TechNote

Number: 08104-02
Date: March 1995

How Token Rings work and maintain themselves

1 Introduction

This document describes the principles of Token Ring operation and introduces the system of self-maintenance that is built into the design of Token Ring. The document begins by describing the ring topology (Section 2) and the method by which stations transmit data onto the ring (Sections 3 and 4). It then describes the main processes by which a Token Ring maintains itself (Section 5). This description introduces the Media Access Control (MAC) protocol on which the system of self-management in Token Ring depends.

The document is based on the description of Token Ring to be found in Novell's Guide to NetWare LAN Analysis by L. Chappell and D. Hakes. We recommend that you refer to this book which is cited in full in Section 6 below.

2 How Token Ring stations are connected together

The stations of a Token Ring network are connected in a ring formation, and all signals pass around the entire ring. The stations are connected one-to-another by transmit and receive cables. Figure 1 shows a Token Ring comprising six stations. Station 1's transmit cable is connected to station 2's receive cable. Station 2's transmit cable is connected to station 3's receive cable, and so on, until the ring is complete. In each case, the transmitting station is the Upstream Neighbour of the station that receives the signal. For example, station 1 is the Upstream Neighbour of station 2. The concept of the Upstream Neighbour is an important part of the ring's system for isolating problems and recovering from them (see Section 5.5). Figure 1 represents the network as a logical ring. Remember that, physically, the stations are connected in a star formation, to a central wiring concentrator.

Figure 1 Each station on a ring receives frames from its Upstream Neighbour

3 How a station transmits onto a ring

When a Token Ring station has data to transmit, it must perform the following tasks (of course, these take only milliseconds to execute):

Capture the token
To send data, the station must monitor the ring until it detects and captures the token. This is a bit-pattern which circulates on the ring until a station removes it. Because a station can only transmit when it has the token, every other station is denied access to the ring until the transmitting station releases it again.

Transmit the data
Once it has captured the token, the station transmits a data frame onto the ring. Each station on the ring repeats the frame until the transmitting station receives it back again. Each station also checks to see whether a frame is addressed to itself. If it is, that station sets the frame's Address Recognized Indicator (ARI) and Frame Copied Indicator (FCI) bits to indicate that it has received the frame. If it detects an error, it sets a bit called the Error Detected Indicator (EDI).

Strip the frame
When the frame arrives back at the transmitting station, the station removes it from the ring. This process is called stripping the frame. The station can tell from the ARI, FCI, and EDI, whether the frame arrived at its destination intact.

Release the token
When it has stripped the data from the ring, the transmitting station releases the token back onto the ring. This gives other stations the opportunity to transmit frames.

4 The concept of Early Token Release

Token Ring networks operating at 16Mbps benefit from reduced latency because they permit Early Token Release. What this means is that stations on a 16Mbps network can release the token immediately after transmitting a frame instead of waiting until they have stripped the frame. This increases the performance of the ring by enabling:

5 Self-maintenance on the ring and the role of the MAC protocol

This section describes the main processes by which a Token Ring maintains itself in operation. Each process involves communication between stations by means of the MAC protocol. The different processes constitute a self-recovery cycle which is the ring's response to breaks in communication. By means of this cycle the ring is able to isolate and recover from problems dynamically and with minimal disruption.

5.1 Monitor Contention: electing an Active Monitor

The station with the most important management role on the ring is called the Active Monitor. It is this station that starts the ring after an interruption (see Section 5.2) and that ensures that all the stations on the network know the address of their Upstream Neighbour (see Section 5.3).

The first station to join a ring detects that the ring has no Active Monitor. It then initiates a process that will produce one. This process is called Monitor Contention. (In practice, some stations can be configured not to participate in Monitor Contention.)

To initiate the process, the station transmits a MAC frame called a Claim Token frame, and it continues to do this every ten-to-twenty milliseconds (depending on the implementation of the MAC software). When a station receives a Claim Token frame whose source address is:

When a station that is releasing Claim Token frames receives back one-to-three (depending on the implementation of the MAC software) of its own Claim Token frames, it makes itself Active Monitor. In Figure 2, station 2 has the highest MAC address. Therefore, all the other stations repeat station 2's Claim Token frame until station 2 makes itself Active Monitor. Although the Active Monitor is effectively the manager of the ring, all of the stations that are configured for Monitor Contention participate in the management process. Once an Active Monitor has emerged, the other stations begin to monitor the network for evidence of a failure of the Active Monitor. Each one that is ready to initiate Monitor Contention itself is known as a Standby Monitor (see Section 5.3).

Figure 2: Monitor contention when the departing AM's downstream neighbour (station 2) has the highest MAC address and will, therefore, take over as the new AM

5.2 Ring Purges: starting the ring after an interruption

The first thing that the Active Monitor does when it emerges from Monitor Contention is to perform a Ring Purge. This means that it transmits Ring Purge MAC frames every few milliseconds until it receives one back. It then stops transmitting them, and starts the ring by releasing a token.

Whenever the Active Monitor detects that the token, or a frame, has been lost or corrupted, it performs a Ring Purge again. Once a ring is up and working Ring Purges are the first stage in its self-recovery cycle. They are normally successful because they are normally responses to temporary breaks caused, for example, by stations entering or leaving the ring. However, if a Ring Purge fails (that is, if the Active Monitor does not receive any of its Ring Purge frames back within a timeout period of approximately one second), then the Active Monitor starts Monitor Contention itself. If Monitor Contention fails to produce an Active Monitor that can start the ring up again, the station that was the Active Monitor starts Beaconing (see Section 5.5).

Figure 3: Frames are lost when station 4 leaves the ring

Figure 4: Station 1, the Active Monitor, sends Purge frames until the break disappears

5.3 Ring Polling: the neighbour notification process

After releasing the token, the Active Monitor can perform another of its ongoing management functions: every seven seconds it performs a Ring Poll. This enables all the stations on the ring to learn the address of their Upstream Neighbour (information that changes when stations enter or leave the ring). It also informs them that the ring is working properly and that there is an Active Monitor present.

To initiate Ring Polling the Active Monitor releases an Active Monitor Present frame whose Address Recognized Indicator (ARI) and Frame Copied Indicator (FCI) bits are set to 0. This indicates to the next station downstream that it is the first station to receive the frame. The receiving station, therefore, stores the source address of the frame as the address of its Upstream Neighbour. Before repeating the Active Monitor Present frame, it sets the ARI/FCI bits to 1 to ensure that all stations downstream are aware that the frame has already been received.

Having repeated the Active Monitor Present frame, the station sends a Standby Monitor Present frame whose ARI/FCI bits are set to 0. This indicates to the next station that no other station has received the frame. The receiving station, therefore, stores the source address of the Standby Monitor Present frame as that of its Upstream Neighbour. Before repeating the frame, it sets the ARI/FCI bits to 1 to ensure that all stations downstream are aware that the frame has already been received. It then sends its own Standby Monitor Present frame with the ARI/FCI bits set to 0.

The Ring Poll is complete when the Active Monitor receives a Standby Monitor Present frame whose ARI/FCI bits are set to 0. At this point all the stations know the address of their Upstream Neighbour. This helps them to isolate and recover from hardware problems on the network (see Section 5.5).

Figure 5: Station 2 stores the address of station 1 as that of its Upstream Neighbour

Figure 6: Station 3 stores the address of station 2 as that of its Upstream Neighbour

5.4 Entering the ring: tests performed by the station

Before attempting to join the ring, or in response to a Beacon frame (see Section 5.5), a station performs a lobe test. During this test, the concentrator connects the transmit and receive cables of the adapter together (which isolates it from the ring, if the lobe test is a consequence of Beaconing) and the station transmits a number of Lobe Media Check frames and a Duplicate Address Test frame. If it receives all of these back, it places a voltage on the lobe cable and when the wiring concentrator detects this, it inserts the station into the ring. The station now waits to see that the ring is working. To check this it looks for Active Monitor Present frames (see Section 5.3), Standby Monitor Present frames (see Section 5.3), or Ring Purge frames (see Section 5.2). If it has to wait more than eighteen seconds, it assumes that there is no Active Monitor present, and initiates Monitor Contention (see Section 5.1). The station also checks that no other station is using its MAC address. It does this by sending a set of Duplicate Address Test frames. If it receives two of these frames back and both have their ARI and FCI bits set to 1 (indicating that another station has received the frames), then it assumes that another station is using its address and it removes itself from the ring. Otherwise, it participates in the Ring Poll process (see Section 5.3) to learn the address of its Upstream Neighbour on the ring.

5.5 Beaconing: isolating and recovering from hardware errors

Beaconing is a process that enables the ring to isolate hardware errors. It can be initiated by any station and is another example of the distribution of network management functions in the design of Token Ring.

Any station that detects a loss of signal on its receive cable first starts Monitor Contention (see Section 5.1). If this fails, it sends Beacon frames every 20 milliseconds. In them, it identifies its Upstream Neighbour as the likely source of a problem. (When a station has not received a signal for some time, it always assumes, first of all, that the problem lies with its Upstream Neighbour.) The first consequence of Beaconing is that all activity on the network is interrupted and each station goes into Beacon repeat mode.

When the station upstream of the Beaconing station receives Beacon frames identifying it as the possible cause of a problem, it removes itself from the ring to perform a lobe test. This is a test of its transmit and receive cables and of its adapter (see Section 5.4). If the station upstream of the Beaconing station:

Figure 7 Manual intervention required between stations 1 and 6

6 Further reading