Token
Passing
Token Ring and IEEE 802.5 are the primary examples of token-passing
networks. Token-passing networks move a small frame, called a token, around
the network. Possession of the token grants the right to transmit data. If
a node that receives a token has no information to send, it passes the
token to the next end station. Each station can hold the token for a
maximum period of time, depending on the specific technology that has been
implemented.
When a token is passed
to a host that has information to transmit, the host seizes the token and
alters 1 bit of it. The token becomes a start-of-frame sequence. Next, the
station appends the information to transmit to the token and sends this
data to the next station on the ring. There is no token on the network
while the information frame is circling the ring, unless the ring supports
early token releases. Other stations on the ring cannot transmit at this
time. They must wait for the token to become available. Token Ring networks
have no collisions. If early token release is supported, a new token can be
released when the frame transmission has been completed.
The information frame
circulates around the ring until it reaches the intended destination
station, which copies the information for processing. The information frame
continues around the ring until it reaches the sending station, where it is
removed. The sending station can verify whether the frame was received and
copied by the destination.
Unlike CSMA/CD
networks, such as Ethernet, token-passing networks are deterministic. This
means that you can calculate the maximum time that will pass before any end
station will be able to transmit. This feature, and several reliability
features, makes Token Ring networks ideal for applications where any delay
must be predictable, and robust network operation is important. Factory
automation environments are examples of predictable robust network
operations.
Priority System
Token Ring networks use a sophisticated priority system that permits
certain user-designated, high-priority stations to use the network more
frequently. Token Ring frames have two fields that control priority - the priority
field and the reservation field.
Only stations with a
priority equal to, or higher than, the priority value contained in a token
can seize that token. Once the token has been seized and changed to an
information frame, only stations with a priority value higher than that of
the transmitting station can reserve the token for the next network pass.
The next token generated includes the higher priority of the reserving
station. Stations that raise a token's priority level must reinstate the
previous priority when their transmission has been completed.
Management
Mechanisms
Token Ring networks use several mechanisms for detecting and compensating
for network faults. One mechanism is to select one station in the Token
Ring network to be the active monitor. This station acts as a centralized
source of timing information for other ring stations and performs a variety
of ring maintenance functions. The active monitor station can potentially
be any station on the network. One of this station’s functions is to remove
continuously circulating frames from the ring. When a sending device fails,
its frame may continue to circle the ring and prevent other stations from
transmitting their frames, which can lock up the network. The active
monitor can detect these frames, remove them from the ring, and generate a
new token.
The IBM Token Ring
network's physical star topology also contributes to the overall network
reliability. Active MSAUs (multi-station access units)
can see all information in a Token Ring network, thus enabling them to
check for problems, and to selectively remove stations from the ring
whenever necessary. Beaconing - a Token Ring formula - detects and
tries to repair network faults. When a station detects a serious problem
with the network (e.g. a cable break) it sends a beacon frame. The
beacon frame defines a failure domain. A failure domain includes the
station that is reporting the failure, its nearest active upstream
neighbor (NAUN), and everything in between. Beaconing initiates a
process called autoreconfiguration, where nodes within the failure
domain automatically perform diagnostics. This is an attempt to reconfigure
the network around the failed areas. Physically, MSAUs can accomplish this
through electrical reconfiguration.
|