SlideShare una empresa de Scribd logo
1 de 25
IEEE 802.5
• Consists of a set of
nodes connected in a
ring.
• Data flows in a
particular direction only.
• Data received from
upstream neighbour
forwarded to downstream
neighbour.
• Token – access to the
shared ring
– a special sequence of
bits
– circulates around the
ring
• Each node
receives and
forwards token.
• Frame makes its
way back to sender
– frame removed
by sender
– sender reinsert
token.
• As token
circulates around
ring, each station
gets a chance to
transmit
– Service round -
robin fashion
• Any link or node failure
– Network rendered
useless
• Solution –
– electromechanical relay
– Station active relay is
open and station included
– Station is inactive
• no power
• relay closed
• bypass station
Relay open-
station included
Relay closed
bypass station
Previous
host
To next
host Previous host
To next
host
{ MSAU }
• Several relays in a box
• Add new station
-PLUG INTO MSAU
FROM
PREVIOUS
MSAU
TO NEXT
MSAU
• Date rate: 4 Mbps or
16 Mbps
• encoding: differential
manchester
• 802.5 upto 250 station
• physical medium is
+P for IBM – not
specified in 802.5
DIFFERNTIAL
MANCHESTER
• Network adapter: receiver, and
transmitter, and one or more bits
of data storage between them.
• When no stations have anything
to transmit token circulates
• Ring has enough storage
capacity to hold an entire token.
– 1 bit / station
TOKEN RING FRAME
FORMAT
IEEE 802.5
• Token Size: 24 bits
– Minimum number of
stations is 24
– Overcome this by
including a monitor which
adds the extra bits of delay
• Token operation
– Token circulates
– Station seizes a token
– Modifies a bit in the second byte of
token
– Station that has token transmits
data
– Station drains token out of the ring
– Station sends data
– Each packet has destination
address
– All stations downhill check
destination address
– Destination copies packet
– Packet finds its way back to
sending station
IEEE 802.5
– Sending station
removes packet from ring
– Station reinserts token
into the ring
• Size of packet stored in
the ring bits
– Larger/smaller than ring
• Add/remove
• Issues
– Size of data that given node is
allowed to transmit
– Token holding time (THT) = ∞ ?
• Utilisation is 100%
• Unfair to stations to other than
the station holding the token
– THT affects ring performance
• Token Rotation
Time (TRT):
• TRT ≤ Active nodes
* THT + Ring
Latency
• Ring Latency –
token circulation
time
• Use A and C bits
• Initially A and C zero.
• Receiver sets A bit after seeing
that it is the intended recipient
• Receiver sets C bit after copying
frame
• If both A and C are not set –
retransmit
• Supports different levels of priority
– 3 bits
– each station waiting to send, sets
priority for packet packet’s priority as
high current token
– then token can be seized
– Intending to send station – sets the
priority on currently passing data
frame
– releasing station sets
priority of token to n.
– Lower priority packets
circulate for long in ring
• Token Release
– Early release
• After transmitting packet
– Delayed release
• After removing packet
when it returns to the sender
Designated monitor
– any station can become a monitor
– defined procedures for becoming a
monitor
– healthy monitor announces that it
is a monitor at periodic interval
– if a station does not see that
packet for some time – then it sends
a “claim token”
– if claim token comes back to
station then it is monitor
– if another wants to claim see other
stations claim first some arbitration
rule.
• Role of monitor
– insert additional delay
in ring
– ensure always that
there is a token
somewhere in the ring
– regenerate a vanished
token
– no token seen for TRT
=> regenerate
– orphaned / corrupted
packets – drain them if
orphaned
• (A and C bits set – parent
dies)
• A bit set C bit not set –
parent dies
– bit is initially set to 1 by
monitor
• monitor notices back when
packet passes by monitor a
second time
• Detection of dead stations
– some problem un detected
– suspecting station sends a
beacon frame –
– how far beacon goes decide
which stations must be bypassed

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Hiperlan
HiperlanHiperlan
Hiperlan
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Ethernet
EthernetEthernet
Ethernet
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
Error control
Error controlError control
Error control
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
WCDMA
WCDMAWCDMA
WCDMA
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 

Similar a Token ring protocol

Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area networkRiteshKumar630578
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxAkarshTomar3
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.pptTeshome48
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkNiharikaDubey17
 
CS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.pptCS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.pptAnandaSaikia1
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptHODElex
 
a_presentation_on_hdlc_and_dlc_computer.ppt
a_presentation_on_hdlc_and_dlc_computer.ppta_presentation_on_hdlc_and_dlc_computer.ppt
a_presentation_on_hdlc_and_dlc_computer.pptBlackHat41
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingDivyanshThakur7
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptxpatrickwang85
 
Circuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods PresentationCircuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods PresentationNiharikaDubey17
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt21121A0594
 
Data link layer elementry protocols
Data link layer elementry protocolsData link layer elementry protocols
Data link layer elementry protocolssabitha sairam
 

Similar a Token ring protocol (20)

Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
 
ieee 802.4
ieee 802.4ieee 802.4
ieee 802.4
 
ieeeeeee802.ppt
ieeeeeee802.pptieeeeeee802.ppt
ieeeeeee802.ppt
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
Token Bus.pptx
Token Bus.pptxToken Bus.pptx
Token Bus.pptx
 
Medium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptxMedium Access Control Protocols for Broadcast Networks.pptx
Medium Access Control Protocols for Broadcast Networks.pptx
 
FDDI
FDDIFDDI
FDDI
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.ppt
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
CS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.pptCS553_ST7_Ch06-DigitalDataComm.ppt
CS553_ST7_Ch06-DigitalDataComm.ppt
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 
a_presentation_on_hdlc_and_dlc_computer.ppt
a_presentation_on_hdlc_and_dlc_computer.ppta_presentation_on_hdlc_and_dlc_computer.ppt
a_presentation_on_hdlc_and_dlc_computer.ppt
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
link-medium-access-control.pptx
link-medium-access-control.pptxlink-medium-access-control.pptx
link-medium-access-control.pptx
 
Chapter 6 MAC.pdf
Chapter 6 MAC.pdfChapter 6 MAC.pdf
Chapter 6 MAC.pdf
 
Circuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods PresentationCircuit and Packet Switching Methods Presentation
Circuit and Packet Switching Methods Presentation
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt
 
Data link layer elementry protocols
Data link layer elementry protocolsData link layer elementry protocols
Data link layer elementry protocols
 

Último

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Último (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Token ring protocol

  • 2. • Consists of a set of nodes connected in a ring. • Data flows in a particular direction only. • Data received from upstream neighbour forwarded to downstream neighbour. • Token – access to the shared ring – a special sequence of bits – circulates around the ring
  • 3. • Each node receives and forwards token. • Frame makes its way back to sender – frame removed by sender – sender reinsert token. • As token circulates around ring, each station gets a chance to transmit – Service round - robin fashion
  • 4.
  • 5. • Any link or node failure – Network rendered useless • Solution – – electromechanical relay – Station active relay is open and station included – Station is inactive • no power • relay closed • bypass station
  • 6. Relay open- station included Relay closed bypass station Previous host To next host Previous host To next host
  • 7. { MSAU } • Several relays in a box • Add new station -PLUG INTO MSAU FROM PREVIOUS MSAU TO NEXT MSAU
  • 8. • Date rate: 4 Mbps or 16 Mbps • encoding: differential manchester • 802.5 upto 250 station • physical medium is +P for IBM – not specified in 802.5
  • 10. • Network adapter: receiver, and transmitter, and one or more bits of data storage between them. • When no stations have anything to transmit token circulates • Ring has enough storage capacity to hold an entire token. – 1 bit / station
  • 12. IEEE 802.5 • Token Size: 24 bits – Minimum number of stations is 24 – Overcome this by including a monitor which adds the extra bits of delay • Token operation – Token circulates – Station seizes a token
  • 13. – Modifies a bit in the second byte of token – Station that has token transmits data – Station drains token out of the ring – Station sends data – Each packet has destination address – All stations downhill check destination address – Destination copies packet – Packet finds its way back to sending station IEEE 802.5
  • 14. – Sending station removes packet from ring – Station reinserts token into the ring • Size of packet stored in the ring bits – Larger/smaller than ring • Add/remove
  • 15. • Issues – Size of data that given node is allowed to transmit – Token holding time (THT) = ∞ ? • Utilisation is 100% • Unfair to stations to other than the station holding the token – THT affects ring performance
  • 16. • Token Rotation Time (TRT): • TRT ≤ Active nodes * THT + Ring Latency • Ring Latency – token circulation time
  • 17. • Use A and C bits • Initially A and C zero. • Receiver sets A bit after seeing that it is the intended recipient • Receiver sets C bit after copying frame • If both A and C are not set – retransmit
  • 18.
  • 19. • Supports different levels of priority – 3 bits – each station waiting to send, sets priority for packet packet’s priority as high current token – then token can be seized – Intending to send station – sets the priority on currently passing data frame
  • 20. – releasing station sets priority of token to n. – Lower priority packets circulate for long in ring • Token Release – Early release • After transmitting packet – Delayed release • After removing packet when it returns to the sender
  • 21.
  • 22. Designated monitor – any station can become a monitor – defined procedures for becoming a monitor – healthy monitor announces that it is a monitor at periodic interval – if a station does not see that packet for some time – then it sends a “claim token” – if claim token comes back to station then it is monitor – if another wants to claim see other stations claim first some arbitration rule.
  • 23. • Role of monitor – insert additional delay in ring – ensure always that there is a token somewhere in the ring – regenerate a vanished token – no token seen for TRT => regenerate
  • 24. – orphaned / corrupted packets – drain them if orphaned • (A and C bits set – parent dies) • A bit set C bit not set – parent dies – bit is initially set to 1 by monitor • monitor notices back when packet passes by monitor a second time
  • 25. • Detection of dead stations – some problem un detected – suspecting station sends a beacon frame – – how far beacon goes decide which stations must be bypassed