CPS 422 Computer Networks IEEE 802.5 (TOKEN RING) STANDARD IEEE 802.4 (TOKEN BUS) AND IEEE 802.5 (TOKEN RING) STANDARDS. A Token Ring Layout

Similar documents
Ring Local Area Network. Ring LANs

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

How To Communicate With A Token Ring Network (Dihon)

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Controlled Random Access Methods

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above


Data Link Layer. Page 1. Ethernet

RTT 60.5 msec receiver window size: 32 KB

Based on Computer Networking, 4 th Edition by Kurose and Ross

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Real-Time (Paradigms) (51)

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Introduction To Computer Networks

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Level 2 Routing: LAN Bridges and Switches

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Computer Networks. By Hardeep Singh

Fiber Distributed Data Interface

Introduction to Ethernet

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Network Topologies. Network Topologies

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

EPL 657 Wireless Networks

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

CSMA/CA. Information Networks p. 1

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Wireless LAN Concepts

CSCI 362 Computer and Network Security

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

28 Networks and Communication Protocols

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

LIN (Local Interconnect Network):

Module 15: Network Structures

Component 4: Introduction to Information and Computer Science

Adaptive DCF of MAC for VoIP services using IEEE networks

Communication Networks. MAP-TELE 2011/12 José Ruela

Network Categories. Network Types for the Local Range. Ethernet

524 Computer Networks

LAN / WAN Technologies

The OSI Model: Understanding the Seven Layers of Computer Networks

CSE 123A Computer Networks

Process Control and Automation using Modbus Protocol

Performance Evaluation of Wired and Wireless Local Area Networks

Network Structure or Topology

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Wiereless LAN

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Computer Network and Communication

High-Level Data Link Control

Data Communication and Computer Network

Token-ring local area network management

Local Area Network. OSI Seven Layer Model. Whole Building Network

5 Data Communication and Networking

DATA COMMUNICATION AND NETWORKS

Region 10 Videoconference Network (R10VN)

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Random Access Protocols

CS263: Wireless Communications and Sensor Networks

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Mathatma Gandhi University

RARP: Reverse Address Resolution Protocol

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Chapter 14: Distributed Operating Systems

Cabling LANs and WANs

Written examination in Computer Networks

From Fieldbus to toreal Time Ethernet

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

COMPUTER NETWORKS HANDOUTS LECTURERS # PREPARED BY: HAMMAD KHALID KHAN. Copyright Virtual University of Pakistan

IT Data Communication and Networks (Optional)

Communication Networks

DATA COMMUNICATION (Basics of data communication, OSI layers.)

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

IT4405 Computer Networks (Compulsory)

Telecommunications, Networks, and Wireless Computing

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

Using High Availability Technologies Lesson 12

The OSI Model and the TCP/IP Protocol Suite

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

ECE 333: Introduction to Communication Networks Fall 2002

Chapter 16: Distributed Operating Systems

Transcription:

CPS 422 Computer Networks DATA LINK LAYER IEEE 802.4 (TOKEN BUS) AND IEEE 802.5 (TOKEN RING) STANDARDS IEEE 802.5 (TOKEN RING) STANDARD TEXT BOOK:- Andrew S. Tenenbaum 3 rd Edition A Token Ring Layout TOKEN RING Ring Interface Station Unidirectional Ring Ring is not a broadcast medium but a collection of point-to-point links forming a circle Rings can be based on twisted pair, coaxial or a fiber optics cable Fair operation with an upper bound on channel access Channel access problem is solved with the help of a special frame called a Token Also, shutting down of stations should not impair ring functionality TOKEN RING Bits of the frame that have traversed the ring must be removed from the ring by the sender Since the entire frame does not appear on the ring at one time, there is no limit on frame size. It only needs to be pre-decided. The only limit is the token holding time. Acknowledgements are sent by the receiver in the same received frame, by setting an Acknowledgement bit in the received frame. A wire center Connector Bypass relay Cable Four Stations connected to a wire center Station

USE OF WIRE CENTERS Cable breaks can lead to ring failure This problem can be resolved with the help of a Wire Center. A wire center has bypass relays which draw current from the station If a station is powered down the relays close thereby removing the station from the ring and maintaining the ring Relays can be operated by software for network management wire centers make the ring a star-shaped ring. 802.5 FRAME FORMAT 2 or 6 2 or 6 8200 / 4500 4 2 or 6 2 or 6 8200 / 4500 4 2 or 6 2 or 6 8200 / 4500 4 Mark the frame boundaries Contain analog encoding of symbols other than 0s and s (code violations) So it cannot accidentally occur in data End delimiter contains two special bits o One to mark an error in frame (E bit) o Other to mark the last frame of a logical sequence J,K,0,J,K,0,0,0 are bits of Start, where J and K are code violations J,K,,J,K,,l,E are bits of End delimiter, where l represents the last frame of a sequence of transmissions and E represents an error in the frame 2 or 6 2 or 6 8200 / 4500 4 2 or 6 2 or 6 8200 / 4500 4 Contains token, monitor, priority and reservation bits Changing the token bit changes a token frame into the first three bytes of a data frame Monitor bit is used for ring maintenance Priority bits give the current priority of token To transmit a frame of priority n, a station has to capture a token of priority less than or equal to n. In a passing-by data frame, any station can try to reserve the next token, by writing the priority of its frame in the data frame s reservation bits. bits (MSB to LSB): 0 2 3 4 5-7 Purpose: Priority Token Monitor Reservation When it is a token (token bit=0) Reservation bits have no meaning, since reservation bits are used for booking future claim as per priority of frames to be sent 2

6 6 8200 / 4500 4 2 or 6 2 or 6 8200 / 4500 4 Used to distinguish data and control frames MSB 00 : MAC Control frame MSB 0 : LLC Control frame MSB x : Undefined, Reserved Identical to 802.3 addressing 2 or 6 2 or 6 8200 / 4500 4 2 or 6 2 or 6 8200 / 4500 4 Contains the data, 8200 or 4500 bytes Only limited by token holding time Same as 802.3 2 or 6 2 or 6 8200 / 4500 4 Contains A and C bits (A,C,0,0,A,C,0,0) When a frame arrives at its destination, the station s interface sets the A bit to If the frame is correctly copied to the station, the C bit is also changed to A=0, C=0 -> dest not present or powered down A=, C=0 -> dest present but frame not accepted A=, C= -> dest present and frame accepted IEEE 802.4 (TOKEN BUS) STANDARD 3

Evolution of 802.4 People interested in factory automation were opposed to 802.3 A station might have to wait arbitrarily to send a frame and 802.3 frames do not have priorities, so unsuited for real-time systems A ring topology has a known worst-case wait time of nt But a ring has a single point of network breakdown Also, ring is a poor fit to the linear topology of an assembly line 802.4 was developed having robustness of a 802.3 broadcast cable and a known worst-case behavior of a ring Broadband coaxial cable A Token Bus Layout Direction of ring Movement Speeds of,5 and 0 Mbps were possible Logical Ring Physical connection Station outside the Ring 802.4 Ring Operation Token is a special Frame which gives the holder station the Right to Transmit All stations are connected to a linear cable (Bus) but organized in a Logical ring Frames are passed from the Predecessor to the successor after a specified time interval When there is no data to be sent the token circulates around the logical ring Whenever a station has data to send, it waits for a token to arrive Station then captures the token and keeps transmitting data until allocated time for keeping the token expires After the specified time the token must be passed on to the successor Token Bus MAC Protocol Stations inserted into the ring in the order of descending addresses Token passing also done from high to low addresses Defines 4 priority classes 0,2,4 and 6 for traffic, 0 being the lowest The token holding time can be sub-divided for frames with different priority classes A station may have frames with different priorities High priority frames get transmitted first and if token time remains lower priority frames get transmitted in the left over time 2 or 6 2 or 6 0-882 4 802.4 FRAME FORMAT 2 or 6 2 or 6 0-882 4 Has a fixed bit pattern 0000 of byte, used to synchronize the receiver s clock. 4

2 or 6 2 or 6 0-882 4 Mark the frame boundaries Contain analog encoding of symbols other than 0s and s So it cannot accidentally occur in data 2 or 6 2 or 6 0-882 4 Used to distinguish data and control frames For data frames, it carries frame s priority It can also contain an indicator for the receiver to acknowledge a correctly received frame, immediately, since it cannot otherwise do so. For control frames, it specifies frame types, e.g. Token, frames for ring maintenance (addition/removal) fig 4-27 for details 2 or 6 2 or 6 0-882 4 2 or 6 2 or 6 0-882 4 Identical to 802.3 addressing Contains the data, max 882 bytes when 2-byte addresses used When 6-byte addresses used data can be a max of 874 bytes All 2-byte or 6-byte addresses used on a LAN, no mixture 2 or 6 2 or 6 0-882 4 Same as 802.3 Logical Ring Maintenance 5

Joining the Ring (adding new stations to ring) Predecessor and successor addresses maintained by all Periodically token holder sends a SOLICIT_SUCCESSOR frame giving its successor s address Any station wishing to join the ring with address within the range of sender s and its successor s address can do so, becoming the predecessor of sender s successor Ring initialization is special case of adding new stations to the ring Descending order of stations is maintained thereby If no station bids to enter the ring, the response window closes and token holder continues its operation Joining the Ring (Contd...) If two or more stations bid to enter the ring, their frames will collide To reduce the collisions, stations must wait for a random number of time slots between 0,,2 or 3 for next bidding Previous bidding activity is recorded through timers and when the new token is captured, new bidding may not be done if too much time has already been spent on bidding for new stations No guarantees on how long a station may have to wait to join the ring. A weakness of the protocol Leaving the Ring Much easier than joining the ring Leaving station X, with predecessor P and successor S, sends a SET_SUCCESSOR frame to P It tells P to reset its successor to S, rather than X Reading Assignment Study the Ring Maintenance section of the Token Bus and Token Ring, and find out the detail of problems and their solutions for various possibilities of transmission errors in ring / token frame or any hardware failure 6