lesson 14 token ring
Download
Skip this Video
Download Presentation
Lesson 14. Token Ring

Loading in 2 Seconds...

play fullscreen
1 / 39

Lesson 14. Token Ring - PowerPoint PPT Presentation


  • 228 Views
  • Uploaded on

Lesson 14. Token Ring. Objectives. At the end of this Presentation, you will be able to:. Compare and contrast the characteristics of Token Ring and Ethernet. Describe the topology and the equipment used to implement Token Ring.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Lesson 14. Token Ring' - lavey


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
objectives

Objectives

At the end of this Presentation, you will be able to:

slide3

Compare and contrast the characteristics of Token Ring and Ethernet.

Describe the topology and the equipment used to implement Token Ring.

Given simple diagrams of Token Ring and Ethernet networks, differentiate between them.

Describe “token passing” and explain its characteristics.

token ring1

Token Ring

Developed by IBM

Uses Token Passing to control network traffic

More expensive than Ethernet

Less popular than Ethernet

token ring ethernet

Token Ring Ethernet

  • 10 Megabits/Second
  • 100 Megabits/Second
  • Wastes part of its bandwidth

4 Megabits/Second

16 Megabits/Second

Uses its full Bandwidth

standards

Standards

IEEE 802.3 defines CSMA/CD (Ethernet)

IEEE 802.5 defines Token Ring

the multi station access unit mau

The Multi-station Access Unit (MAU)

Multi-station Access Unit (MAU)

1

2

3

4

5

6

7

8

Ring

IN

Ring

OUT

the multi station access unit mau1

The Multi-station Access Unit (MAU)

Multi-station Access Unit (MAU)

Ring

IN

Ring

OUT

1

2

3

4

5

6

7

8

ring in and ring out jacks

Ring In and Ring Out Jacks

Multi-station Access Unit (MAU)

1

2

3

4

5

6

7

8

RI

RO

slide17

Multi-station Access Unit (MAU)

1

2

3

4

5

6

7

8

RI

RO

Multi-station Access Unit (MAU)

R/I

1

2

3

4

5

6

7

8

R/O

slide18

MAU

MAU

1

2

3

4

5

6

7

8

RI

RO

Ring

IN

Ring

OUT

1

2

3

4

5

6

7

8

RI

RO

slide20

Server

MAU

1

2

3

4

5

6

7

8

Ring

IN

Ring

OUT

MAU

1

2

3

4

5

6

7

8

Ring

IN

Ring

OUT

slide21

Multi-station Access Unit (MAU)

Ring

IN

Ring

OUT

1

2

3

4

5

6

7

8

Multi-station Access Unit (MAU)

Ring

IN

Ring

OUT

1

2

3

4

5

6

7

8

slide26

1

Token

(Free)

2

6

5

3

4

slide27

1

2

6

Token

(Free)

5

3

4

slide28

1

2

6

5

3

4

Token

(Free)

slide29

1

2

6

5

3

Packet

Token

(Busy)

4

slide30

1

2

6

Token

(Busy)

Packet

5

3

4

slide31

1

2

6

Token

(Busy)

Packet

5

3

4

slide32

1

2

6

Packet

5

3

Token

(Busy)

4

slide33

1

2

6

5

3

Token

(Free)

4

token ring priority

Token Ring Priority

Non-priority Access control

Priority Access control

slide35

1

2

6

Token

(Busy)

Packet

5

3

4

slide36

1

2

6

5

3

Token

(Free)

4

token ring speeds

Token Ring Speeds

4-Mbps and 16-Mbps

NIC must match the speed of the ring

A common mistake is to use a slow NIC in a fast token ring environment.

Can be slowed by transferring very large files.

A sudden slow down immediately after changing an NIC.

token ring2

Token Ring

Logical ring, physical star topology

Defined by IEEE 802.5 standard

4 Megabit and 16 Megabit

Uses it bandwidth more efficiently than Ethernet.

Uses token passing to control media access

slide39

Compare and contrast the characteristics of Token Ring and Ethernet.

Describe the topology and the equipment used to implement Token Ring.

Given simple diagrams of Token Ring and Ethernet networks, differentiate between them.

Describe “token passing” and explain its characteristics.

ad