Token Ring Topology: Working, Token Passing, Frame Format, Errors & Advantages Explained

Introduction

Token Ring is a networking technology used to create local area networks (LANs). It was introduced by IBM in 1984 and standardized as IEEE 802.5 in 1989.

It uses a three-byte frame called a token that circulates around a logical ring of workstations or servers. This channel access method ensures equal access for all stations and eliminates collisions that occur in contention-based networks. Token Ring was popular in corporate environments but was eventually replaced by advanced Ethernet technologies.

What Is a Token Ring?

A token ring network should not be confused with a physical ring topology. In a physical ring topology, computers are arranged in a continuous circle, where each device is connected to its left and right neighbors. If one computer or link fails, the entire network can collapse.

Operating Modes

What Is Token Passing?

Token passing is the method used by Token Ring networks to control access. A station must capture the token before transmitting data. The token contains three main fields that circulate until captured and removed by a station.

Token Fields

Active and Standby Monitors

Every station is either an active monitor (AM) or a standby monitor (SM). Only one active monitor exists at a time. It performs key functions such as:

Token Format

The token is the shortest possible frame (24 bits). The MSB (Most Significant Bit) is always transmitted first.

Frame Format

Like the token, the MSB is always transmitted first.

Possible Errors in Token Ring Networks

1. Token Lost

The active monitor sets a timer when a token passes. If the token doesn’t return within 10 ms, the AM generates a new token.

2. Packet Circulates Without Recipient

If a destination fails, the packet loops endlessly. The AM marks the packet on first pass and deletes it if it returns unchanged, then generates a new token.

3. Faulty Interfaces

The MAU (Multistation Access Unit) can bypass faulty nodes. Neighboring stations send test frames, and faulty nodes isolate themselves. If the AM fails, token claiming occurs to assign a new AM.

Who Removes the Packet From the Ring?

There are three possibilities:

The preferred method is the first— the source removes its packet after one complete ring cycle.

Cycle Time

The time taken by a token to complete one revolution of the ring is the cycle time.

Cycle Time = Tp + (THT × N)

Token Holding Time (THT)

THT is the maximum time a station can hold the token (default: 10 ms). No station may exceed this time.

Advantages of Token Ring

Disadvantages of Token Ring