datacommchapter 5 part1
TRANSCRIPT
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 1/52
1
Chapter 5
Multiple Access Networks
Main reference: Copyright © The McGraw-Hill Companies Inc.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 2/52
2
PART 1:PART 1:
5.1: RANDOM ACCESS5.1: RANDOM ACCESS
5.2 CONTROLLED ACCESS5.2 CONTROLLED ACCESS
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 3/52
3
Introduction
Local Area Network [LAN]
- used to interconnect distributed communities of computer-
based DTEs located within a single building or localizedgroup of buildings
- also referred to as private data networks
Advantage:
i. Inexpensive and fast interconnections of minicomputers,
PCs, workstations, etc., in business, education andresearch environments
ii. Allow users to share expensive resources, such as
- repository data [e.g., file servers]
- repository knowledge [e.g., database servers]- service provider [e.g., printer, plotter]
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 4/52
4
Characteristics:
i. Moderate-size geographic area [diameter of no more than a few
km]
ii. Located within a single building or localized group of buildings
[warehouse, campus, hostel]
iii. Total data rate of at least several Mbps
iv. Complete ownership by a single organization
The link layer is divided into 2 sub layers:i. Logical link control (LLC)
ii. Medium access control (MAC)
ApplicationPresentation
SessionTransportNetwork
LLCMAC
Physical
Linklayer
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 5/52
5
Medium Access Control [MAC]
- regulates the access to the shared link
Logical Link Control [LLC]
- implements reliable packet transmission [flow and errorcontrol]
LLC sublayer was originally designed to be the same for all LAN for
interoperability
Standards- MAC: IEEE 802.3-12
- LLC: IEEE 802.2
Most common protocols
- ALOHA, Ethernet, Token Ring, WIFI
Two main classes of LANs:i. Wired LANs
ii. Wireless LANs
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 6/52
6
Main performance parameters of interest
- Throughput: maximum bit transmission rate when the
LAN is heavily loaded- Efficiency: fraction of throughput to channel rate
- Delay: typical time taken to transmit a packet
between two nodes
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 7/52
7
LAN protocols are concerned principally with lower layers of the OSI
Model.
Thus, higher-layer protocols are independent of network architectureand are applicable to LANs, MANs and WANs.
IEEE 802 LAN/MAN Standards Committee (www.ieee802.org) has
developed the IEEE 802 reference model for LAN specifications.
ApplicationPresentation
SessionTransportNetwork
Physical
Data link layer
( ) ( ) ( )
Logical link control
Medium accesscontrol
Upper layerprotocol
OSI reference model IEEE 802 referencemodel
Physical
MediumMedium
LLC serviceaccess point
[LSAP]
Scope ofIEEE 802standards
IEEE 802
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 8/52
8
The lowest layer of the IEEE 802 reference model corresponds to
the physical layer of the OSI model and includes functions:
- Encoding/decoding signal- Preamble generation/removal [for synchronization]
- Bit transmission/reception
In addition, the physical layer of 802 model also includes
specification of transmission medium and topology, as the choice of
transmission medium and topology is critical in LAN.
The data link layer in OSI model is implemented as 2 sublayers in
IEEE 802 model:
- logical link control [LLC]- medium access control [MAC]
Logical link control layer provides interface to higher layers and
perform flow and error control.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 9/52
9
Medium access control layer provides functions such as:
- assemble data into frame with address and error-detectionfields on transmission
- dissemble frame and perform address recognition and error
detection on reception
- Govern access to the LAN transmission medium
The separation is required because:- The logic required to manage access to a shared-access
medium is not found in traditional layer 2 data link control
- For the same LLC, several MAC options may be provided
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 10/52
10
IEEE 802.1 Higher Layer Interfaces
Bridging , Management , etc.
IEEE 802.2
1. Unacked CL
2. Acked CL
3. CO
NL
etc.
LLC
MAC
PHY
CSMA/CD Token BusTokenRing
TokenRing
DQDB Wireless100(Base)VG-AnyLAN
I E E E
8 0 2 . 3
I E E E
8 0 2 . 4
I E E E
8 0 2 . 5
F D D I
I E E E
8 0 2 . 6
I E E E 8 0 2 . 1 1
I E E E 8 0 2 . 1 2
U n s h i e l d e d t w i s t e d p a
i r
B r o a d b a n d c o a x i a l
O p t i c a l f i b e r
B r o a d b a n d c o a x i a l
O p t i c a l f i b e r
U n s h i e l d e d t w i s t e d p a
i r
S
h i e l d e d t w i s t e d p a i r
O p t i c a l F i b e r
O p t i c a l F i b e r
R a d i o
I n f r a r e d
S
h i e l d e d t w i s t e d p a i r
O p t i c a l f i b e r
The architecture of IEEE 802 LAN standards
CL – connectionlessCO – connection oriented
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 11/52
11
Taxonomy of multiple-access protocols
. .
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 12/52
12
5.1 RANDOM ACCESS5.1 RANDOM ACCESS
In In random access random access or or contention contention methods, no methods, no
station is superior to another station and none is station is superior to another station and none is assigned the control over another. assigned the control over another.
No station permits, or does not permit, another No station permits, or does not permit, another
station to send. At each instance, a station that station to send. At each instance, a station that
has data to send uses a procedure defined by the has data to send uses a procedure defined by the
protocol to make a decision on whether or not to protocol to make a decision on whether or not to
send. send.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 13/52
13
First Multiple Access Protocol using contention scheme
Precursor to CSMA/CD
Applicable to any shared transmission medium: radiotransmitters, coaxial cable, twisted pair or optical fiber
Two versions:
Pure ALOHA
Slotted ALOHA
Pure ALOHA is the original ALOHA
Each station starts transmitting whenever it has data to
send After transmitting a data frame, the sender expects the
receiver to send an acknowledgment.
ALOHA
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 14/52
14
If the acknowledgement does not arrive after a timeout
period, the sender assumes that the data frame has been
destroyed and resends the frame. If all stations experience collision try to resend their data
frames after the timeout period, the data frames will
collide again.
To overcome this, each station waits a random amount of
time before resending its data frame.
This random waiting time is called the backoff time (T B)
and it helps avoid more collisions. To avoid congesting the channel with retransmitted
frames, a station must give up after a maximum number of
retransmission attempts
PURE ALOHA
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 15/52
15
Frames in a pure ALOHA network
As there is only one channel to share, there is a possibility of
collision if more stations are sending at about the same time.
Due to its simplicity, the number of collisions rises rapidly withincreased load.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 16/52
16
Procedure for pure ALOHA protocol
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 17/52
17
The stations on a wireless ALOHA network are a maximum
of 600 km apart. If we assume that signals propagate at 3 ×
108 m/s, we find
T p = (600 × 10 5 ) / (3 × 108 ) = 2 ms.
Now we can find the value of T B for different values of
K .
a. For K = 1, the range is {0, 1}. The station needs to|
generate a random number with a value of 0 or 1.
This means that T B is either 0 ms (0 × 2) or 2 ms (1 × 2), based on the outcome of the random variable.
Example 1
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 18/52
18
b. For K = 2, the range is {0, 1, 2, 3}. This means that T B
can be 0, 2, 4, or 6 ms, based on the outcome of the
random variable.
c. For K = 3, the range is {0, 1, 2, 3, 4, 5, 6, 7}. This
means that T B can be 0, 2, 4, . . . , 14 ms, based on the
outcome of the random variable.
d. We need to mention that if K > 10, it is normally set to
10.
Example 1(continued)
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 19/52
19
Vulnerable time for pure ALOHA protocol
Vulnerable time is the duration with a possibility of collision
Consider 3 stations (A, B & C) with each station sending a fixed
length data frame taking transmission time T fr
Pure ALOHA vulnerable time= 2 x T fr
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 20/52
20
A pure ALOHA network transmits 200-bit frames on a
shared channel of 200 kbps. What is the requirement to
make this frame collision-free?
Example 2
Solution
Average frame transmission time T fr is 200 bits/200 kbps or 1 ms. The vulnerable time is 2 × 1 ms = 2 ms. This means no
station should send later than 1 ms before this station starts
transmission and no station should start sending during the
one 1-ms period that this station is sending.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 21/52
21
The throughput for pure ALOHA isS = G × e −2G .
The maximum throughputSmax = 0.184 when G= (1/2).
Note
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 22/52
22
A pure ALOHA network transmits 200-bit frames on a
shared channel of 200 kbps. What is the throughput if the
system (all stations together) produces a. 1000 frames per second b. 500 frames per second
c. 250 frames per second.
Example 3
SolutionThe frame transmission time is 200/200 kbps or 1 ms.
a. If the system creates 1000 frames per second, this is 1
frame per millisecond. The load is 1. In this case
S = G× e−2 G or S = 0.135 (13.5 percent). This means
that the throughput is 1000 × 0.135 = 135 frames. Only
135 frames out of 1000 will probably survive.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 23/52
23
Example 3 (continued)
b. If the system creates 500 frames per second, this is
(1/2) frame per millisecond. The load is (1/2). In this
case S = G × e −2G or S = 0.184 (18.4 percent). This means that the throughput is 500 × 0.184 = 92 and that
only 92 frames out of 500 will probably survive. Note
that this is the maximum throughput case,
percentagewise.
c. If the system creates 250 frames per second, this is (1/4)
frame per millisecond. The load is (1/4). In this case
S = G × e − 2G or S = 0.152 (15.2 percent). This means
that the throughput is 250 × 0.152 = 38. Only 38
frames out of 250 will probably survive.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 24/52
24
Frames in a slotted ALOHA network
Pure ALOHA has a vulnerable time of 2T fr as there is no rule that
defines when a station can send (stations may send at arbitrary
time)
Slotted ALOHA was invented to improve the efficiency
In slotted ALOHA, time is divided into slots of T fr each
Each station can only transmit at the beginning of the time slot
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 25/52
25
The throughput for slotted ALOHA isS = G × e−G .
The maximum throughputSmax = 0.368 when G = 1.
Note
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 26/52
26
Vulnerable time for slotted ALOHA protocol
There is still possibility of collision as two or more stations may
send in the same time slot
Nonetheless, the vulnerable time is reduced to only T frc
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 27/52
27
Efficiency ratio (ratio of throughput achieved to channel rate)
o Pure ALOHA = 0.184
o Slotted ALOHA=0.368
Both versions exhibit poor utilization as they fail to take advantage of short propagation delay (w.r.t frame transmission time) in LANs
For short propagation delay, when a station launches a frame, a;; other
station will know it almost immediately⇒CSMA
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 28/52
28
A slotted ALOHA network transmits 200-bit frames on a
shared channel of 200 kbps. What is the throughput if the
system (all stations together) produces a. 1000 frames per second b. 500 frames per second
c. 250 frames per second.
Example 4
Solution
The frame transmission time is 200/200 kbps or 1 ms.
a. If the system creates 1000 frames per second, this is 1
frame per millisecond. The load is 1. In this caseS = G× e−G or S = 0.368 (36.8 percent). This means
that the throughput is 1000 × 0.0368 = 368 frames.
Only 386 frames out of 1000 will probably survive.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 29/52
29
Example 4 (continued)
b. If the system creates 500 frames per second, this is
(1/2) frame per millisecond. The load is (1/2). In this
case S = G × e−G or S = 0.303 (30.3 percent). This
means that the throughput is 500 × 0.0303 = 151.
Only 151 frames out of 500 will probably survive.
c. If the system creates 250 frames per second, this is (1/4)
frame per millisecond. The load is (1/4). In this case
S = G × e −G or S = 0.195 (19.5 percent). This means
that the throughput is 250 × 0.195 = 49. Only 49 frames out of 250 will probably survive.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 30/52
30
CSMA is a polite version of ALOHA
With CSMA, a station wishing to transmit first listens to the medium
(carrier sense) and obeys the following rules:
1) If the medium is idle, transmit; otherwise, go to step 2
2) If the medium is busy, continue to listen for idle medium; when
medium becomes idle, transmit whole frame immediately
CSMA reduces the possibility of collision, but cannot eliminate it
Even though each station listens to the medium before transmitting,collision still exists due to propagation delay
When a frame is sent, it takes a while(though very short) for every
station to sense it
A station may sense the medium and find it idle, only because the
frame has not yet reach the station
Carrier Sense Multiple Access (CSMA)
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 31/52
31
Space/time model of the collision in CSMA
CSMA reduces the possibility of collision, but cannot eliminate it
Collision still exists because of propagation delay
At time t 1 , B senses that the
medium is idle and send a
frame.
At time t 2(t 2 > t 1), C sensesthat the medium is idle(as
the frame from B has not
arrived at C yet) and sends
a frame
Both frames collide and are
destroyed
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 32/52
32
Vulnerable time in CSMA
The vulnerable time for CSMA is the propagation time, T p (the time
time for a signal to propagate from one end to another end of the
medium)
If the first bit of the frame reaches the end of the medium, every
station will already have heard the bit and will refrain from sending Consider the worst case where A at one end is sending a frame
This frame is susceptible for collision until its first bit arrives at the
other end.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 33/52
33
Behavior of three persistence methods
Persistence Strategy defines the procedure for a station that senses a
busy medium.
Two strategies:
1) Non-persistent
o A station with frame to send senses the mediumo If the medium is idle, it sends immediately
o If the medium is busy, it waits a random time before sensing the
medium again
o Reduce the chance of collision as stations are unlikely to wait the same
amount of timeo Lower efficiency as the medium may be idle while the stations are
waiting
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 34/52
34
2) Persistento A station with frame to send senses the medium
o If the medium is idle, it sends immediately
o If the medium is busy,
a) 1-persistent- The station sends a frame immediately ( with a probability of 1) if
the medium is sensed idle
-Increase the chance of collision as 2 or more stations may send their
frames simultaneously after finding the medium idle.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 35/52
35
b) p-persistent
- The station send with probability p (i.e. may or may not send) if the
medium is sensed idle
- Reduce chance of collision and improve efficiency
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 36/52
36
Flow diagram for three persistence methods
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 37/52
37
With CSMA, the medium remains unusable for the duration of frame
transmission when two frames collide
For long frames, the amount of wasted capacity can be significant
[wasted time equal to frame transmission time]
This waste can be reduced if a station continues to listen to the
medium while transmitting [collision detection]
How to detect:
i. The station sends frame and senses the mediumii. Collision detected if
- Coax:station senses power exceeding transmitted signal
strength [maximum length must be restricted to limit
signal attenuation]
- UTP: there is signal on more than one port [sensed by
hub and collision presence signal is generated and sent
to all stations]
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 38/52
38
In CSMA/CD, a station wishing to transmit obey these rules:
i. If the station senses that the channel is idle (for 96 bit times), it
start to transmit the data frame and go to step (iii), otherwise go
to step (ii).
ii. If the channel is busy, the station waits (1-persistent) until it
senses that the channel is idle for 96 bit times and start to
transmit the frame and go to step (iii).
iii. While transmitting, it monitors the channel for possiblecollision; if it transmits the entire frame without collision, the
transmission is considered as successful.
iv. If collision is detected, the station stops transmitting its frame,
transmit a 48-bit jam signal and go to step (v)v. After aborting, the station enters an exponential backoff phase
and waits a random time before returns to step (i)
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 39/52
39
Binary Exponential Backoff
When transmitting a given frame, after experiencing the nth collision
in a row for this frame, the station chooses a value K at random from
{0, 1, 2, …2m-1}, where m = min(n, 10).
The station then waits K slot times before it attempts to transmit
1st collision waits 0 or 1 slot time2nd collision waits 0, 1, 2 or 3 slot times3rd collision waits 0, 1, 2 … 7 slot timesmth collision waits 0 … 2m-1 slot times
After 10th collision, m fixed at 10After 16th collision, frame is discarded and reportfailure to upper layer
Note: Slot time = worst-case round-trip propagation time
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 40/52
40
In the presence of collisions, the mean value of the random delay is
doubled after each collision
As congestion increases, stations back off by larger and largeramount to reduce the probability of collision
After 16 unsuccessful attempts, the station gives up and report an
error to the upper layer
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 41/52
41
CSMA/CD with exponential backoff
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 42/52
42
Collision Detection & Frame Transmission time
In CSMA/CD, the transmitting station senses the voltage levels before
and during transmissions
A collision results in a change of voltage level, and it takes time to
propagate back to the station
A station will only sense collision while transmitting; if a very short
frame is transmitted, the station might stop transmitting/sensing before
the collision signal arrives.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 43/52
43
Consider the worst case scenario :
i. At t = 0, A transmits a frame onto the medium.
ii. At t = Tp − ε, frame from A almost arrives at D.
iii. At t = Tp, D just starts to transmit frame onto medium. Itimmediately detects collision and transmit a jamming signal
iv. At t = 2Tp, A detects the collision.
Note: Tp is the end-to-end propagation time.
A B C D
t = 0
t = tp
t = 2tp
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 44/52
44
The amount of time required to detect a collision is no greater than
twice the end-to-end propagation delay
A frame must take at least 2T p to send to prevent the sender from
incorrectly concludes that the transmission was successfully
A starts to transmit frame
A has been completelytransmitted the frame
B starts to transmit frame priordetecting frame from A
Collision occurs
Collision propagates throughtthe network
A does not detect the collision
as it has finished transmission
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 45/52
45
A B
1. A starts totransmit frame 3. B starts to transmit frame
just before frame from A arrives
5. Collision propagatesthrough the network
2. A continue tosense mediumwhile transmitting
4. Collisionoccurs
6. A detects collisionand stop transmitting
7. A transmit 48-bit jam signal
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 46/52
46
A network using CSMA/CD has a bandwidth of 10 Mbps. If
the maximum propagation time (including the delays in the
devices and ignoring the time needed to send a jamming
signal, as we see later) is 25.6 µ s, what is the minimum size
of the frame?
Example 5
SolutionThe frame transmission time is T fr = 2 × T p = 51.2 µ s. This
means, in the worst case, a station needs to transmit for a
period of 51.2 µ s to detect the collision. The minimum size
of the frame is 10 Mbps × 51.2 µ s = 512 bits or 64 bytes.This is actually the minimum size of the frame for Standard
Ethernet.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 47/52
47
Major difference between ALOHA and CSMA/CD
- ALOHA: transmit as soon as there is a frame to be sent
- CSMA/CD:wait first for the channel to be idle before a frame istransmitted
Efficiency of CSMA/CD (empirical):
where
CSMA/CD will be more efficient than
- pure ALOHA for a < 0.89- slotted ALOHA for a < 0.34
a
U
51
1
+
=
timeontransmissi frame
ndelay propagatioend toend a
−−=
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 49/52
49
5.2 CONTROLLED ACCESS5.2 CONTROLLED ACCESS
In In controlled access controlled access , the stations consult one , the stations consult one
another to find which station has the right to send. another to find which station has the right to send.
A station cannot send unless it has been authorized A station cannot send unless it has been authorized
by other stations. by other stations.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 50/52
50
Reservation access method
A station needs to make a reservation before sending
data.
Time is divided into intervals.
In each interval, a reservation frame frame precedesthe data frames sent in that interval.
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 51/52
51
Select and poll functions in polling access method
All data exchanges must be made through the primary device
even when the ultimate destination is a secondary device.
The primary device controls the link; the secondary devicesfollow its instruction
8/14/2019 DataCommChapter 5 Part1
http://slidepdf.com/reader/full/datacommchapter-5-part1 52/52
52
Logical ring and physical topology in token-passing access method
The stations in a network are organized in a logical ring.
Each processor has a predecessor and a successor.
A special packet called a token circulates through the ring