, FDDI, Collision Free Protocols
Chapter 13 Wired LANs: Ethernet
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Packet Transmission (Part III) Local Area Networks (LANs)
Lecture 9: Ethernet and Token Ring Networks
Semester 1 CHAPTER 3 Le Chi Trung
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
CSCI 465 D ata Communications and Networks Lecture 19 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
CCNA 1 v3.0 Module 6 Ethernet Fundamentals. Objectives.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
Data Link Layer - 2 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Ethernet Overview it the IEEE standard for Ethernet.
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
CS3502: Data and Computer Networks Loca Area Networks - 3 Adaptive Tree Walk Token Ring LAN : IEEE slotted rings FDDI.
1 Shared Access Networks: Token ring, Wireless Sections 2.7 & 2.8.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
Introduction to Computer Networks Introduction to Computer Networks.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
The OSI Model. History of OSI Model ISO began developing the OSI model in It is widely accepted as a model for understanding network communication.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Advanced Computer Networks
Data Networking via LANs Packets and Frames
TOKEN BUS & TOKEN RING.
Ethernet and Token Ring LAN Networks
Medium Access Control (MAC) Sub-layer
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Ethernet and Token Ring LAN Networks
Data Link Issues Relates to Lab 2.
Protocol layering and data
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Protocol layering and data
Ethernet and Token Ring LAN Networks
Presentation transcript:

IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF

IEEE (Token Ring): Ring Topology Shared ring medium: all nodes see all frames Round Robin MAC Protocol: determines which station can transmit A special 3-byte pattern, the token, circulates around the ring perpetually and represents the "right to transmit" This establishes round-robin media access Data flow is unidirectional All data flows in a particular direction around the ring; nodes receive frames from their upstream neighbor and forward them to their downstream neighbor Data rate: 4 or 16 Mbps

R RR R

IEEE (Token Ring) Operation The token bit sequence circulates around the ring. Each station forwards the token if it does not have a frame to transmit. A station with data to send seizes the token (repeater now in transmit state) and begins sending it’s frame. It can transmit for length of time called the Token Hold Time (THT) = 10 mseconds. Each station forwards the frame. The destination station notices its address and saves a copy of the frame as it also forwards the frame. When the sender sees its frame return, it drains it from the ring and reinserts a token. When the last bit of the returning frame has been drained, the repeater switches immediately to the listen state.

IEEE (Token Ring) using a Hub The star-wired ring topology uses the physical layout of a star in conjunction with the token-passing data transmission method. Data are sent around the star in a circular pattern. This hybrid topology benefits from the fault tolerance of the star topology and the reliability of token passing.

IEEE (Token Ring): Bypass relays and Wire Center Bypass relays protect ring topology from node failure at the hardware level.

IEEE (Token Ring) Frame Format TOKEN: Start delimiter (1 byte): serves the same basic purpose as the preamble in an Ethernet frame. Access Control (1 byte): contains the token bit, monitor bit, and priority bits Frame Control (1 byte): contains access control information Destination Address (6 bytes) Source Address (6 bytes) Data (no size limit specified): this is the actual data being sent (IP packet). Since the THT = 10 mseconds, practical size limit of the frame is 4500 bytes. Frame Check Sequence (4 bytes): CRC error checking bits End Delimiter (1 byte): signifies the end of the frame Frame Status Field (1 byte): serves as the ACK and indicates whether the address was recognized and the frame copied, which is done by the receiving computer before being sent back around the ring Start Delimiter Access Control End Delimiter

IEEE (Token Ring): Ring Maintenance There is a special station on the ring called a monitor station. It is responsible to identify and address situations dealing with a lost token and an orphan frame. Lost Token: Monitor station knows the number of stations on the ring and so calculates maxTHT = n * THT (n is the number of stations on the ring). It keeps a timer of how long since it last saw the token pass by. If this is more than maxTRT, it drains the ring and inserts a new token in the ring. Orphan frame: A frame can get orphaned if the sending station goes down before it can drain it’s frame. As a frame passes by the monitor, it sets the "monitor" bit in the header of the frame. If it sees a frame with this bit already set, it knows it is an orphan frame. Then the monitor drains the ring and inserts a new token in the ring.

IEEE (Token Ring) Performance Under light load conditions where few stations have data to send, token ring performance is fair but there is an overhead of passing the token. Under heavy load condition where most of the stations have data to send, performance is excellent and utilization approaches 100%. The token is fully utilized in this case.

IEEE (Ethernet) vs IEEE (Token Ring) Ethernet is widely used at present (> 90% market share). People are experienced in using this technology. Ethernet uses CSMA/CD as the MAC protocol while Token Ring uses Round Robin protocol. Token Ring uses point-to-point connections between ring interfaces so that the electronic hardware can be fully digital and simple. There is no need for collision detection. The Ethernet NIC card requires some analog circuitry to be able to detect collisions. Token Ring has excellent throughput at high loads since there is no possibility of collisions unlike Under light load, Token Ring experiences token passing overhead. Ethernet has no such overhead and has excellent performance at light loads.

IEEE (Token Ring) Hierarchical Setup