590 likes | 1.42k Views
Lesson 14. Token Ring. Objectives. At the end of this Presentation, you will be able to:. Compare and contrast the characteristics of Token Ring and Ethernet. Describe the topology and the equipment used to implement Token Ring.
E N D
Objectives At the end of this Presentation, you will be able to:
Compare and contrast the characteristics of Token Ring and Ethernet. Describe the topology and the equipment used to implement Token Ring. Given simple diagrams of Token Ring and Ethernet networks, differentiate between them. Describe “token passing” and explain its characteristics.
Network+ Domains covered: 1.1 1.2 1.4
Token Ring Developed by IBM Uses Token Passing to control network traffic More expensive than Ethernet Less popular than Ethernet
Token Ring Ethernet • 10 Megabits/Second • 100 Megabits/Second • Wastes part of its bandwidth 4 Megabits/Second 16 Megabits/Second Uses its full Bandwidth
Standards IEEE 802.3 defines CSMA/CD (Ethernet) IEEE 802.5 defines Token Ring
Token Ring uses a Physical Star Topology. 1 2 3 4 5 6 7 8
The Multi-station Access Unit (MAU) Multi-station Access Unit (MAU) 1 2 3 4 5 6 7 8 Ring IN Ring OUT
The Multi-station Access Unit (MAU) Multi-station Access Unit (MAU) Ring IN Ring OUT 1 2 3 4 5 6 7 8
Ring In and Ring Out Jacks Multi-station Access Unit (MAU) 1 2 3 4 5 6 7 8 RI RO
Multi-station Access Unit (MAU) 1 2 3 4 5 6 7 8 RI RO Multi-station Access Unit (MAU) R/I 1 2 3 4 5 6 7 8 R/O
MAU MAU 1 2 3 4 5 6 7 8 RI RO Ring IN Ring OUT 1 2 3 4 5 6 7 8 RI RO
Server MAU 1 2 3 4 5 6 7 8 Ring IN Ring OUT MAU 1 2 3 4 5 6 7 8 Ring IN Ring OUT
Multi-station Access Unit (MAU) Ring IN Ring OUT 1 2 3 4 5 6 7 8 Multi-station Access Unit (MAU) Ring IN Ring OUT 1 2 3 4 5 6 7 8
Token Ring NICs and Connectors DB-9 RJ-45
Token Passing Protocol 1 Token 2 6 5 3 4
1 Token (Free) 2 6 5 3 4
1 2 6 Token (Free) 5 3 4
1 2 6 5 3 4 Token (Free)
1 2 6 5 3 Packet Token (Busy) 4
1 2 6 Token (Busy) Packet 5 3 4
1 2 6 Token (Busy) Packet 5 3 4
1 2 6 Packet 5 3 Token (Busy) 4
1 2 6 5 3 Token (Free) 4
Token Ring Priority Non-priority Access control Priority Access control
1 2 6 Token (Busy) Packet 5 3 4
1 2 6 5 3 Token (Free) 4
Token Ring Speeds 4-Mbps and 16-Mbps NIC must match the speed of the ring A common mistake is to use a slow NIC in a fast token ring environment. Can be slowed by transferring very large files. A sudden slow down immediately after changing an NIC.
Token Ring Logical ring, physical star topology Defined by IEEE 802.5 standard 4 Megabit and 16 Megabit Uses it bandwidth more efficiently than Ethernet. Uses token passing to control media access
Compare and contrast the characteristics of Token Ring and Ethernet. Describe the topology and the equipment used to implement Token Ring. Given simple diagrams of Token Ring and Ethernet networks, differentiate between them. Describe “token passing” and explain its characteristics.