In a Token Ring network, frames have a specific format to ensure reliable and orderly communication among nodes. The Token Ring uses a token-passing protocol for access control, and each frame follows a standardized structure as defined in IEEE 802.5.
Structure of a Token Ring Frame
Token Ring is a networking technology where devices are connected in a logical ring. Communication is controlled by a special frame called a token. When a device holds the token, it can transmit data. A Token Ring frame has a specific format to ensure that data is transferred accurately and efficiently.
It consists of the following elements in the structure of the token ring format :
Token Ring FormatStart Delimiter (SD) 1 Byte : Used for the marking the beginning of the frame. This has a unique bit pattern so that the receiving station knows exactly when a new frame starts. It includes symbols to indicate timing and frame synchronization.
Access Control (AC) 1 Byte : Used to manage token passing and transmission control. Fields Include:
- Priority bits (3 bits): Used to determine the priority of the frame.
- Token bit (T): Indicates whether the frame is a token or data.
- Monitor bit (M): Ensures only one token exists in the ring.
- Reservation bits (3 bits): Allow a station to reserve the token for higher priority transmissions.
Access Control
Frame Control (FC) 1 Byte : It identifies the type of frame being transmitted. It helps devices interpret the rest of the frame correctly. First 2 bits indicates whether the frame contains data or control information. In control frames, this byte specifies the type of control information.Types:
- Data Frame: Carries user data.
- MAC Frame: Used for control purposes such as ring maintenance.
Frame Control
Destination Address (DA) 2 or 6 Bytes : It specifies the intended receiver’s MAC address. The size depends on whether the network uses 16-bit or 48-bit addressing. This allows unicast, multicast, or broadcast communication.
Source Address (SA) 2 or 6 Bytes : It contains the MAC address of the sender. It has the same size as the destination address.
Data Variable Length : It carries the actual message or payload. It sizes typically up to 4,000 bytes, but can vary based on network configuration. This is the information the sender wants to deliver.
Frame Check Sequence (FCS) 4 Bytes : Used for error-checking using Cyclic Redundancy Check (CRC). It ensures the data was not corrupted in transit. The recipient recalculates the CRC and compares it to detect any errors. 32 bit CRC which is used to check for errors in the frame, i.e., whether the frame is corrupted or not. If the frame is corrupted, then its discarded.
Ending Delimiter (ED) 1 Byte : It marks the end of the frame allows the receiver to detect when the frame is complete. It has a specific bit pattern that signifies the end of data transmission.
Frame Status (FS) 1 Byte : It indicates whether the frame was recognized and copied by the destination.
- A (Address Recognized): Set by the recipient if it recognizes its address.
- C (Frame Copied): Set if the frame’s contents were successfully copied.
It makes use of 2 copies of AC bits are used as a error detection mechanism (100% redundancy) as CRC does not cover FS byte so that destination does not have to recalculate CRC when modifying AC bits.
Frame statusSpecial Frame The Token:
- A special type of frame (only 3 bytes long) that circulates around the ring.
- Consists of Start Delimiter + Access Control + End Delimiter.
- Allows a station to transmit data only when it captures the token.
Token FrameField | Size | Purpose |
---|
Start Delimiter | 1 byte | Marks frame start, unique bit pattern |
---|
Access Control | 1 byte | Manages priority, token status, and ring monitoring |
---|
Frame Control | 1 byte | Identifies frame type (data or control) |
---|
Destination Address | 2 or 6 bytes | Address of the receiver |
---|
Source Address | 2 or 6 bytes | Address of the sender |
---|
Data | Variable | Payload (up to 4,000 bytes) |
---|
Frame Check Sequence | 4 bytes | Error detection via CRC |
---|
End Delimiter | 1 byte | Marks frame end |
---|
Frame Status | 1 byte | Indicates if frame was recognized and copied |
---|
Token Ring Network Functionality:
- Token Passing: Only the station (node) that currently holds the token is allowed to transmit data.
- Sending Data: Once the station finishes sending its data, it releases the token back into the network.
- Orderly Access: The token circulates in a logical ring among all stations, giving each one a turn to send.
- Collision Free: Since only one token exists and only the token holder can send data, this mechanism prevents collisions on the network.
- Efficient Use: This orderly process ensures fair and efficient use of the network medium.
Similar Reads
Basics of Computer Networking
A computer network is a collection of interconnected devices that share resources and information. These devices can include computers, servers, printers, and other hardware. Networks allow for the efficient exchange of data, enabling various applications such as email, file sharing, and internet br
14 min read
Types of Network Topology
Network topology refers to the arrangement of different elements like nodes, links, or devices in a computer network. Common types of network topology include bus, star, ring, mesh, and tree topologies, each with its advantages and disadvantages. In this article, we will discuss different types of n
12 min read
Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)
Transmission modes also known as communication modes, are methods of transferring data between devices on buses and networks designed to facilitate communication. They are classified into three types: Simplex Mode, Half-Duplex Mode, and Full-Duplex Mode. In this article, we will discuss Transmission
6 min read
Manchester Encoding in Computer Network
Manchester encoding is a synchronous clock encoding technique used by the physical layer of the Open System Interconnection to encode the clock and data of a synchronous bit stream. The idea of RZ and the idea of L are combined in manchester encoding. Different encoding techniques are used in data c
9 min read
Difference between Broadband and Baseband Transmission
In communication systems, Broadband and Baseband refer to two different ways of transmitting data. They differ in how data is sent over a communication medium, the frequency range they use, and their applications.Broadband systems use modulation techniques to reduce the effect of noise in the enviro
6 min read
What is OSI Model? - Layers of OSI Model
The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems communicate over a network. OSI Model was developed by the International Organization for Standardization (ISO). The OSI Model consists of 7 layers and each layer has specific functions and re
13 min read
TCP/IP Model
The TCP/IP model (Transmission Control Protocol/Internet Protocol) is a four-layer networking framework that enables reliable communication between devices over interconnected networks. It provides a standardized set of protocols for transmitting data across interconnected networks, ensuring efficie
7 min read
Multiple Access Protocols in Computer Network
Multiple Access Protocols are methods used in computer networks to control how data is transmitted when multiple devices are trying to communicate over the same network. These protocols ensure that data packets are sent and received efficiently, without collisions or interference. They help manage t
9 min read
Framing in Data Link Layer
Frames are the units of digital transmission, particularly in computer networks and telecommunications. Frames are comparable to the packets of energy called photons in the case of light energy. Frame is continuously used in Time Division Multiplexing process. Framing is a point-to-point connection
6 min read
What is Ethernet?
A LAN is a data communication network connecting various terminals or computers within a building or limited geographical area. The connection between the devices could be wired or wireless. Ethernet, Token rings, and Wireless LAN using IEEE 802.11 are examples of standard LAN technologies.In this a
9 min read