1 / 39

Lesson 14. Token Ring

Lesson 14. Token Ring. Objectives. At the end of this Presentation, you will be able to:. Compare and contrast the characteristics of Token Ring and Ethernet. Describe the topology and the equipment used to implement Token Ring.

lavey
Download Presentation

Lesson 14. Token Ring

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lesson 14. Token Ring

  2. Objectives At the end of this Presentation, you will be able to:

  3. Compare and contrast the characteristics of Token Ring and Ethernet. Describe the topology and the equipment used to implement Token Ring. Given simple diagrams of Token Ring and Ethernet networks, differentiate between them. Describe “token passing” and explain its characteristics.

  4. Network+ Domains covered: 1.1 1.2 1.4

  5. Ethernet Vs. Token Ring

  6. Token Ring

  7. Token Ring Developed by IBM Uses Token Passing to control network traffic More expensive than Ethernet Less popular than Ethernet

  8. Token Ring Ethernet • 10 Megabits/Second • 100 Megabits/Second • Wastes part of its bandwidth 4 Megabits/Second 16 Megabits/Second Uses its full Bandwidth

  9. Token Ring and IEEE 802.5

  10. Standards IEEE 802.3 defines CSMA/CD (Ethernet) IEEE 802.5 defines Token Ring

  11. Token Ring uses a Logical Ring Topology. 2 1 3

  12. Token Ring uses a Physical Star Topology. 1 2 3 4 5 6 7 8

  13. The Multi-station Access Unit (MAU) Multi-station Access Unit (MAU) 1 2 3 4 5 6 7 8 Ring IN Ring OUT

  14. An electronic equivalent of the RING is inside the MAU.

  15. The Multi-station Access Unit (MAU) Multi-station Access Unit (MAU) Ring IN Ring OUT 1 2 3 4 5 6 7 8

  16. Ring In and Ring Out Jacks Multi-station Access Unit (MAU) 1 2 3 4 5 6 7 8 RI RO

  17. Multi-station Access Unit (MAU) 1 2 3 4 5 6 7 8 RI RO Multi-station Access Unit (MAU) R/I 1 2 3 4 5 6 7 8 R/O

  18. MAU MAU 1 2 3 4 5 6 7 8 RI RO Ring IN Ring OUT 1 2 3 4 5 6 7 8 RI RO

  19. Logical Ring

  20. Server MAU 1 2 3 4 5 6 7 8 Ring IN Ring OUT MAU 1 2 3 4 5 6 7 8 Ring IN Ring OUT

  21. Multi-station Access Unit (MAU) Ring IN Ring OUT 1 2 3 4 5 6 7 8 Multi-station Access Unit (MAU) Ring IN Ring OUT 1 2 3 4 5 6 7 8

  22. Token Ring NICs and Connectors DB-9 RJ-45

  23. Token Passing Protocol 1 Token 2 6 5 3 4

  24. 1 Token (Free) 2 6 5 3 4

  25. 1 2 6 Token (Free) 5 3 4

  26. 1 2 6 5 3 4 Token (Free)

  27. 1 2 6 5 3 Packet Token (Busy) 4

  28. 1 2 6 Token (Busy) Packet 5 3 4

  29. 1 2 6 Token (Busy) Packet 5 3 4

  30. 1 2 6 Packet 5 3 Token (Busy) 4

  31. 1 2 6 5 3 Token (Free) 4

  32. Token Ring Priority Non-priority Access control Priority Access control

  33. 1 2 6 Token (Busy) Packet 5 3 4

  34. 1 2 6 5 3 Token (Free) 4

  35. Token Ring Speeds 4-Mbps and 16-Mbps NIC must match the speed of the ring A common mistake is to use a slow NIC in a fast token ring environment. Can be slowed by transferring very large files. A sudden slow down immediately after changing an NIC.

  36. Token Ring Logical ring, physical star topology Defined by IEEE 802.5 standard 4 Megabit and 16 Megabit Uses it bandwidth more efficiently than Ethernet. Uses token passing to control media access

  37. Compare and contrast the characteristics of Token Ring and Ethernet. Describe the topology and the equipment used to implement Token Ring. Given simple diagrams of Token Ring and Ethernet networks, differentiate between them. Describe “token passing” and explain its characteristics.

More Related