09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

have <strong>to</strong> transmit against <strong>the</strong> priority of <strong>the</strong> free <strong>to</strong>ken. This is set in <strong>the</strong> access<br />

control field. If <strong>the</strong> <strong>to</strong>ken's control field priority is less than or equal <strong>to</strong> <strong>the</strong>ir traffic's<br />

priority, <strong>the</strong>y can transmit. If <strong>the</strong> <strong>to</strong>ken's priority is greater than <strong>the</strong> station's traffic<br />

priority, <strong>the</strong>y pass <strong>the</strong> <strong>to</strong>ken on without transmitting. The <strong>to</strong>ken priority is set using<br />

<strong>the</strong> <strong>to</strong>ken priority reservation mechanism. If any station has high priority traffic <strong>to</strong><br />

send, when it gets <strong>the</strong> <strong>to</strong>ken it can set its frame's priority using <strong>the</strong> reservation bits<br />

in <strong>the</strong> access control field, provided <strong>the</strong> reservation bits are not already set with a<br />

priority higher than <strong>the</strong> traffic <strong>the</strong> station wants <strong>to</strong> send. When <strong>the</strong> reservation bits<br />

are set and <strong>the</strong> currently transmitting station receives <strong>the</strong> transmitted frame back,<br />

it reads <strong>the</strong> reservation bits, sets <strong>the</strong> new <strong>to</strong>ken's priority value <strong>to</strong> <strong>the</strong> reserved<br />

value, and sends <strong>the</strong> <strong>to</strong>ken on <strong>to</strong> <strong>the</strong> ring.<br />

Ring Management and Operation<br />

The IBM and IEEE 802.5 Token Ring architectures both define a set of management<br />

agents that operate on <strong>the</strong> ring station <strong>to</strong> provide facilities that maintain <strong>the</strong> ring's<br />

proper operation. These ring management facilities include <strong>to</strong>ken generation and<br />

traffic moni<strong>to</strong>ring, ring error detection, ring error data collection, and ring recovery<br />

functions. Each of <strong>the</strong>se defined agents or "server" functions is performed (in most<br />

cases) in addition <strong>to</strong> <strong>the</strong> station's primary function, which is <strong>to</strong> transmit and receive<br />

<strong>to</strong>kens containing ULP application data. Any Token Ring-defined management<br />

facility can be performed by any properly functioning ring station connected <strong>to</strong> <strong>the</strong><br />

ring. In this respect, like access <strong>to</strong> <strong>the</strong> transmission medium, each station is equal.<br />

Each management server function is essentially a finite state machine, which is <strong>to</strong><br />

say that any station can change its operational "state" dynamically in response <strong>to</strong><br />

changes in <strong>the</strong> ring's larger operational state.<br />

This dynamic state-based approach <strong>to</strong> implementing <strong>the</strong> ring management<br />

functions reflects <strong>the</strong> underlying operational basis of Token Ring's design. The<br />

design provides a fault-<strong>to</strong>lerant, self-recovering data transmission environment<br />

that provides contentionless access <strong>to</strong> <strong>the</strong> transmission medium for all stations.<br />

Each of <strong>the</strong>se qualities is essential <strong>to</strong> provide data transmission services for <strong>the</strong><br />

transaction-oriented processing applications that operated on IBM's mainframe<br />

computers (for which Token Ring was originally developed). With this background in<br />

mind, it is easier <strong>to</strong> understand why <strong>the</strong> IEEE and IBM Token Ring specifications<br />

differ in some areas, particularly when it comes <strong>to</strong> <strong>the</strong> defined ring management<br />

functions.<br />

In <strong>the</strong> case of <strong>the</strong> IEEE 802.5 specification, its focus is on defining a transmission<br />

pro<strong>to</strong>col and <strong>the</strong> basic management services needed for proper ring operation <strong>to</strong><br />

take place. Therefore, <strong>the</strong> IEEE specification focuses on <strong>the</strong> management server<br />

functions of <strong>the</strong> active moni<strong>to</strong>r and <strong>the</strong> standby moni<strong>to</strong>r. The IBM Token Ring<br />

architecture, on <strong>the</strong> o<strong>the</strong>r hand, is focused on providing a data transmission<br />

pro<strong>to</strong>col for transaction processing, which requires not only ring operation

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!