Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Lecture 3, 1Spring 2003, COM1337/3501CCN: Direct Link Networks Direct Link Networks Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie,
Token Ring/IEEE Risanuri Hidayat.
CS Direct Link Networks (Continued) Slide Set 6.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Token Ring and Fiber Distributed Data Interface (FDDI)
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI)
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Token Ring and FDDI.
Spring 2003CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
SERIAL BUS COMMUNICATION PROTOCOLS
CSC 336 Data Communications and Networking Lecture 7b: Local Area Networking (Token Ring – 802.5) Dr. Cheer-Sun Yang Spring 2001.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
CSC581 Communication Networks II Chapter 6b: Local Area Network (Token Ring ) Dr. Cheer-Sun Yang.
IEEE Standards, FDDI, Collision Free Protocols
Packet Transmission (Part III) Local Area Networks (LANs)
Lecture 9: Ethernet and Token Ring Networks
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
8-Oct-154/598N: Computer Networks Shared Access Networks Token Ring ATM Fibre channel Myrinet.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
14-Oct-15Computer Networks1 Reliable Transmission.
Local Area Networks © Prof. Aiman Hanna Department of Computer Science Concordia University Montreal, Canada Local Area Networks Part B.
1 Other LANs Token Rings Wireless –Wireless LAN (802.11, WiFi) –Broadband Wireless (802.16) –Bluetooth.
1 CS4550: Computer Networks II Review Data Link Layer.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Department of Computer Science, University of Peshawar Multiple Access.
802.5 and FDDI TC Token Ring Reference Stallings 6.3 4/16Mbps over STP 4Mbps over CAT3 UTP.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
FDDI Network Security.
CS3502: Data and Computer Networks Loca Area Networks - 3 Adaptive Tree Walk Token Ring LAN : IEEE slotted rings FDDI.
1 Chapter 2: Direct Link Networks (Part Two) Dr. Rocky K. C. Chang 30 January 2004.
1 Shared Access Networks: Token ring, Wireless Sections 2.7 & 2.8.
1 Link Layer 3 Mozafar Bag-Mohammadi University of Ilam.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Multiple Access Methods
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
A quick intro to networking
Advanced Computer Networks
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
TOKEN BUS & TOKEN RING.
Ethernet and Token Ring LAN Networks
Medium Access Control (MAC) Sub-layer
CSC 336 Data Communications and Networking
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Ethernet and Token Ring LAN Networks
Multiple Access Methods
Token Ring/IEEE Risanuri Hidayat.
Getting Connected (Chapter 2 Part 3)
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Lecture 5- Data Link Layer
7- chapter Seven Local Area Networks (LAN)
IEEE , Token Rings 4/26/2019 CS/ECE UIUC, Fall 2006.
Mozafar Bag-Mohammadi University of Ilam
Computer Interfacing and Protocols
Ethernet and Token Ring LAN Networks
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Token Ring Neil Tang 9/22/2008 CS440 Computer Networks

Outline Basic Architecture Physical Properties MAC Protocol CS440 Computer Networks

Token Ring Basic architecture: multiple hosts share a ring. MAC protocol: token passing CS440 Computer Networks

Basic Architecture CS440 Computer Networks

Basic Architecture CS440 Computer Networks

Physical Properties Data flow: It goes along a particular direction around the ring, with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor. Encoding: Manchester Error detection: CRC Max number of hosts: 250 Data rate: 4Mbps/16Mbps Cables: Twisted pair cable CS440 Computer Networks

Frame Format CS440 Computer Networks Body CRC Src addr Variable 48 Dest 32 End delimiter 8 Frame status control Access Start CS440 Computer Networks

MAC Algorithm Basic Idea: Token Passing A token (a special bit sequence) circulates around the ring. Every node forwards it. A node with data to send takes the token off the ring and inserts its frame into the ring. Each node along the way forwards the frame. The destination node save a copy and continue to forward it. The sender removes the frame when it gets back. CS440 Computer Networks

MAC Algorithm Token Holding Time (THT): THT: The maximum duration within which a node is allowed to hold the token. Default value: 10ms Tradeoff between throughput and fairness: allow one with a large volume of data to send as mush as it could VS. give everyone a chance to send. Token Rotation Time (TRT): TRT = i (Actual THT of Node i) + RingLatency (ring propagation delay) TRT  NumNodes  THT + RingLatency CS440 Computer Networks

MAC Algorithm Priority: Frames and token have priorities. Only the frame with priority higher than or equal to that of the token can be transmitted. The token’s priority changes over time. When a station X having frames with a higher priority n to send sees a frame with lower priority m passing by, X will set the frame’s reservation bits to n. When the station currently has the token gets the frame back, it elevates the priority of the token to n and release it. After X transmits its frames, it changes the priority of the token back to m and releases it. CS440 Computer Networks

MAC Protocol Reliable Transmission: 2 bits in “Frame Status”: A bit and C bit. Initial value: A=C=0. The destination node: sets A=1 when receiving the frame and sets C=1 after copying it to its adaptor. The sender: If A=0, the destination is down. If A=1 but C=0, the destination cannot accept the frame (error detected, lack of buffer), retransmit it later. CS440 Computer Networks

MAC Protocol Token Release: early VS. delayed CS440 Computer Networks

Maintenance A Monitor Station Monitor the token: After a period of (NumSationTHT+RingLatency), if no token comes back, it creates a new token. Monitor the corrupted or orphan (dead sender) frames: It sets “monitor” bit to 1 at the first time the frame passes and get rid of it at the second time. A monitor station will periodically announce its presence by a special control frame. If a station fails to see it for a certain period of time, it transmits a “claim token” frame to announce its intent to become a new monitor. Tie can be broken by “highest address wins” rule if multiple stations compete for this at the same time. CS440 Computer Networks