Token Ring Protocol Overview
32 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What layer of the OSI model does Token Ring technology operate at?

  • Network layer
  • Data link layer (correct)
  • Application layer
  • Transport layer
  • Token Ring technology allows multiple tokens to circulate simultaneously on a 4 Mbit/s network.

    False

    What is the purpose of the token in Token Ring technology?

    To grant permission to transmit on the medium.

    In Token Ring, when a workstation receives a message, it changes the token back to ___ before sending it again.

    <p>0</p> Signup and view all the answers

    Match the following Token Ring components with their functions:

    <p>Token = Grants permission to transmit Active monitor = Detects transmission errors Empty information frame = Circulated when no data is being transmitted Data frame = Contains the actual message to be sent</p> Signup and view all the answers

    What happens to the token frame when a workstation needs to transmit data?

    <p>It is converted into a data frame</p> Signup and view all the answers

    The Token Ring protocol was initially used only by IBM computers.

    <p>True</p> Signup and view all the answers

    What happens to a data frame once the sending station receives its own data?

    <p>It converts the frame back into a token.</p> Signup and view all the answers

    What is the purpose of token priority in Token Ring networks?

    <p>To enable stations to request high-priority access to the token</p> Signup and view all the answers

    A data token frame is only used for transmitting data from upper-layer protocols.

    <p>False</p> Signup and view all the answers

    How many priority levels are specified in Token Ring for token priority?

    <p>8</p> Signup and view all the answers

    The Starting Delimiter consists of a special bit pattern denoting the ________ of the frame.

    <p>beginning</p> Signup and view all the answers

    Match the components of the Token Ring data/command frame with their descriptions:

    <p>SD = Marks the start of the frame AC = Controls access to the token DA = Destination address PDU = Payload data from upper-layer protocols</p> Signup and view all the answers

    What does the T bit indicate when set in a frame?

    <p>It specifies that this is a token frame.</p> Signup and view all the answers

    What does the Access Control byte in a Token Ring data/command frame consist of?

    <p>P, P, P, T, M, R, R, R bits</p> Signup and view all the answers

    Tokens in Token Ring networks are always 3 bytes in length.

    <p>True</p> Signup and view all the answers

    The Frame Check Sequence is an optional field in the frame structure.

    <p>False</p> Signup and view all the answers

    The Ending Delimiter marks the ________ of the frame.

    <p>end</p> Signup and view all the answers

    What is the maximum allowable size of the data field in a frame?

    <p>4500 bytes</p> Signup and view all the answers

    The source address field contains the physical address of the sending station and can either be a ______ or ______.

    <p>local assigned address (LAA), universally assigned address (UAA)</p> Signup and view all the answers

    Match the following fields with their descriptions:

    <p>Frame Control = Describes data or control contents of the frame End Delimiter = Marks the end of the frame Destination Address = Specifies the physical address of the destination Frame Status = Indicates if the frame was recognized by the receiver</p> Signup and view all the answers

    Which bit is used by the Active Monitor station to indicate that it has seen the frame?

    <p>M bit</p> Signup and view all the answers

    The Frame type '01' indicates a MAC frame and disregards control bits.

    <p>False</p> Signup and view all the answers

    What is the purpose of the Frame Check Sequence in a frame?

    <p>To verify frame integrity</p> Signup and view all the answers

    What is one of the primary functions of the active monitor in a token ring network?

    <p>To operate as the master clock for synchronization</p> Signup and view all the answers

    In a token ring network, more than one active monitor can exist simultaneously.

    <p>False</p> Signup and view all the answers

    What frame is transmitted by a station to announce that it wants to become the new monitor?

    <p>claim token</p> Signup and view all the answers

    If a station has not seen a token frame in the past ______ seconds, it may initiate a monitor contention process.

    <p>7</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Active Monitor = Performs ring administration functions Standby Monitor = A station ready to become the active monitor Claim Token = Frame announcing desire to become the monitor Token Frame = Indicates permission to transmit data</p> Signup and view all the answers

    What happens if two stations try to become the active monitor at the same time?

    <p>The station with the highest MAC address wins</p> Signup and view all the answers

    The active monitor is responsible for inserting a 24-bit delay into the ring.

    <p>True</p> Signup and view all the answers

    Name one condition that initiates the monitor contention process.

    <p>Loss of signal on the ring</p> Signup and view all the answers

    Study Notes

    Token Ring Protocol

    • Token ring is a LAN protocol operating at the data link layer (DLL) of the OSI model.
    • It uses a special three-byte frame, the token, that circulates around the ring.
    • Token possession grants permission to transmit on the medium.
    • Initially used in IBM computers, it's now standardized with IEEE 802.5 protocol.

    Data Transmission Process

    • Empty frames circulate continuously on the ring.
    • When a computer needs to send a message, it modifies an empty frame (inserting a 1 for example).
    • The frame includes the message and destination ID.
    • Each station checks the frame; the destination station copies the message and resets the token bit (back to 0).
    • The originating station removes the message once it sees the changed token bit and that the message has been delivered.
    • The frame then continues circulating as an empty frame ready to be used again.

    Token Frame Usage with Bus Topology

    • When no station transmits, a special token frame circulates.
    • A station needing to transmit converts the token frame into a data frame.
    • After data transmission, the frame is converted back to a token frame.
    • An active monitor detects transmission errors and corrects them. Removing or inserting tokens as necessary.
    • 4Mbit/s rings support only one token; 16Mbit/s rings support multiple tokens.

    Token Frame Details

    • The special token frame consists of three bytes.
    • J and K are special non-data characters used for code violations.

    Token Priority

    • Token ring allows for priority transmission.
    • 8 priority levels (0-7) are used
    • A station with a higher priority can request priority access to the token.
    • Priority is reflected in the bits when the token is received
    • The station lowers its priority back to the original value after sending/receiving.

    Token Ring Frame Format

    • Token ring frames are expanded versions of token frames.
    • Used by stations for MAC management or data transmission (from higher levels).
    • Two basic frame types exist: tokens and data/command frames.
    • Token frames consist of: start delimiter, access control byte, and end delimiter.
    • Data/command frames vary in size, with information field sizes determining this.

    Data/Command Frame Structure

    • Data/command frame layout: start delimiter (SD), access control (AC), frame control (FC), destination address (DA), source address (SA).
    • Additional: Protocol Data Unit (PDU) from Logical Link Control (LLC), Cyclic Redundancy Check (CRC), End delimiter (ED), and Frame Status (FS).
    • Data frames carry upper-layer protocol information; Command frames carry control information.

    Starting Delimiter

    • A special bit pattern marks the beginning of the frame. J,K,0,J,K,0,0,0 is example.
    • J and K are code violations in Manchester encoding.

    Access Control

    • P bits are the priority bits.
    • T bit specifies a token frame.
    • M bit is set by the Active Monitor (AM) station, present in the frame.
    • R bits are reserved bits.

    Frame Control

    • This byte describes the data portion of the frame (if present).
    • It indicates if the frame contains data or control information.

    Destination and Source Addresses

    • Six-byte fields specifying destination/source physical addresses.
    • Local assigned address (LAA) or universally assigned address (UAA) of the station adapter.

    Data Field

    • Variable length field with a maximum size that depends on the ring speed.
    • Can hold MAC management data or higher-layer information (around 4500 bytes max).

    Frame Check Sequence (FCS)

    • Four bytes used to store Cyclic Redundancy Check (CRC) for frame integrity.
    • Used by the receiver for error detection.

    Ending Delimiter

    • Marks the end of a frame; counterpart to the starting delimiter.
    • Bit pattern of J,K,1,J,K,1,I,E

    Frame Status

    • One-byte field used for acknowledgement.
    • Indicates if the frame was received and copied by the intended receiver.

    Active and Standby Monitors

    • Every station belongs to an "active monitor (AM)" or "standby monitor (SM)" category.
    • Only one active monitor exists on a ring at a time.
    • Election or monitor contention chooses the active monitor.
    • Monitors are selected when a signal loss occurs, another monitor isn't responding, or a timer on end-stations expires. (no token in 7 seconds).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Token Ring PDF

    Description

    This quiz covers the Token Ring protocol, which operates at the data link layer of the OSI model. It explores the process of data transmission using token frames and the protocol's historical background with IBM and IEEE standards. Test your understanding of how this LAN technology functions.

    More Like This

    Networking Technologies Quiz
    15 questions

    Networking Technologies Quiz

    ProficientPerception avatar
    ProficientPerception
    Use Quizgecko on...
    Browser
    Browser