Token Ring Protocol Overview
32 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What layer of the OSI model does Token Ring technology operate at?

  • Network layer
  • Data link layer (correct)
  • Application layer
  • Transport layer

Token Ring technology allows multiple tokens to circulate simultaneously on a 4 Mbit/s network.

False (B)

What is the purpose of the token in Token Ring technology?

To grant permission to transmit on the medium.

In Token Ring, when a workstation receives a message, it changes the token back to ___ before sending it again.

<p>0</p> Signup and view all the answers

Match the following Token Ring components with their functions:

<p>Token = Grants permission to transmit Active monitor = Detects transmission errors Empty information frame = Circulated when no data is being transmitted Data frame = Contains the actual message to be sent</p> Signup and view all the answers

What happens to the token frame when a workstation needs to transmit data?

<p>It is converted into a data frame (C)</p> Signup and view all the answers

The Token Ring protocol was initially used only by IBM computers.

<p>True (A)</p> Signup and view all the answers

What happens to a data frame once the sending station receives its own data?

<p>It converts the frame back into a token.</p> Signup and view all the answers

What is the purpose of token priority in Token Ring networks?

<p>To enable stations to request high-priority access to the token (B)</p> Signup and view all the answers

A data token frame is only used for transmitting data from upper-layer protocols.

<p>False (B)</p> Signup and view all the answers

How many priority levels are specified in Token Ring for token priority?

<p>8</p> Signup and view all the answers

The Starting Delimiter consists of a special bit pattern denoting the ________ of the frame.

<p>beginning</p> Signup and view all the answers

Match the components of the Token Ring data/command frame with their descriptions:

<p>SD = Marks the start of the frame AC = Controls access to the token DA = Destination address PDU = Payload data from upper-layer protocols</p> Signup and view all the answers

What does the T bit indicate when set in a frame?

<p>It specifies that this is a token frame. (C)</p> Signup and view all the answers

What does the Access Control byte in a Token Ring data/command frame consist of?

<p>P, P, P, T, M, R, R, R bits (C)</p> Signup and view all the answers

Tokens in Token Ring networks are always 3 bytes in length.

<p>True (A)</p> Signup and view all the answers

The Frame Check Sequence is an optional field in the frame structure.

<p>False (B)</p> Signup and view all the answers

The Ending Delimiter marks the ________ of the frame.

<p>end</p> Signup and view all the answers

What is the maximum allowable size of the data field in a frame?

<p>4500 bytes</p> Signup and view all the answers

The source address field contains the physical address of the sending station and can either be a ______ or ______.

<p>local assigned address (LAA), universally assigned address (UAA)</p> Signup and view all the answers

Match the following fields with their descriptions:

<p>Frame Control = Describes data or control contents of the frame End Delimiter = Marks the end of the frame Destination Address = Specifies the physical address of the destination Frame Status = Indicates if the frame was recognized by the receiver</p> Signup and view all the answers

Which bit is used by the Active Monitor station to indicate that it has seen the frame?

<p>M bit (D)</p> Signup and view all the answers

The Frame type '01' indicates a MAC frame and disregards control bits.

<p>False (B)</p> Signup and view all the answers

What is the purpose of the Frame Check Sequence in a frame?

<p>To verify frame integrity</p> Signup and view all the answers

What is one of the primary functions of the active monitor in a token ring network?

<p>To operate as the master clock for synchronization (C)</p> Signup and view all the answers

In a token ring network, more than one active monitor can exist simultaneously.

<p>False (B)</p> Signup and view all the answers

What frame is transmitted by a station to announce that it wants to become the new monitor?

<p>claim token</p> Signup and view all the answers

If a station has not seen a token frame in the past ______ seconds, it may initiate a monitor contention process.

<p>7</p> Signup and view all the answers

Match the following terms with their definitions:

<p>Active Monitor = Performs ring administration functions Standby Monitor = A station ready to become the active monitor Claim Token = Frame announcing desire to become the monitor Token Frame = Indicates permission to transmit data</p> Signup and view all the answers

What happens if two stations try to become the active monitor at the same time?

<p>The station with the highest MAC address wins (A)</p> Signup and view all the answers

The active monitor is responsible for inserting a 24-bit delay into the ring.

<p>True (A)</p> Signup and view all the answers

Name one condition that initiates the monitor contention process.

<p>Loss of signal on the ring</p> Signup and view all the answers

Flashcards

What is Token Ring?

Token Ring is a network technology where data is transmitted around a closed loop.

Where does Token Ring operate in the OSI model?

The Data Link Layer (DLL) of the OSI model handles the transmission of data between devices on the network.

What is a token in Token Ring?

A token is a special 3-byte frame that travels around the token ring, granting permission to transmit data to the station that possesses it.

How is data transmitted in a Token Ring network?

Instead of broadcasting data, a station wanting to send data must first capture the token, insert its message and the destination address, and then send it around the ring.

Signup and view all the flashcards

How does a station receive data in Token Ring?

Every station examines the passing data frame. The station with the matching destination address copies the data and changes the token back to a 0.

Signup and view all the flashcards

What happens to the data frame after it's received?

The originating station removes the message from the frame, and the empty frame continues to circulate, waiting to be used by another station.

Signup and view all the flashcards

What is an Active Monitor in Token Ring?

An Active Monitor is a special station that monitors for problems like multiple tokens or missing tokens, fixing them by adding or removing tokens as needed.

Signup and view all the flashcards

How many tokens can circulate on a Token Ring network?

A 4 Mbit/s Token Ring network can only have one token circulating at a time, whereas a 16 Mbit/s Token Ring can support multiple tokens.

Signup and view all the flashcards

Frame Control

A one-byte field within a Token Ring frame that indicates the type of data it carries. It specifies whether the frame contains regular data or control information.

Signup and view all the flashcards

Frame Type

The Frame Control field distinguishes between data frames, which carry user information, and control frames, which manage the network. Data frames (01) use the IEEE 802.2 protocol, while control frames (00) handle network housekeeping.

Signup and view all the flashcards

Control Bits

This field contains various bits that are involved in managing and controlling the token ring network. For example, the token bit indicates if this is a token frame, while the monitor bit is marked by the Active Monitor station when it sees the frame.

Signup and view all the flashcards

Destination Address

A six-byte field that identifies the recipient of the data within the frame. It indicates where the data should be sent within the network.

Signup and view all the flashcards

Source Address

Another six-byte field that identifies the sender of the data within the frame.

Signup and view all the flashcards

Data

A variable-length field that carries the core information transmitted over the network, ranging from 0 to 4500 bytes, depending on factors like the ring speed and type of data being sent.

Signup and view all the flashcards

Frame Check Sequence

A four-byte field that carries a Cyclic Redundancy Check (CRC) calculated for the frame. It ensures the data is transmitted without corruption.

Signup and view all the flashcards

Frame Status

A one-byte field at the end of the frame that provides a basic acknowledgment mechanism. It's used by the destination station to confirm it received and copied the data.

Signup and view all the flashcards

Token Priority in Token Ring

Token Ring allows stations with urgent data to prioritize their transmission by adjusting the token's priority level. The station can set the priority bits to its desired level (0-7) if the current token's priority is lower or equal to its request. The station does not immediately transmit; it waits for the token to circulate back.

Signup and view all the flashcards

Token Frame

A token is a 3-byte frame containing a start delimiter, access control byte, and end delimiter. It indicates the availability of the network for transmission.

Signup and view all the flashcards

Data Frame in Token Ring

A data frame in Token Ring is an expanded version of the token. It carries MAC management frames or data from upper layer protocols and applications. It includes additional fields like destination address, source address, and data payload.

Signup and view all the flashcards

Starting Delimiter

A special bit pattern used for frame boundary identification. The bits are J,K,0,J,K,0,0,0, where J and K are code violations that ensure the hardware can detect the frame's start and end.

Signup and view all the flashcards

Access Control Byte

This 8-bit field contains control information for the token. It specifies things like the token's priority and indicates if it's a token or a data/command frame.

Signup and view all the flashcards

Data Frame Format

The data frame format in Token Ring includes: Starting Delimiter, Access Control, Frame Control, Destination & Source Addresses, PDU from LLC (IEEE 802.2), CRC, Ending Delimiter, and Frame Status.

Signup and view all the flashcards

Ending Delimiter

This bit pattern marks the end of a frame, ensuring the network can recognize the end of a message.

Signup and view all the flashcards

Token and Data/Command Frames

Different frame types exist in Token Ring for managing MAC access and carrying data. Tokens are short frames for signaling, while data/command frames carry actual data and control information.

Signup and view all the flashcards

What is an Abort Frame?

This frame is sent by a station intending to abort transmission. It has a start delimiter and end delimiter, but no data.

Signup and view all the flashcards

What is a Token Frame?

A special frame that circulates around the ring, granting permission to transmit data to the station that possesses it.

Signup and view all the flashcards

What is the Monitor Contention Process?

The process of selecting an Active Monitor in a Token Ring network when there's a problem with the existing one.

Signup and view all the flashcards

What is an Active Monitor?

A station in a Token Ring network responsible for monitoring and maintaining the ring's health.

Signup and view all the flashcards

What is a Standby Monitor?

A station in a Token Ring network that can become an Active Monitor if needed.

Signup and view all the flashcards

What is a MAC address?

A value assigned to each station in a Token Ring network to identify it, used in the Monitor Contention Process to determine the winner.

Signup and view all the flashcards

What is Token Insertion?

A function performed by the Active Monitor to ensure the token keeps circulating on the ring.

Signup and view all the flashcards

What is the Delay Function of the Active Monitor?

The Active Monitor ensures enough delay is added to the ring for the token to circulate.

Signup and view all the flashcards

Study Notes

Token Ring Protocol

  • Token ring is a LAN protocol operating at the data link layer (DLL) of the OSI model.
  • It uses a special three-byte frame, the token, that circulates around the ring.
  • Token possession grants permission to transmit on the medium.
  • Initially used in IBM computers, it's now standardized with IEEE 802.5 protocol.

Data Transmission Process

  • Empty frames circulate continuously on the ring.
  • When a computer needs to send a message, it modifies an empty frame (inserting a 1 for example).
  • The frame includes the message and destination ID.
  • Each station checks the frame; the destination station copies the message and resets the token bit (back to 0).
  • The originating station removes the message once it sees the changed token bit and that the message has been delivered.
  • The frame then continues circulating as an empty frame ready to be used again.

Token Frame Usage with Bus Topology

  • When no station transmits, a special token frame circulates.
  • A station needing to transmit converts the token frame into a data frame.
  • After data transmission, the frame is converted back to a token frame.
  • An active monitor detects transmission errors and corrects them. Removing or inserting tokens as necessary.
  • 4Mbit/s rings support only one token; 16Mbit/s rings support multiple tokens.

Token Frame Details

  • The special token frame consists of three bytes.
  • J and K are special non-data characters used for code violations.

Token Priority

  • Token ring allows for priority transmission.
  • 8 priority levels (0-7) are used
  • A station with a higher priority can request priority access to the token.
  • Priority is reflected in the bits when the token is received
  • The station lowers its priority back to the original value after sending/receiving.

Token Ring Frame Format

  • Token ring frames are expanded versions of token frames.
  • Used by stations for MAC management or data transmission (from higher levels).
  • Two basic frame types exist: tokens and data/command frames.
  • Token frames consist of: start delimiter, access control byte, and end delimiter.
  • Data/command frames vary in size, with information field sizes determining this.

Data/Command Frame Structure

  • Data/command frame layout: start delimiter (SD), access control (AC), frame control (FC), destination address (DA), source address (SA).
  • Additional: Protocol Data Unit (PDU) from Logical Link Control (LLC), Cyclic Redundancy Check (CRC), End delimiter (ED), and Frame Status (FS).
  • Data frames carry upper-layer protocol information; Command frames carry control information.

Starting Delimiter

  • A special bit pattern marks the beginning of the frame. J,K,0,J,K,0,0,0 is example.
  • J and K are code violations in Manchester encoding.

Access Control

  • P bits are the priority bits.
  • T bit specifies a token frame.
  • M bit is set by the Active Monitor (AM) station, present in the frame.
  • R bits are reserved bits.

Frame Control

  • This byte describes the data portion of the frame (if present).
  • It indicates if the frame contains data or control information.

Destination and Source Addresses

  • Six-byte fields specifying destination/source physical addresses.
  • Local assigned address (LAA) or universally assigned address (UAA) of the station adapter.

Data Field

  • Variable length field with a maximum size that depends on the ring speed.
  • Can hold MAC management data or higher-layer information (around 4500 bytes max).

Frame Check Sequence (FCS)

  • Four bytes used to store Cyclic Redundancy Check (CRC) for frame integrity.
  • Used by the receiver for error detection.

Ending Delimiter

  • Marks the end of a frame; counterpart to the starting delimiter.
  • Bit pattern of J,K,1,J,K,1,I,E

Frame Status

  • One-byte field used for acknowledgement.
  • Indicates if the frame was received and copied by the intended receiver.

Active and Standby Monitors

  • Every station belongs to an "active monitor (AM)" or "standby monitor (SM)" category.
  • Only one active monitor exists on a ring at a time.
  • Election or monitor contention chooses the active monitor.
  • Monitors are selected when a signal loss occurs, another monitor isn't responding, or a timer on end-stations expires. (no token in 7 seconds).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Token Ring PDF

Description

This quiz covers the Token Ring protocol, which operates at the data link layer of the OSI model. It explores the process of data transmission using token frames and the protocol's historical background with IBM and IEEE standards. Test your understanding of how this LAN technology functions.

More Like This

Tehnica Jetoanelor pe un Inel
49 questions

Tehnica Jetoanelor pe un Inel

HeartfeltGyrolite6056 avatar
HeartfeltGyrolite6056
Use Quizgecko on...
Browser
Browser