Anda di halaman 1dari 77

Engineering Encyclopedia

Saudi Aramco DeskTop Standards

Token Ring LAN Design

Note: The source of the technical material in this volume is the Professional Engineering Development Program (PEDP) of Engineering Services. Warning: The material contained in this document was developed for Saudi Aramco and is intended for the exclusive use of Saudi Aramcos employees. Any material contained in this document which is not already in the public domain may not be copied, reproduced, sold, given, or disclosed to third parties, or otherwise used in whole, or in part, without the written permission of the Vice President, Engineering Services, Saudi Aramco.

Chapter : Communication File Reference: CDA20202

For additional information on this subject, contact J.S. Phillips on 874-6163

Engineering Encyclopedia

Communication Token Ring LAN Design

Content

Page

INTRODUCTION ............................................................................................................................ 1

IEEE 802.1 ISO Open Systems Interconnection ....................................................... 1 IEEE 802.2 Logical Link Control ............................................................................. 2 IEEE 802.4 Token Passing Bus ................................................................................ 2 IEEE 802.5 Token Passing Ring............................................................................... 2 IBM .......................................................................................................................... 3
TOKEN PASSING TOPOLOGY...................................................................................................... 4

Physical Ring............................................................................................................. 4 Logical Ring (Token Passing Bus)............................................................................. 5 Star-Wired Ring ........................................................................................................ 6 Star-Wired Ring Signal Path .......................................................................... 7 Concentrators............................................................................................................ 9 Multistation Access Unit (MAU) ................................................................... 9 Lobe Access Module (LAM) ........................................................................10 Controlled Access Unit (CAU)......................................................................12 Token Ring Segments...............................................................................................12
BASIC TOKEN RING PROTOCOL OPERATION........................................................................ 14

Frame Format...........................................................................................................14 Delimiters .....................................................................................................15 Access Control .............................................................................................15 Frame Control ..............................................................................................16 Destination Address/Source Address.............................................................16 Routing Information (optional) .....................................................................16 Information...................................................................................................17 Frame Check Sequence (FCS).......................................................................17 Frame Status.................................................................................................17 Controlling Network Access.....................................................................................17 Ring Monitoring.......................................................................................................19 Station Physical Addressing......................................................................................19
TOKEN RING NETWORK EQUIPMENT..................................................................................... 21

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

Content

Page

IBM 8228 Multistation Access Unit (MAU) .............................................................21 Operation......................................................................................................22 Network Integration .....................................................................................22 IBM 8230 Lobe Access module (LAM)....................................................................22 Configurations ..............................................................................................23 Operation......................................................................................................25 IBM 8230 Controlled Access Unit (CAU) ................................................................28 Operation......................................................................................................28 Network Integration .....................................................................................29 CAU/LAM Signal Path .................................................................................31 Main Ring Cable Interface.............................................................................33 Loopback Operation .....................................................................................35 Data Connector ............................................................................................36 IBM 8220 Fiber Optic Converter..............................................................................38 IBM 8209 Bridge .....................................................................................................39 LattisNet Concentrators ...........................................................................................40 System 3000 .................................................................................................40 System 5000 .................................................................................................42
NETWORK SIZE LIMITATIONS ................................................................................................. 44

Data Rate .................................................................................................................44 Cable Types .............................................................................................................44 Number of Stations ..................................................................................................45 Lobe Cable Length ...................................................................................................45 Main Ring Length.....................................................................................................46 Token Ring Using Passive Hubs ...............................................................................46 Planning Assumptions ...................................................................................46 Token-Ring Using Active Hubs ................................................................................47 Planning Assumptions ...................................................................................48 Adjusted Ring Length...............................................................................................49
TOKEN RING NETWORK CONNECTIONS................................................................................ 50

Token Ring to Token Ring Native Speed Connection ...............................................50

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

Content

Page

Token Ring to Token Ring Concentrator Connection ...............................................51 Token Ring to Token Ring Bridge Connection .........................................................52 Summary ......................................................................................................54 Basic Methods for Connecting LANs to Mainframe Computers................................55 Token Ring Native Speed Connection...........................................................56 Token Ring Gateway Connection..................................................................57
WORK AID 1: IBM EQUIPMENT USED IN A TOKEN RING LAN NETWORK ........................ 60

IBM 8228 Multistation Access Unit (MAU) .............................................................60 IBM 8230 Lobe Access Module (LAM) ...................................................................60 IBM 8230 Controlled Access Unit (CAU) ................................................................60 IBM 8220 Fiber Optic Converter..............................................................................60 Main Ring Cable.......................................................................................................60 IBM 8209 Bridge .....................................................................................................60
WORK AID 2: IBM TOKEN RING NETWORK GUIDELINES.................................................... 61 WORK AID 3. IEEE 802.05 TOKEN RING GUIDELINES ........................................................... 62

Objective..................................................................................................................62 Media Independent Physical Specifications ...............................................................62 Accumulated Jitter ........................................................................................62 Media Dependent Specifications ...............................................................................63 Concentrator Specifications......................................................................................63 Passive Concentrator ....................................................................................64 Active Concentrator......................................................................................64 Channel Design Considerations (IEEE 802.5 Annex B) ............................................64 Insertion Loss ...............................................................................................64 NIR ..............................................................................................................65 Cable Length ................................................................................................66
WORK AID 4: BAY NETWORKS CONCENTRATOR GUIDELINES ........................................ 67 GLOSSARY ................................................................................................................................... 70 BIBLIOGRAPHY ........................................................................................................................... 71

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

Content List of Figures and Tables

Page

Figure 1. Token Ring Network Topology ................................................................. 4 Figure 2. Physical Ring............................................................................................. 5 Figure 3. Logical Ring (Token Passing Bus) ............................................................. 6 Figure 4. Star-Wired Ring Connections .................................................................... 7 Figure 5. Signal Path Through a Wired-Hub ............................................................. 8 Figure 6. Token Ring Using LAMs/CAUs ...............................................................11 Figure 7. Token Ring Segments Connected via a Bridge..........................................13 Figure 8. Token Ring/IEEE 802.5 Frame Format.....................................................15 Figure 9. Token Frame ............................................................................................17 Figure 10. IBM 8228 MAU.....................................................................................21 Figure 11. IBM 8230 LAM Functional Diagram ......................................................24 Figure 12. IBM 8230 CAU and LAM Connector Configurations .............................25 Figure 13. LAM Relay Control................................................................................27 Figure 14. IBM 8230 CAU Functional Diagram.......................................................29 Figure 15. IBM MAU/LAM/CAU Network Integration...........................................30 Figure 16. CAU/LAM Signal Path...........................................................................32 Figure 17. Main Ring Primary and Backup Path.......................................................34 Figure 18. Main Ring Loopback Diagram ................................................................36 Figure 19. Data Connector ......................................................................................37 Figure 20. Data Connector Functional Diagram .......................................................38 Figure 21. IBM 8220 Fiber Optic Repeater in Loop-Back........................................39 Figure 22. LattisNet System 3000 Hub ....................................................................41 Figure 23. IBM Token Ring Network Repeaters......................................................51 Figure 24. Token Ring Bridge .................................................................................52 Figure 25. Saudi Aramco IBM Bridge Connections .................................................53 Figure 26. Token Ring Bridge Back Up Path...........................................................55 Figure 27. Token Ring Native Speed Host Computer Connection............................56

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

Content

Page

Figure 28. Unbalanced Traffic Flow Through Gateways ..........................................58 Figure 29. Host/Gateway Ring ................................................................................59 Table 1. IBM Token Ring Guidelines.......................................................................61 Table 2. System 3000/5000 Lobe Lengths ...............................................................67 Table 3. System 3000/5000 Trunk Lengths..............................................................68 Table 4. System 3000/5000 Maximum Station Count...............................................68 Table 5. System 3000/5000 Station Equivalents.......................................................69

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

INTRODUCTION The Token Ring network is the primary LAN method that is implemented by Saudi Aramco. This Module will examine the following aspects of Token Ring operation: Token Ring Topology Basic Protocol Operation Network Equipment Network Access

The Token Ring approach to networking has been in existence since the 1970s. A Token Ring LAN is a connection of point-to-point links that form a physical or logical loop or ring. The transmission technology of Token Ring LANs is digital. The prime mover behind Token Ring implementation was IBM, which selected Token Ring as their LAN of choice for desktop computing. Thus when the IEEE 802 committee began to develop a standard for LANs, considerable pressure was applied to adopt Token Ring as the standard. As discussed in CDA 202.01, the IEEE 802 committee adopted two Token Passing network standards: IEEE 802.4 for Token Passing Bus and IEEE 802.5 for Token Passing Ring applications. The IEEE 802.5 is the most common application. The standards that affect the Token Passing network protocol implementation include the following: IEEE 802.1, Open Systems Interconnection IEEE 802.2, Logical Link Control (LLC) IEEE 802.4, Token Passing Bus IEEE 802.5, Token Passing Ring IBM

IEEE 802.1 ISO Open Systems Interconnection The IEEE 802.1 standard describes the relationship among the standards and their relationship to the ISO Open Systems Interconnection (OSI) Reference Model.

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

IEEE 802.2 Logical Link Control The IEEE 802.2 standard describes the Logical Link Control (LLC) protocol. All LANs that comply with the IEEE LAN standards use the same LLC sublayer implementation. The LLC sublayer and the MAC sublayer are Data Link Layer functions. The LLC sublayer interfaces between the MAC sublayer and the higher layer protocol functions. The advantage of a common LLC sublayer is that the upper-layer protocols can be the same regardless of the kind of hardware in the network. IEEE 802.4 Token Passing Bus The IEEE 802.4 standard defines a token passing bus that uses a logical ring topology. The stations on the bus are physically connected to a bus in the same manner as Ethernet; however, each station is assigned a logical position on the bus in the form of an ordered address sequence. Each station must know the identity of the preceding and succeeding stations. IEEE 802.5 Token Passing Ring IEEE-802.5 standard defines a media access and control method for stations to access a Token Ring network when the station - (also called a lobe or node) - possesses a data frame that is called a token. A token frame constantly circles the ring passing from station to station. To transmit data, a station removes the token frame from the ring and then transmits its data. When the station has completed the data transmission, it must remove the data frame and retransmit a token frame to allow downstream stations to access the network. IEEE 802.5 states that the maximum number of stations that can be attached to a Token Ring is limited to 250; however, the actual number of stations that can be attached to a Token Ring network and the ring's size limitations are determined by the following: Media Quantity of Concentrators Distance from the stations to the Concentrator Main ring length Ring transmission speed

The Token Ring LAN transmission speed is either 4 Mbps or 16 Mbps.

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

IBM As the primary driving company behind Token Ring network usage, IBM developed its own standards to implement Token Ring networks with IBM equipment. There are differences between the IEEE and IBM standards which will be highlighted throughout this module.

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

TOKEN PASSING TOPOLOGY Token Passing rings can be constructed with different network topologies that include the following: Physical Ring Logical Ring (Token Passing Bus) Star-Wired Ring

Physical Ring A physical ring topology is a continuos cable that is formed into a circle (or ring) (Figure 1).

Figure 1. Token Ring Network Topology The ends of the cable are connected to each other. To become a member of the ring, a station must break the loop and connect itself in series with the cable break, as shown in Figure 2. The station first connects to one end of the cable break and then to the other end to complete the circle.

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

The data signal flows through a point-to-point path between the stations that are inserted into the ring. The station must contain a receiver that receives signals from the cable and a transmitter that applies signals to the cable. Because the station is in series with the broken cable ends, the station must receive and repeat each bit that appears on the cable.

Figure 2. Physical Ring

Logical Ring (Token Passing Bus) Stations do not have to be physically connected in a ring to form a Token Passing network. Some LAN topologies use a logical ring configuration (IEEE 802.4). An address mechanism is used to construct a logical ring, as shown in Figure 3.

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 3. Logical Ring (Token Passing Bus) The path that a signal takes through a logical ring is best shown by an example. If the station that is assigned address 01 has data to send, it transmits first. When station 01 has finished the transmission, it releases a token frame. When station 01 releases the token, it designates the station that is to receive the token. The station that is to receive the token is called the "target" station. In the example, the target station is address 02. The target station may take control of the media and transmit frames. When station 02 has completed its transmissions, it passes the token to the next logical station, which is station 03. In an ordered fashion, one station transmits followed by the next address in sequence. The stations may be physically attached anywhere on the network; however, the stations can only transmit in sequence. Star-Wired Ring The star-wired ring topology is the most common configuration and is used by Saudi Aramco. In a star-ring topology, all of the stations or lobes that connect to the network are wired point-topoint to a central concentrator or wiring hub (Figure 4).

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

The path that the data signal takes through a star-wired ring is best shown by an example. Data frames travel from a station along the point-to-point cable to the concentrator. In the concentrator, the data follows the ring path to the next leg of the star and then along the point-topoint cable to the attached station. As each data bit is received by a station, the station repeats the bits that are on the transmit leg of the point-to-point cable back to the concentrator. The data eventually passes through each active station by following the ring path through the concentrator and along the legs of the star until the data returns to the originating computer, which removes the data from the network.

Figure 4. Star-Wired Ring Connections

Star-Wired Ring Signal Path Information is transferred serially from one active station to the next. Each station acts as a signal repeater. One station (the source station) at a time is allowed to transmit an information frame onto the ring. The information frame circles the ring where it is received, regenerated, and repeated by each active station. (5/97)

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

The destination station copies the information as it passes and changing a status bit in the message frame indicating it was read. When the information frame arrives back at the source station that originally transmitted the information, the source station removes the information from the ring. An example of a star-wired Token Ring network is shown in Figure 5 illustrating the signal path. The NIC connects the station bus to the Token Ring network. Each station is wired point-topoint to a concentrator via a horizontal cable. The connection of the individual stations to the concentrator forms the star-wired topology.

Figure 5. Signal Path Through a Wired-Hub Inside the concentrator, the signal path is a communications ring. Frames travel from the stations along the point-to-point horizontal cable to the wired hub. There are separate transmit and receive wire pairs. The transmit pair carries the signal from the NIC to the concentrator, and the receive pair carries the signal from the concentrator to the NIC.

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

In the concentrator, the frame passes through relay contacts and then on to a ring network that is part of the concentrators internal electrical circuitry. The frame travels around the ring to the next leg of the star where the frame travels through the horizontal cable to the next active station. The NIC receives each frame on a bit-by-bit basis. The NIC stores each frame in a memory buffer. The NIC analyzes the frame to determine the frame's destination address and other information about the MAC sublayer transmission protocol. The NIC then repeats the frame bitby-bit on to the next NIC. As the NIC repeats the frame, it may alter bits within the MAC frame fields in compliance with the MAC sublayer protocol sequence. Concentrators A concentrator forms the center or hub of a star-wired Token Ring. IEEE 802.5 specifies two types of concentrators, a passive concentrator and active retiming concentrator. Both concentrator types provide the following functions: Couple stations into a ring through lobe cables to the ring trunk. Interconnect multiple trunk coupling units (TCUs) to form a concentrator to support a star-wired network topology. Support message traffic at data rates of 4 or 16 Mbps. Provide for station confirmation of TCU presence and support of station detection of an open wire condition and certain short-circuit conditions. May include ring-in and ring-out trunk attachments for the serial connection of multiple concentrators over the trunk cable.

Within Saudi Aramco, IBM networking equipment, Bay Networks - SynOptics LattisNet Concentrators, and Network Services Corporation - Bytex Hubs are used to implement token ring networks. Multistation Access Unit (MAU) A MAU is a passive concentrator that contains internal relays and wires to form a star-wired Token Ring. Many different vendors build MAUs with different port capabilities and cabling options. Many are equipped with 8 station ports and two interconnection ports (Ring In and Ring Out). MAUs can be interconnected to increase the size of the ring. The role of the MAU is to direct signals from one port to the next, bypassing those stations which are not in operation.

Saudi Aramco DeskTop Standards

Engineering Encyclopedia

Communication Token Ring LAN Design

In the event of a failure of the two links between MAUs -- Ring In and Ring Out ports -- the MAU will route the signal in the other direction, thus preserving network operations. This makes Token Ring a fault-tolerant network. Lobe Access Module (LAM) The IBM standard Token Ring concentrator is called a Lobe Access Module (LAM). A LAM is similar to a MAU, but adds network management features. A LAM will support 20 stations. To form a larger ring, a LAM interfaces to a CAU (Figure 6). After the frame has passed through each horizontal cable that is connected to the LAM, the frame passes through a cable that connects the LAM to a CAU (Note: the CAU is an optional device).

Saudi Aramco DeskTop Standards

10

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 6. Token Ring Using LAMs/CAUs

Saudi Aramco DeskTop Standards

11

Engineering Encyclopedia

Communication Token Ring LAN Design

Controlled Access Unit (CAU) The CAU is an active (powered) device that interfaces with a LAM to expand the size of a Token Ring. The CAU monitors the frame transmissions and regenerates the signal before sending it to the next station. In Figure 6, one CAU connects to another CAU to form a main ring cable network. The frame leaves the LAM and passes through the CAU to a RO connector. The RO connector is connected to the RI (Ring In) jack on another CAU. Up to 4 LAMs can be connected to one CAU for a total of 80 stations per CAU. The frame travels through the next CAU through the LAM to the NIC. After the frame passes through the last NIC, it returns to the CAU where the frame travels out of the RO jack. The RO jack connects to a main ring cable to the RI jack on the CAU where the frame originated. The frame travels through LAM and eventually the frame arrives back at the NIC that originated the frame. The originating NIC strips the frame from the network and transmits a new token frame. The token frame follows the same path through the ring. Token Ring Segments A Token Ring LAN can have several rings. In a network, each ring is called a segment. The segments can be connected together through a bridge, a router, or a fiber optic connection (Figure 7). As stated earlier, the Token Ring LAN transmission speed is either 4 Mbps or 16 Mbps Every station in the same segment must transmit at the same speed. Stations in different network segments can transmit at different speeds.

Saudi Aramco DeskTop Standards

12

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 7. Token Ring Segments Connected via a Bridge

Saudi Aramco DeskTop Standards

13

Engineering Encyclopedia

Communication Token Ring LAN Design

BASIC TOKEN RING PROTOCOL OPERATION Layer 2 of the OSI model is the Data Link Layer. The Data Link Layer is responsible for preparing the data frame for transmission over the local ring. This layer is further divided into two sublayers: the Media Access Control (MAC) sublayer and Logical Link Control (LLC) sublayer. The following basic protocol operation transactions are used in Token Ring protocol operations: MAC sublayer Defines how a station obtains access to the ring to transmit data. Controls the management of the ring's operation. Detects and reports ring error conditions to the ring error monitor. Manages how the ring recovers from error conditions. LLC sublayer Defines the protocol that is used between service access points (SAP). The SAP is the interface between two layers of protocol. Each layer of protocol must communicate with the layer above it and beneath it. SAPs are also connection points between parallel layers of protocol in an internetwork. Each bridge is either a Destination SAP (DSAP) or Source SAP (SSAP) for bridged LAN communications. Manages the logical connection between service access points. For a source station to establish a connection with another station (the destination station), the source station must first seize a token frame. The token frame bits are copied into the frame buffer by the source NIC that wants to transmit on the ring. The source NIC replaces the token frame bit sequence with a MAC frame bit sequence. The source NIC then repeats the MAC frame bits on to the ring. Frame Format The Token Ring/IEEE 802.5 frame format (Figure 8) provides the structure for the data that passes through a token ring network. Technically, there is no maximum number of bytes that can be transmitted by a token ring frame; however, to insure that one station does not take over the network, a limit is placed on the token holding time (9.1 ms). Thus at 4 Mbps, the frame size would be limited to 4,550 octets and at 16 Mbps, it would 18,200 octets. A station is not required to transmit more than one frame per token opportunity, but may continue to transmit smaller frames until the maximum octet count is reached (IEEE 802.5 4.2.4.1 - Counter, Transmitted Octets, 1995).
Saudi Aramco DeskTop Standards 14

Engineering Encyclopedia

Communication Token Ring LAN Design

SD AC ED

Empty Token (3 bytes)

SD: AC: ED: FC: FS:

Starting Delimiter Access Control Ending Delimiter Frame Control Frame Status

1 1 1 SD AC FC

2 or 6 Dest Add

2 or 6 Source Add

No limit Data

4 Checksum

1 1 ED FS

Data Frame (variable length)


Figure 8. Token Ring/IEEE 802.5 Frame Format

Delimiters The Starting and Ending Delimiters mark the beginning and end of every token ring frame. The starting delimiter is a sequence of 8 bits: J K 0 J K 0 0 0. The J and K bits are non-data bits and form a unique pattern in a differential Manchester coded data stream. The Ending Delimiter is a sequence of 8 bits: J K 1 J K 1 I E. The I or Intermediate bit is a flag where 0 = last or only frame and a 1 = intermediate or first frame. The E bit is a flag that indicates whether or not an error was detected by the receiving station, where a 0 = no error and a 1 = error detected. For data frames, a Frame Status field will be appended to the Ending Delimiter. Access Control The Access Control octet is consists of four fields, the Priority bits, Token bit, Monitor bit and Reservation bits.

Saudi Aramco DeskTop Standards

15

Engineering Encyclopedia

Communication Token Ring LAN Design

The first three bits represent the Priority where 000 = low priority and 111 = high priority. The fourth bit is the Token (T) bit, where 0 = Token frame and 1 = MAC frame. The fifth bit is the Monitor (M) bit, where 0 = initial value and 1 = Active Monitor modification. The remaining three bits are Reservation bits, where 000 = low and 111 = high.

Frame Control The frame control octet contains two fields, the first two bits represent the frame type and the remaining six bits are control bits. The Frame Type bits specify: 00 = MAC frame, 01 = LLC frame, 1X = undefined. The control bits are used in LLC frames to specify frame priority. Destination Address/Source Address The Destination Address (DA) and Source Address (SA) can be either 2 octets or 6 octets in length and identify the destination and source addresses at the MAC (segment) layer. The first bit of the address is the I/G (Individual/Group) address bit where 0 = individual and 1 = group. In 6 octet addresses, the I/G bit is replaced with a Route Information Indicator (RII) bit where 0 = RI absent and 1 = RI present. For 6 octet addresses, a second bit called the U/L (Universal/Local) address bit is also added, where 0 = universally administered and 1 = locally administered. The DA is placed in the MAC frame along with the SA. As the frame circles the ring, each NIC examines the DA field. The destination NIC's address in the MAC frame's DA field copies the frame from the network. After the destination NIC copies the frame, the NIC sets the frame copied bit in the frame to notify the source NIC that the frame was received and copied. The next NIC in the ring then repeats the frame. The frame travels through all of the NICs that are attached to the ring and eventually arrives back at the source NIC that originated the frame's transmission. The source NIC then removes the frame from the ring and replaces the MAC frame bits with token frame bits. The token then circles the network until the token frame is seized by another NIC. Routing Information (optional) The Routing Frame is used by Source Route Bridges. This field identifies the source route bridge and sements through which the frame is to be routed to reach its destination. The Routing Information field is added to the frame if the frames routing indicator bit in the source address field is set. The field is 30 octets in length.
Saudi Aramco DeskTop Standards 16

Engineering Encyclopedia

Communication Token Ring LAN Design

Information The Information contents and length are variable. The information can contain the data that is being transmitted from station to station, or other address/supervisory/ control information. For a 4 Mbps, the information field can be from 1 to 4,442 octets; for a 16 Mbps ring, the information field can be from 1 to 17,946 octets. For LLC frames, the information will begin with a header which contains the DSAP address, followed by the SSAP address, and a control field, followed by the LLC information. Frame Check Sequence (FCS) The Frame Check Sequence (FCS) field is a 32 bit (4 octet) cyclic-redundancy-check (CRC) of the Frame Control, Destination Address, Source Address, Routing Information, and Information fields. Frame Status For MAC or LLC frames, a Frame Status field is appended after the Ending Delimiter. The Frame Status field provides feedback to the sending station from the receiving station. The first and fifth bits indicate that the address of the frame was recognized. The second and sixth bits indicate that the frame was copied. All other bits are reserved for future use. Controlling Network Access Ring access is controlled by token passing. The token frame or simply the token gives one NIC permission to access the media and to transmit data. As defined above, the Access Control T or token bit, when set, identifies the token frame. The token frame is 24 bits long and is passed from one NIC to the next NIC around the ring (Figure 9).

Start Delimiter

Access Control

End Delimiter

Figure 9. Token Frame

Saudi Aramco DeskTop Standards

17

Engineering Encyclopedia

Communication Token Ring LAN Design

Access Control Field: Bits 1 - 3 = Priority bits: indicate the priority of a token and therefore, when stations are allowed to use the token. In a multiple priority system, the priorities of tokens that a station uses depend on the data to be transmitted. 000 = lowest and 111 = highest. Bit 4 = Token bit: is set to 0 in a token and 1 in a frame. Bit 5 = Monitor (M) bit: is used to prevent a token that has a priority greater than 000 or any frame from continuously circulating the ring. All frames and tokens are transmitted initially with the M bit set to 0. As a token with a priority greater than 0 or a frame is being repeated by the active monitor, the M bit is set to 1. All other stations repeat this bit as received. If an active monitor detects a token or a frame with the M bit equal to 1, it initiates the ring purge process. Bits 6 - 8 = Reservation bits: allow stations with high priority packets to request (in frames or tokens as they are repeated) that the next token be issued at the requested priority. There are eight levels of reservation 000 to 111.

The token manages NIC access to the ring. At any time, only one NIC can hold the token. The token grants that NIC the permission to send a MAC or LLC frame. A MAC or LLC frame contains the information that one NIC wants to transmit to another NIC on the ring. When no NICs have information to transmit, the NICs continually pass the token to the next NIC on the ring. When a NIC has a frame to send, the NIC takes the bits that represents the token off the ring and replaces the token with a MAC or an LLC frame. In a Token Ring LAN, permission to access the ring passes from one station to the next station through the transmission of a token frame. Any NIC may seize the token as it circles the ring. If the NICs have no frames to send, the token circles the ring until an NIC removes the token and starts to transmit a MAC or LLC frame. When many frames are being transmitted on the ring, an NIC may reserve a token frame. Several reservation levels can be established. When the NIC that seized the ring releases a new token, the frame is sent with a priority level equal to the requested reservation level. The NIC that reserved the token frame then seizes the priority token frame and transmits MAC or LLC frames. The reservation and priority schemes ensure that important data can quickly access the ring.

Saudi Aramco DeskTop Standards

18

Engineering Encyclopedia

Communication Token Ring LAN Design

Ring Monitoring Every active NIC on the ring runs a "monitor program." Two monitor programs operate on the ring: Active Monitor Standby Monitor

One NIC on the ring ensures that token frames constantly circle the ring. This NIC is called the active monitor. All other stations are standby monitors. The active monitor (only one per ring at any time) initiates the transmission of token frames and provides a token error recovery method. All other NICs on the ring operate as standby monitors. If a token does not circle the ring every few seconds, a timer in the active monitor triggers the monitor control program to transmit a token frame. The standby monitors examine the active monitor's operation. As a data frame circles the token ring, the active monitor sets the Access Control M-bit whenever the frame passes through it. If the source station should fail to remove the frame from the ring, the next time the frame passes the active monitor, it will see that the M-bit has already been set, and will remove the frame from the ring. This prevents frames from endlessly circling a ring. Since a tokens are 24 bits in length, for them to circulate properly, the ring must have at least a 24-bit time propagation delay. To insure proper ring operation, the active monitor also inserts a ring latency buffer of either 24 bits (4 Mbps Rings) or 32 bits (16 Mbps Rings). Station Physical Addressing When a NIC wants to transmit a frame to another NIC on the same ring, the NIC must know the other NIC's address. The following four address types are used on a Token Ring network: NIC Specific Broadcast Functional Group

Saudi Aramco DeskTop Standards

19

Engineering Encyclopedia

Communication Token Ring LAN Design

Every station that connects to a ring has a physical address that is specific to that NIC. The station's physical address is inserted in each MAC frame that is transmitted by the station in the MAC frame field that is designated as the source address (SA). The destination station of the frame is identified in the MAC frame in the destination address (DA) field. A broadcast frame is addressed to all of the stations on the ring. To distinguish a broadcast frame from other frames, the destination address field is set to all binary one bits (FFFFFF). In some cases, the first two octets of the DA field may not be all binary one bits. A functional address is given to a well-known network function, such as the active monitor and the error monitor. Thirty-one functional addressees can be assigned in a Token Ring network. A group address is recognized by more than one NIC. A group address may be used for functions such as file servers or printer servers. A specific manufacturer's equipment can be configured to recognize a group address. The assignment of a group address to a specific manufacturer's equipment aids a network management system to manage a specific manufacturer's hardware.

Saudi Aramco DeskTop Standards

20

Engineering Encyclopedia

Communication Token Ring LAN Design

TOKEN RING NETWORK EQUIPMENT Because the Saudi Aramco main frame computer is manufactured by IBM, the first LANs installed were based on the IBM Token Ring standards. IBM equipment in use includes: IBM 8228 Multistation Access Unit (MAU) IBM 8230 Lobe Access Module (LAM) IBM Model 1 8230 Controlled Access Unit (CAU) IBM 8220 Fiber Optic Converter IBM 8209 Bridge

Many Saudi Aramco networks have implemented the Bay Networks (SynOptics) LattisNet Concentrators has their central hubs. These include: LattisNet System 3000 LattisNet System 5000

IBM 8228 Multistation Access Unit (MAU) The IBM 8228 MAU is a passive unit that is equipped with 8 data connectors. The IBM 8228 cannot be controlled by a CAU. A diagram of an IBM 8228 MAU is shown in Figure 10.

Figure 10. IBM 8228 MAU

Saudi Aramco DeskTop Standards

21

Engineering Encyclopedia

Communication Token Ring LAN Design

Operation The IBM 8228 is equipped with eight data connectors that interface to lobe cables. RI and RO connectors are provided on the front panel to interconnect MAUs. The NIC in the station device uses the 4-wire transmit/receive circuit to supply DC current to the relays or ports found in the MAU. When a connection station is turned off, or simply not functioning, the NIC is unable to supply the DC current to its relay. This results in the MAU port being bypassed, maintaining ring continuity. When a station is powered-on, the NIC begins supplying DC current. This causes the relay in the MAU to change states and makes the station part of the ring allowing the station to transmit and receive messages. This type of power supply is sometimes referred to as Phantom Powering. When passive MAUs are first installed, they need to be initialized. This requires the use of a special initialization tool to set the correct state of the electronic relays in the MAU. Network Integration The IBM 8228 interfaces to STP cables (Type 1 and Type 2) on the lobe cable ports and on the RI and RO ports. The RI and RO ports only interface to Type 1 STP cable that is equipped with data connectors. 8-pin modular connectors cannot be used for the RI and RO interconnection between the IBM CAUs or IBM 8228s. To interface an IBM 8228 to a fiber optic main ring cable, an external fiber optic converter must be attached to the RI and RO ports. IBM 8230 Lobe Access module (LAM) LAMs provide Token Ring network management capabilities that are not available in MAUs. Within Saudi Aramco, LAMs are typically always installed as a LAM/CAU combined unit. The purpose of the LAM is to provide a method to manage NIC access to the network and to detect and to isolate network faults. The IBM Corporation 8230 LAM that is used in the Saudi Aramco network has 20, 8-pin modular lobe cable connectors. Each LAM is wired to a CAU. When the term "CAU" is used to describe both the CAU and LAM functions, then the CAU itself is called the "wiring concentrator base unit."

Saudi Aramco DeskTop Standards

22

Engineering Encyclopedia

Communication Token Ring LAN Design

Four LAMs can be wired to a single CAU. Figure 11 shows a diagram of a CAU and LAM. A relay is attached to each lobe cable port, to the CAU-to-LAM interconnection port, and to the workstation access ports. The relay controls the NIC's access to the network, and it controls the insertion and removal of the CAU or LAM from the ring. An electronic ring is located inside the LAM that connects the lobe cable ports. A similar electronic ring is installed in the CAU. By opening and closing the relay contacts, devices can be inserted into the ring and removed from the ring. Configurations The IBM Corporation manufactures several versions of the LAM as shown in Figure 12. In two implementations, the LAM is equipped with 8-pin modular connectors. Another version of the LAM has data connectors. The LAM connects lobe cables to the main ring through the CAU. Up to four IBM 8230 LAMs can attach to a single IBM CAU. Saudi Aramco uses LAMs that are equipped with data connectors. The IBM Corporation produces a LAM that uses 8-pin modular connectors, which are not used at Saudi Aramco. The 8230 8-pin modular LAM supports 4 Mbps. transmission when media filters are used on Type 3, Category 3, 4, or 5 UTP cable. 16 Mbps transmission is supported by this LAM when media filters are used on Type 3, Category 4 or 5 UTP cable. The 8230 16/4 unshielded media lobe attachment module can be used with a CAU (Model 2) to support 4 Mbps and 16 Mbps transmission. When filters are used, Token Ring transmission can be supported on Category 3, 4, or 5 UTP cable. The IBM Corporation does not classify this cable as Type 3, but instead identifies the cable as simply UTP cable. This LAM also uses 8-pin modular connectors. The 8230 LAM with data connectors can support both 16 Mbps and 4 Mbps transmission on STP cable. This model LAM can interface with Type 1 and Type 2 STP cable.

Saudi Aramco DeskTop Standards

23

Engineering Encyclopedia

Communication Token Ring LAN Design

(5/97) Figure 11. IBM 8230 LAM Functional Diagram

Saudi Aramco DeskTop Standards

24

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 12. IBM 8230 CAU and LAM Connector Configurations Operation A LAM can have two modes of operation: active or passive. An active LAM contains amplifiers or repeaters on the lobe cable ports. The active unit adds circuitry to the lobe cable that amplifies and retimes the Token Ring LAN signals. The circuitry is called an amplifier or repeater. The IBM Corporation identifies the active LAM as an 8230 16/4 Unshielded Media LAM. The purpose of the amplifier is to increase the amplitude of the signal that is passed across the lobe cable and to retime the bits to remove signal jitter. The additional circuitry that is incorporated in this type of LAM allows it to support a 16 Mbps Token Ring network over UTP wiring.

Saudi Aramco DeskTop Standards

25

Engineering Encyclopedia

Communication Token Ring LAN Design

A passive LAM does not have an amplifier or a repeater on the lobe cable ports. The IBM Corporation identifies the passive LAM as an 8230 8-pin modular LAM. Passive LAMs are used in the Saudi Aramco network. In another implementation, the LAM is equipped with genderless data connectors. These connectors are used with STP cables. The IBM Corporation builds a passive LAM that uses the data connector. No active LAMs are available with data connectors. The passive and active LAM can operate at both 4 Mbps and 16 Mbps. The function of the LAM's access relay is to manage the NIC's access to the Token Ring network. Figure 13 shows how the relay interfaces the lobe cable to the main ring cable. The relay in the LAM controls the insertion of the station into the ring. The relay may be in either a bypass mode in which the station is not attached into the ring, or it may be in an insert mode in which the station is inserted into the ring. The station controls the relay by the application of a dc voltage to the lobe cable pairs. When the dc voltage is applied to the wire pairs, the relay is activated and the station is inserted into the ring. When the dc voltage is removed, the station is placed in bypass mode. The activation and deactivation of the relay opens and closes the relay contacts.

Saudi Aramco DeskTop Standards

26

Engineering Encyclopedia

Communication Token Ring LAN Design

(5/97) Figure 13. LAM Relay Control

Saudi Aramco DeskTop Standards

27

Engineering Encyclopedia

Communication Token Ring LAN Design

In a bypass mode, the signals that appear on the electrical ring in the LAM do not travel down the lobe cable to the NIC; they bypass the lobe cable port, and pass on to the next lobe cable port on the ring. In the insert mode, the signals flow through the lobe cable to the PC. The relay contacts can be either "open" or "closed." IBM 8230 Controlled Access Unit (CAU) The IBM 8230 CAU is a wiring concentrator that is used to expand Token Ring networks. The IBM 8230 CAU consists of a base unit and up to four LAMs. Operation The CAU's purpose is to provide network test and management functions for the LAMs. The CAU interfaces to the LAN network management program and the LAN station manager program. These programs run on a PC. The programs interface to a processor in the CAU that controls the relays on the various access ports. Each LAM access port and the RI and RO ports are connected through relays to the electronic ring in the CAU. When the relay is activated, the port is attached to the ring. When the relay is deactivated, the port is removed from the ring. The programs enable the CAU to perform the following maintenance and control functions: To remove NICs from the ring and to insert NICs into the ring. To detect transmission errors on lobe cable ports in the LAM and on ring segments that attach to the CAU. To determine the operational status of each CAU, LAM, and lobe cable port. To allow the network to be reconfigured to circumvent network faults. To isolate faulty stations.

A functional diagram of a CAU is shown in Figure 14. The figure depicts a single active LAM that is attached to the CAU. The relay contacts for the one LAM access port are in an active mode and the LAM is inserted into the ring by the relay contacts. No other LAM is active; therefore, the other LAM access ports are in a bypass mode. No other CAU is attached to the RI and RO ports so they are in a bypass mode.

Saudi Aramco DeskTop Standards

28

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 14. IBM 8230 CAU Functional Diagram

Network Integration The CAU integrates into the Token Ring network through two main ring access ports that are called the RI port and the RO port. The RI and RO ports support fiber optic connections and Type 1 STP cable. The RI and RO ports are plug-in adapters that can be changed to interface with the best media for the network application. The RI and RO ports can interface with Type 1 STP cables. In this application, the RI and RO ports are equipped with data connectors and each port has a built-in repeater. The RI and RO repeaters perform the same functions as the repeaters that are used to interface with lobe cables in active LAMs. In networks where a fiber optic main ring cable connection is used, IBM 8220 optical fiber converter modules are plugged into the RI and RO ports. The IBM 8220 fiber optic converter can transmit signals up to 2,000 meters. Figure 15 is a block diagram that shows how the LAM, MAU and CAUs can be integrated into a Token Ring network. The 8230 CAU is wired directly to the LAM. Multiple 8230 CAUs can be connected by a main ring cable that connects to the RI and RO ports on the CAUs.

Saudi Aramco DeskTop Standards

29

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 15. IBM MAU/LAM/CAU Network Integration

Saudi Aramco DeskTop Standards

30

Engineering Encyclopedia

Communication Token Ring LAN Design

Type 1 or Type 2 STP cable can be used to interconnect the CAUs. Fiber optic cable can also be used for the main ring connection. Workstations that consist of a PC and an NIC are attached to the LAM through a lobe cable. The main ring cable can attach to CAUs and MAUs. The MAU is used to attach NICs to the network in the same way that a LAM is used. The difference between the two devices is that the LAM can be controlled by the CAU to manage the lobe connections and the MAU cannot. The MAU is a simple lobe attachment device that does not provide any network management functions that are similar to the CAU and LAM combination. CAU/LAM Signal Path Figure 16 is a block diagram of PC nodes, CAUs, and LAMs that are wired together to show a normal network signal path. To trace the signal path through the network, the arrows that are shown in the Figure should be followed. Node 1 is the Token Ring active monitor. The active monitor transmits timing bits through the ring. All of the other nodes on the ring receive the bits and retransmit them on to the next node. The bits continually circle the ring. The timing bits are sent by the transmitter (TX) on the Active Monitor's NIC, node 1. The timing bits travel down the lobe cable to the LAM. In the LAM, the timing bits circle the electrical ring. Because the LAM is attached to a CAU, the timing bits travel through the CAU/LAM connection cable to the CAU's electrical ring. The bits circle the CAU's electrical ring and eventually end up on the RO port. A data connector with Type 1 cable is plugged into the RO port. The timing bits flow through the Type 1 cable to the RI port of the next CAU and through the next CAU's electrical ring to the LAM's electrical ring. The timing bits circle the ring and flow down an active lobe cable port to the NIC's receiver (RX). The NIC's receiver retimes and regenerates the timing bits and transmits (TX) the timing bits back down the lobe cable to the LAM. The timing bits again flow through the LAM's electrical ring to the next activated lobe cable port. The timing bits then flow down the lobe cable to the NIC where they are again retimed, regenerated, and transmitted back down the lobe cable to the LAM. The timing bits flow through the LAM's electrical ring to the CAU and through the CAU to the RO port. A data connector is plugged into the RO port. The timing bits flow through the data connector and Type 1 cable to the RI port on the first CAU in the ring. The timing bits flow through the CAU's electrical ring to the LAM. In the LAM, the timing bits circle the LAM's electrical ring to the first active lobe cable port.

Saudi Aramco DeskTop Standards

31

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 16. CAU/LAM Signal Path

Saudi Aramco DeskTop Standards

32

Engineering Encyclopedia

Communication Token Ring LAN Design

The timing bits flow through the lobe cable to the receive side of the NIC. The NIC retimes and regenerates the bits and transmits them back down the lobe cable to the LAM. The timing bits flow through the LAM's electrical ring to the next active lobe cable port. The timing bits flow down the active lobe cable port to the receive port of the active monitor's NIC where the bits are received and then extracted from the network. Main Ring Cable Interface The main ring cable interfaces a LAM to the IBM 8230 CAUs through the RI and RO connectors. The main ring cable consists of two wire paths: a primary path and a back-up path. The primary path is used to carry signals from the RO port on one CAU to the RI port on the next CAU. The back-up path is used when a loopback has been placed in the main ring. When a loopback is in place, the Token Ring signal travels through the main ring cable over the primary path to the loopback and then back through the cable over the backup path. Figure 17 shows the main ring's primary path and backup path.

Saudi Aramco DeskTop Standards

33

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 17. Main Ring Primary and Backup Path

Saudi Aramco DeskTop Standards

34

Engineering Encyclopedia

Communication Token Ring LAN Design

Loopback Operation The CAU's operation is controlled by the LAN network manager and the LAN station manager programs. The LAN network management program controls the RI and RO port operation. The program can place the RI and RO ports in a wrap mode and an unwrap mode. The IBM Corporation uses the term wrap to mean loopback. In a wrap mode, a CAU automatically wraps transmission back on itself (loops back the signal), and thereby removes itself from the ring. If both the RI and RO ports are wrapped, then the CAU is removed from the ring; however, if just one port is wrapped, the CAU can remove defective ring sections from the network. The CAU's ability to wrap signals at the RI and RO ports allows the network manager to isolate defective network sections and to remove from the main ring defective components. In an unwrap mode, the CAU is attached to the main ring cable. Figure 18 shows a block diagram of PCs, CAUs, and LAMs that are wired together in a network loopback configuration. The cable that connects CAU 1's RO port to CAU 2's RI port is defective. To restore network operation, the defective cable is unplugged from CAU 1 and CAU 2. When the cable is unplugged, the shorting bar in the data connectors on the RI and RO ports on the CAU connect the transmit and receive paths, which loop back the main ring cable path. With the loopback in place, when the timing bits arrive at CAU #1's RO data connector, they are looped back by the data connector, and they flow through the backup path. The data bits flow through the backup path and out the RI port on CAU 1 to the RO port on CAU 3. The data bits flow through the back-up path in CAU 3 to the RI port and to the RO port on CAU #4. The data bits flow through the backup path in CAU 4 to the RI port and along the cable to the RO port in CAU 2. The signal flows through CAU 4's backup path to the lobe cable ports and then back through the network. In CAU 3, one LAM is attached to the ring. The signal flows to the LAM and to the workstation that is attached to port 1. The data bits pass through the workstation NIC where they are retimed and regenerated. (5/97) The loopback that is created by the removal of ring cable between CAU 1 and CAU 2 place the ring in a loopback mode. The loopback restores the continuity of the ring's signal path.

Saudi Aramco DeskTop Standards

35

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 18. Main Ring Loopback Diagram

Data Connector The IBM 8230 CAUs and IBM 8228 MAUs, and some IBM 8230 LAMs, use a data connector for the main ring cable because it has a built-in loopback. When the data connector is unplugged from an RI or RO port, a shorting bar that is inside of the connector connects the transmit pins to the receive pins, which creates a loopback in the cable (Figure 19).

Saudi Aramco DeskTop Standards

36

Engineering Encyclopedia

Communication Token Ring LAN Design

When the data connector is not plugged into another data connector, the transmit wires in the connector are automatically shorted to the receive wires through a shorting bar, as shown in Figure 20. The transmit wires (TX) are colored black and orange. The receive wires (RX) are colored red and green. The shorted wires create a loopback in the cable. When two data connectors are connected together, the shorting bar is removed and the transmit and receive wires are connected straight through. The shorting bar creates the loopback.

Figure 19. Data Connector

The benefit of a loopback is that it can be used to quickly remove defective segments from the network. A defective network segment can be quickly removed by unplugging the data connectors from the RI and RO ports on a CAU or MAU. When the data connectors are unplugged from the port, the shorting bar in the data connector automatically creates a back-up path for the main ring, which restores transmission path continuity.

Saudi Aramco DeskTop Standards

37

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 20. Data Connector Functional Diagram

IBM 8220 Fiber Optic Converter An IBM 8220 fiber optic converter can be installed in an IBM 8230 CAU to increase the network coverage area. The IBM 8220 can transmit fiber optic signals 6,500 ft (2,000m) over two fiber optic pairs. The IBM 8220 fiber optic converter can operate at either 4 Mbps or 16 Mbps. In the Saudi Aramco Token Ring network, the equipment operates at 16 Mbps. The IBM 8220 fiber optic converter has the following features: Automatically loops-back the main ring signal to the back up path if the main ring signal is lost, if the unit loses AC power, or if the unit fails a self test. Resumes normal operation when the fault is resolved. Contains intelligence to actively participate in Token Ring diagnostic tests.

As shown in Figure 21, if a fault occurs and the fiber optic link is between two IBM 8220 units fails, the units will automatically loop-back the main ring to the back up path to restore the transmission path. A similar back up arrangement occurs if an ac power is disrupted or if the IBM 8220 fails a self test.

Saudi Aramco DeskTop Standards

38

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 21. IBM 8220 Fiber Optic Repeater in Loop-Back

IBM 8209 Bridge The IBM 8209 Bridge is used within Saudi Aramco to link Token Ring segments, and can also perform Token Ring to Ethernet translational bridging. IBM uses source route bridging for its Token Rings. Each LAN ring is assigned a unique number. A station sends out an all-routes broadcast frame and requests information on the address of the station that will receive the packet. Each ring adds its number to this all-routes broadcast frame and forwards it on. The destination station receives this frame and sends it back to the transmitting station. The frame now includes a complete set of routing directions, including which rings must be crossed to reach the destination address. Because Ethernet LANs use the spanning tree approach to networking through bridges (where the bridge collects and stores the routing information). If the IBM 8209 is used as a translational bridge, it must divide a token ring packet into smaller Ethernet compatible packets, and reconcile the two routing methods.

Saudi Aramco DeskTop Standards

39

Engineering Encyclopedia

Communication Token Ring LAN Design

LattisNet Concentrators The Bay Networks (SynOptics) LattisNet System 3000 and 5000 Concentrators are used in Saudi Aramco to provide a central control point for network connectivity, internetworking and network management in a star topology network. System 3000/5000 hubs can simultaneously integrate Ethernet, Token Ring, and FDDI. System 5000 chassis will also support Asynchronous Transfer Mode (ATM) modules. The chassis provides power and a connecting backplane for host modules and Network Management Modules (NMMs). (5/97) System 3000 The System 3000 supports large high density networks. The equipment chassis has 12 slots (the SR model has 9 slots) that accommodate a combination of host modules, bridges and routers, and NMMs. It can be mounted in a 19-inch equipment rack or left on a table-top (Figure 22). Configuration options include: Ethernet connections only and a power supply Ethernet and Token Ring connections and a power supply Ethernet and Token Ring connections, redundant power supplies, and a summing module. Ethernet, Token Ring, and FDDI connections and a power supply. Ethernet, Token Ring, and FDDI connections, redundant power supplies and a summing module.

System 3000 products use the following number convention: CSMm Where: C is the hub type (3), S is the LAN or network type, M is the module type, and m is the media type.

Saudi Aramco DeskTop Standards

40

Engineering Encyclopedia

Communication Token Ring LAN Design

LattisNet

Figure 22. LattisNet System 3000 Hub

Token Ring backplane - can support two independent Token Ring networks (4 Mbps or 16 Mbps). The Token Ring networks operate independently or connect together to form a single interconnected Token Ring network through the use of bridges, routers, or RI/RO modules. Token Ring modules - support Token networks operating at 4 Mbps or 16 Mbps and are available in the following configurations: Passive host module with 12 ports for connecting STP or UTP cable. Active retiming host module with 6 ports for connecting FO cable. Active retiming host module with 12 ports for connecting STP or UTP cable.

Saudi Aramco DeskTop Standards

41

Engineering Encyclopedia

Communication Token Ring LAN Design

Token Ring Repeater Modules extend Token Ring networks by regenerating signals passing between hubs. Repeater modules provide RI/RO connections from the System 3000 hubs. The following Token Ring repeater modules are available: RI/RO connections for STP trunk cable RI/RO for FO trunk cable

Bridge and Switch Modules. Bridge modules connect Token Ring networks to form larger networks. Switch modules allow parallel data exchanges to take place simultaneously. Multimedia Router Modules. Router modules can connect Token Ring networks to a WAN. Because most routers connect devices of differing media types together, they are often referred to as multimedia routers. A multimedia router can route Ethernet, Token Ring, and FDDI networks simultaneously Network Utility Server Module - lets you integrate distributed communications services, such as multiprotocol routing, SNA gateway connectivity, and system-level management capabilities. System 5000 System 5000 is designed to be the network control system installed in network centers or highend wiring closets. The network center provides a central point for uniting multiple System 3000 or distributed System 5000 hubs located in different wiring closets. The System 5000 connects Ethernet, Token Ring, FDDI and ATM segments to centralized resources, such as servers or routers. Reliability is ensured with the System 5000 hub feature set, which includes redundant power supplies, redundant port connections, and redundant retention of configurations. A System 5000 can support 12 Ethernet segments, 9 Token Rings, and 2 FDDI networks. In organizations where advanced Network Management is less important, the number of segments and rings supported by a single System 5000 chassis increases to a maximum of 52 Ethernet segments, or 26 token rings.

Saudi Aramco DeskTop Standards

42

Engineering Encyclopedia

Communication Token Ring LAN Design

Available in several versions, the System 5000 chassis requires a supervisory module and a power supply, and offers a choice of connections: Ethernet only Ethernet and Token Ring Ethernet, Token Ring, and FDDI

Token Ring Host Modules - are available with the following features: Passive host module with 24 ports for connecting STP or UTP cable. Per-port active retiming with 24 ports for connecting STP or UTP cable. Per-port active retiming and per-port ring selection capability with 20 ports for connecting STP or UTP cable. Three independent clusters. Two clusters have fully retimed copper RI/RO trunk ports and three active-retiming lobe ports for connecting STP or UTP cable. One cluster has a single active retiming port switchable to any ring or onboard cluster. Three independent clusters. Two clusters have fully retimed fiber RI/RO trunk ports and three active-retiming lobe ports for connecting STP or UTP cable. One cluster has a single active retiming port switchable to any ring or onboard cluster.

Saudi Aramco DeskTop Standards

43

Engineering Encyclopedia

Communication Token Ring LAN Design

NETWORK SIZE LIMITATIONS Elements that affect network sizing are: Data rate Cable type Quantity of stations Maximum lobe cable length Main ring cable length Passive or active hubs

The guidelines that are established by the concentrator manufacturer must also be considered to determine the network size limitations. The IBM guidelines that should be used to determine the network configuration for the installation of IBM 8230 CAUs are shown in Work Aid 2, Table 1. The IEEE 802.5 network size limitations are shown in Work Aid 3. The Bay Networks network size limitations are shown in Work Aid 4. Data Rate The data rate is the Token Ring network's bit transmission speed, which is either 4 Mbps or 16 Mbps. The data rate has a significant impact on the number of stations that can be attached. Cable Types Shielded Twisted Pair (STP), Unshielded Twisted Pair (UTP), or Fiber Optic (FO) cable can be used to construct a Token Ring network. However, media cannot be intermixed in the same ring segment. IBM identified STP cable as Type 1 and UTP cable as Type 3. ANSI/EIA/TIA further defined UTP cable into categories (Cat) is also shown in the guidelines. Saudi Aramco uses the AT&T SYSTIMAX SCS 1061 cable which exceeds the EIA/TIA Category 5 requirements and support 16 Mbps transmission.

Saudi Aramco DeskTop Standards

44

Engineering Encyclopedia

Communication Token Ring LAN Design

The inductance and capacitance effects in a twisted pair cable distort the signal and attenuate the signal. Signal attenuation means that the signal amplitude becomes smaller as it travels down a wire. As the length of the wire increases, the amount of signal attenuation also increases. Lower frequency signals suffer less signal distortion and attenuation in a twisted wire pair cable than do higher frequency signals. A 16 Mbps signal will be more distorted and more severely attenuated than a 4 Mbps signal. Crosstalk also adversely impacts transmission through twisted wire pairs in Token Ring networks. In a Token Ring network, crosstalk can generate bit errors that can cause the Token Ring protocol to fail. Number of Stations Several deviations exist between the IEEE 802.5 standards and the IBM Token Ring standards. The quantity of stations supported will be a function of the data rate and media, as well as the manufacturers equipment. The IEEE 802.5 standard states that a maximum of 250 stations on a ring is possible, and the IBM standard states that up to 260 nodes can be supported on a ring when using STP cable. When UTP cable is used, the maximum is 132. Equipment manufacturers will also state how many stations their equipment will support based on the type of media used. For example the LattisNet 3xxx/5xxx System Concentrators will support up to 132 stations using UTP cable and 250 stations using STP cable. Installation of more than the specified maximum number of stations on a segment causes clock jitter problems that result in bit errors. Excessive bit errors cause a ring failure. Each time a protocol failure occurs, the Token Ring protocol must go through a ring recovery process. The ring recovery protocol transactions are time-consuming and impact the network's operating speed. Lobe Cable Length The lobe cable length indicates how far the workstation can be located from the LAM. The maximum lobe length is determined by the type of cable that is used. The general rule for UTP cable is 100 meters (328 ft). The cable length is an important electrical signaling constraint to be considered when a Token Ring segment is designed. The transmitted NIC signal must be able to travel down the lobe cable to main ring cable, or via horizontal wiring to a concentrator (star-wired configurations), and then through another cable to the next NIC.

Saudi Aramco DeskTop Standards

45

Engineering Encyclopedia

Communication Token Ring LAN Design

The signal must pass through the entire cable run without amplification. The signal must arrive at the NIC at a sufficient level to be detected and decoded. If the signal arrives at the next station with a level so low that the signal cannot be recovered, then data cannot be successfully transmitted between the two NICs. Main Ring Length The main ring cable's distance is determined by the type of cable used. For fiber optic transmission, this can be up to 2 km. Token Ring Using Passive Hubs As stated above, a Token Ring network which uses passive hubs to link stations can have a theoretical maximum of 250 (IEEE) or 260 (IBM) attached devices using STP cable and 132 devices using UTP. However, this number is typically much lower in most installations for performance reasons. In a ring where passive hubs are used, the attached stations or devices perform the function of signal repeaters, not the hubs. Therefore the total length of cabling separating any two stations has a maximum limit to avoid excess signal loss. As well, the length of the overall ring has a maximum limit. A sending device will require an acknowledgment of receipt in a given time frame, otherwise it will assume the message has been lost and trigger an error condition. It should be noted that although the overall ring length may be a larger value, the length of cable from the distribution panel in the telecommunications closet to the outlet in the work area should not exceed 100 m (328 ft). While exceptions exist, configurations exceeding this length may impede future system growth. Planning Assumptions Certain assumptions are made when designing Token-Ring networks. These assumptions vary according to the type of Token Ring network being designed. For example the ring will vary as a function of the number of devices to be connected, the type of hubs being used - passive or active - and the number of telecommunications closets covered by the overall ring.

Saudi Aramco DeskTop Standards

46

Engineering Encyclopedia

Communication Token Ring LAN Design

The following are the assumptions made when designing a single ring with passive hubs where all these MAUs are located in a single telecommunications closet: The number of hubs is equal to the number of stations to be attached to the ring divided by the number of ports in a single hub. In the case of an 8 port MAU, this number will be 8. Including additional hubs should be considered for future growth A single ring operating at 4 Mbps is capable of supporting a maximum of 33 eight-port MAUs distributed over a maximum of 10 racks. A single ring operating at 16 Mbps is capable of supporting a maximum of 17 eight-port MAUs distributed over a maximum of 2 racks. The number of devices to be attached to the network and the calculation of the maximum allowable Lobe Length is dependent on the following assumptions regarding the cabling system: There is one 2.45 m (8 ft) cable between the attaching devices and the telecommunications outlet at the work area. The patch cables used to connect the MAU to the distribution panel are 2.45 m (8 ft) in length. The patch cables used to connect MAUs located in the same equipment rack are 2.45 m (8 ft) in length. The patch cables used to connect MAUs located in different equipment racks are 9 m (30 ft) in length. Calculations are based on Type 1 or Type 2 cables. It should be noted that these assumptions will change given different requirements -- for example, if the MAUs are distributed throughout multiple telecommunications closets or a different type of cabling is used. Token-Ring Using Active Hubs A Token Ring network which uses active hubs -- CAUs and LAMs -- in a single telecommunications closet to link stations can have a maximum of 245 attached devices, using either STP or UTP cabling. The maximum Lobe Length for 4 Mbps ring is 375 m (1230 ft) and for a 16 Mbps ring it is 145 m (478 ft).

Saudi Aramco DeskTop Standards

47

Engineering Encyclopedia

Communication Token Ring LAN Design

It can be concluded that by following the 100 m (328 ft) structured cabling recommendations for horizontal cabling, Token Ring networks operating at either 4 or 16 Mbps can be implemented using active hubs with exceeding the maximum distance restrictions. Planning Assumptions The following are the assumptions made when designing a single ring with actives hubs (CAUs), where all these CAUs are located in a single telecommunications closet: The number of LAMs used is equal to the number of stations to be attached to the ring divided by the number of ports in a single LAM. In the case of a CAU, this number will be 20. One CAU per four LAMs. Including additional hubs should be considered for future growth A single ring operating at 4 or 16 Mbps is capable of supporting as many hubs as are required to attach stations. A maximum of 245 stations can be supported on one ring. The number of devices to be attached to the network and the calculation of the maximum allowable Lobe Length is dependent on the following assumptions regarding the cabling system: There is one 2.45 m (8 ft) cable between the attaching devices and the telecommunications outlet at the work area. The patch cables used to connect the hub to the distribution panel are 2.45 m (8 ft) in length. The patch cables used to connect hubs located in the same equipment rack are 2.45 m (8 ft) in length. The patch cables used to connect hubs located in different equipment racks are 9 m (30 ft) in length. Calculations are based on Type 1 or Type 2 cables. It should be noted that these assumptions will change given different requirements, or if the hubs are distributed throughout multiple telecommunications closets, or if different media is used.

Saudi Aramco DeskTop Standards

48

Engineering Encyclopedia

Communication Token Ring LAN Design

Adjusted Ring Length To calculate the total ring length, the lengths of all of the cables between wiring closes connecting MAUs to one another are added. From this value, the length of the shortest cable in the set is subtracted and the resulting number is referred to as the Adjusted Ring Length (ARL). ARL = Combined length of all connecting cables - Length of shortest cable The ARL adjustment is to ensure that in the event of a link loss between MAUs, the token will be able to wrap around and complete its circuit using the longest possible backup ring path. Next, maximum Lobe Length -- the distance between any station on the ring and its corresponding MAU -- can be obtained by consulting vendor documentation. Token Ring equipment vendors provide sets of tables which illustrate the maximum Lobe Length given an Adjusted Ring Length for 4 or 16 Mbps rings using either STP or UTP cabling systems. Since each vendor acts independently, the values presented vary from one vendor to another. Lobe Length will be analyzed in greater detail in module CDA 202.05.

Saudi Aramco DeskTop Standards

49

Engineering Encyclopedia

Communication Token Ring LAN Design

TOKEN RING NETWORK CONNECTIONS Token Ring networks can be interconnected using a repeater, bridge, or router. Repeaters are used in a Token Ring network to increase the area that is served by the network. Token Ring repeaters interconnect LAN segments at the native operating speed (4 Mbps or 16 Mbps) of the LAN. Bridges interpret the data link layer frame information and forward packets based on the destination address that is contained in the frame. Bridges that interface to Token Ring networks can use the following routing schemes: Transparent Bridging Source-Route Bridging Source-Route Transparent Bridging

Token Ring bridges can make direct LAN-to-LAN interconnections or two bridges can be configured to interconnect two LANs through a wide area network (WAN) connection. Routers interface Token Ring segments with the remainder of a network. Routers analyze the LLC address information and determine the best path to the final destination. Routers can also perform protocol conversion to link Token Ring segments operating at different speeds and link different LAN types, e.g. Token Ring and Ethernet. Token Ring to Token Ring Native Speed Connection The following repeaters can be used to interconnect Token Ring segments: Twisted Wire Pair Repeater Fiber Optic Repeater

Both repeater types operate at the physical layer of the OSI Model. Repeaters link two LAN segments at their native speed. The LAN's native speed is the baseband signal speed. Token Ring repeaters can interconnect ring segments that operate at native speeds of either 4 Mbps or 16 Mbps. The two ring segments that connect through a repeater must operate at the same speed. Twisted wire pair repeaters are installed in pairs in the Saudi Aramco Token Ring network. As shown in Figure 23, four repeaters extend the ring's coverage area. The repeaters connect to the RI and RO ports of the CAU.

Saudi Aramco DeskTop Standards

50

Engineering Encyclopedia

Communication Token Ring LAN Design

Different repeater manufacturers advertise different transmission distances for twisted wire pair repeaters; however, the average transmission distance for Type 1 and Type 2 cable (STP) is 732 m (2,400 ft). and the average transmission distance for Type 3 cable (UTP) is 366 m (1,200 ft).

Figure 23. IBM Token Ring Network Repeaters Token Ring to Token Ring Concentrator Connection A concentrator or CAU to CAU connection is the standard interconnection method in Token Ring networks. In the Saudi Aramco Token Ring network, CAUs connect to the main ring cable. One CAU is located at each central location. Multiple LAMs are attached to a single CAU. Stations attach to the LAMs with Type 3 cables. The CAU-to-CAU can connect with Type 1 or Type 2 STP cables, type 3 UTP cables, or fiber optic cables. In the Saudi Aramco network, fiber optic cables connect the CAUs. In some cases, type 1 cables interconnect CAUs that are close to each other. The fiber optic connection between IBM 8230 CAUs operates at 16 Mbps (native speed).

Saudi Aramco DeskTop Standards

51

Engineering Encyclopedia

Communication Token Ring LAN Design

Token Ring to Token Ring Bridge Connection IBM 8209 bridges are used in the Saudi Aramco network to interconnect Token Ring segments. The IBM 8209 bridge is a local bridge. An important consideration when determining the number of stations to connect to a ring is to keep the ring large enough to serve a useful purpose but small enough to make troubleshooting easier. A smaller ring is easier to troubleshoot and to maintain than a larger ring. The ring segments in the Saudi Aramco network operate at 16 Mbps over Category 3, UTP cable. This cabling scheme and the ring's 16 Mbps operating speed limits the maximum number of stations that may be attached to a network segment to 104. Token Ring bridges that interconnect segments will keep the rings at a reasonable size to facilitate troubleshooting and to ensure that the maximum number of stations is not exceeded. Bridges separate the physical rings and the MAC functions. Figure 24 shows two Token Ring segments that are interconnected by a bridge. Each ring implements its own MAC mechanism (i.e., each ring has its own token frames that manage station access to the ring). The token frames are restricted to one physical ring and are not transported to the other physical ring by the bridge. With bridges, a very complex Token Ring network with multiple segments can be constructed. Each ring in the network operates independently. The stations on the individual segments communicate through the bridge.

Figure 24. Token Ring Bridge

Saudi Aramco DeskTop Standards

52

Engineering Encyclopedia

Communication Token Ring LAN Design

In the Saudi Aramco Token Ring network, IBM 8209 bridges connect the IBM 8230 CAUs on each floor of a building to the two vertical backbone cabling systems in the building. Figure 25 shows the Tower Building Token Ring LAN design. Two IBM 8209 bridges connect to each IBM 8230 CAU. The bridges connect to one of two vertical building backbones. Dual vertical backbones ensure network reliability. The bridges connect to the vertical backbones through IBM 8230 CAUs with IBM 8220 fiber optic converters. The vertical backbones are fiber optic cables. As shown in the bottom of the diagram, the two vertical backbones linked through IBM 8209 bridges. Each vertical backbone also links through IBM 8230 CAUs and IBM 8209 bridges to a campus backbone transmission facility. The campus backbone also operates at 16 Mbps.

Figure 25. Saudi Aramco IBM Bridge Connections

Saudi Aramco DeskTop Standards

53

Engineering Encyclopedia

Communication Token Ring LAN Design

Summary In summary, the IBM 8209 bridge has the following features: When the bridge connects two Token Ring segments together: The bridge operates as a stand-alone source-routing bridge. The bridge is compatible with the IBM LAN manager program.

When the bridge connects a Token Ring segment to an Ethernet segment: The bridge operates as a stand-alone bridge. The bridge is seen as a transparent bridge by stations that are on the Ethernet segment and the bridge is seen as a source-routing bridge by stations that are on the Token Ring segment. The bridge is compatible with the IBM LAN manager program.

Token Ring bridge connections through dual host rings serve two functions: Provides a back up path in case a ring fails. Balance the traffic load between peer-to-peer traffic and host-to-peer traffic.

Bridges can provide back up paths through networks so that access to a host computer can be maintained when a network failure occurs. As shown in Figure 26, if one ring or bridge fails, the traffic load can be routed through a different bridge and ring to its destination. The Saudi Aramco network is configured with dual rings and back up bridges. If a fault occurs, and a bridge cannot exchange data through the normal path, then the bridge will automatically reroute the traffic through another bridge along an alternate path.

Saudi Aramco DeskTop Standards

54

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 26. Token Ring Bridge Back Up Path To balance the traffic load, Token Ring bridges may use a higher priority than normal peer-topeer network traffic. Normal peer-to-peer traffic within a segment travels at the lowest level of priority, priority 0; however, traffic that is to be passed between segments through a bridge travels at a priority level 4. The priority level allows a device to reserve the next available token frame. In normal load situations, allowing a bridge to reserve a token frame at a higher priority level than can be used by normal traffic limits bridge congestion. Basic Methods for Connecting LANs to Mainframe Computers Several methods connect LANs to mainframe computers. In the Saudi Aramco Token Ring network, IBM 3174 and IBM 3745 gateways connect Token Ring networked stations and 3270 terminals to the IBM mainframe computers. A gateway is the necessary hardware and software that allows two technologically different networks to communicate. For example, a gateway in the Saudi Aramco network interfaces the Token Ring protocol to the SDLC/SNA protocol. The SDLC/SNA protocol is standard on IBM mainframe computers.
Saudi Aramco DeskTop Standards 55

Engineering Encyclopedia

Communication Token Ring LAN Design

Token Ring Native Speed Connection Some mainframe computers directly connect Token Ring networks through NICs that plug into the mainframe's computer bus. Figure 27 shows a Token Ring native speed connection. A standalone gateway is not required because the mainframe computer's software directly interfaces to the Token Ring protocol. The address scheme that is used by the Token Ring MAC frames allows multiple host computers to connect to a common host Token Ring segment. Bridges can connect the host segment to the individual user rings.

Figure 27. Token Ring Native Speed Host Computer Connection The IBM mainframe computer can be configured for direct connection to a Token Ring network. The IBM allows directly connected Token Ring networks to operate at either 4 Mbps or 16 Mbps.

Saudi Aramco DeskTop Standards

56

Engineering Encyclopedia

Communication Token Ring LAN Design

Token Ring Gateway Connection A Token Ring gateway connection is shown in Figure 28. Gateways connected to a host computer handle the following types of traffic: Peer-to-peer traffic that passes through a bridge at priority level 4. Inbound traffic to the host that passes through a bridge and then to a gateway at a priority level 4. Outbound host traffic that travels from the gateway to the bridge at a priority level 0.

When a ring is heavily used, frames that are forwarded by bridges may monopolize the available bandwidth because of their higher priority level. Traffic that travels across the backbone between user rings, and traffic that travels inbound to a gateway from the backbone ring will be transferred in preference to traffic that is being sent outbound by backbone attached gateways. In very simple terms, inbound traffic to the host computer travels at a higher priority level than outbound traffic. A gateway is used to connect two networks that have different physical layer implementations and protocol operations. The gateway interfaces the network together converting the protocols used on the networks so that the communications can be carried through the gateway (Figure 29). Gateways installed on host rings resolve the traffic balance problem that is created by the token frame priority level scheme, gateways are installed on host rings, as shown in. With gateways installed on a host/gateway ring, all of the traffic (inbound and outbound) can travel at a higher priority level across the bridges to the backbone rings.

Saudi Aramco DeskTop Standards

57

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 28. Unbalanced Traffic Flow Through Gateways

Saudi Aramco DeskTop Standards

58

Engineering Encyclopedia

Communication Token Ring LAN Design

Figure 29. Host/Gateway Ring

Saudi Aramco DeskTop Standards

59

Engineering Encyclopedia

Communication Token Ring LAN Design

WORK AID 1:

IBM EQUIPMENT USED IN A TOKEN RING LAN NETWORK

IBM 8228 Multistation Access Unit (MAU) The IBM 8228 MAU (Multistation Access Unit) is a passive wiring-hub for a Token Ring network. Up to 8 stations can be attached to one MAU. The stations connect to the MAU through Token Ring data connectors. MAUs can be interconnected using the RI and RO ports. IBM 8230 Lobe Access Module (LAM) The IBM 8230 LAM (Lobe Access Module) is the wiring concentrator of the Token Ring network. Twenty stations can be attached to one LAM. The stations connect to the LAM through RJ-45 modular connectors. IBM 8230 Controlled Access Unit (CAU) The IBM 8230 CAU (Controlled Access Unit ) is attached to the LAM to provide network management and control functions. Four LAMs can be attached to one CAU. CAUs can be connected together to form the main ring. IBM 8220 Fiber Optic Converter An IBM 8220 Fiber Optic converter can be installed in an IBM 8230 CAU to increase the network coverage area. The IBM 8220 can transmit fiber optic signals 2,000 m (6,500 ft) over two fiber optic pairs. The IBM 8220 Fiber Optic converter can operate at either 4 Mbps or 16 Mbps. Main Ring Cable The main ring cable connects the CAUs together to form a network. The main ring cable attaches to the Ring In (RI) and Ring Out (RO) connector on the CAU. Only Type 1 Cable or fiber optic cable can be used with the IBM 8230 CAU. IBM 8209 Bridge The IBM 8209 is a local Bridge with ports that connect directly to LANs through relatively short connections. To connect to a Token Ring network, the IBM 8209 attaches to the lobe connectors on the LAM. The lobe cable length between the IBM 8209 and the LAM is the same for any lobe connection. For example, at 16 Mbps the AT&T SYSTIMAX SCS cabling method using Type 3 cable indicates the LAM to Bridge connection can be 100 meters long. The IBM 8209 Bridge is equipped with two DB-9 connectors. The IBM 8209 Bridge attaches to the drop cable connectors on a 10BASE-T concentrator. The IBM 8209 is also a translational bridge that can be used interconnect a Token Ring LAN with an Ethernet/IEEE 802.3 LAN.

Saudi Aramco DeskTop Standards

60

Engineering Encyclopedia

Communication Token Ring LAN Design

WORK AID 2:

IBM TOKEN RING NETWORK GUIDELINES

The following table shows the number of stations that can be served by a Token Ring network that uses different types of cable and the maximum cable lengths. Table 1. IBM Token Ring Guidelines
IBM Guidelines Data Rate Lobe Media Lobe Length Distance Between 8230s Distance Between 8230s Optical Fiber Number of Devices

Model 1 with 8230 or RJ-45 LAM 4 Mbps STP 100 m (328 ft) rec 375m (1237 ft) max 16 Mbps STP 145 m (328 ft) max 200 m (660 ft) 2 km (6600 ft) 260 400 m (1320 ft) 2 km (6600 ft) 260

Model 1 with 8230 or RJ-45 LAM and Filters 4 Mbps UTP Cat 3 UTP Cat 4,5 UTP Cat 4,5 100 m (328 ft) 300 m (990 ft) 2 km (6600 ft) 72

4 Mbps

100 m (328 ft)

300 m (990 ft)

2 km (6600 ft)

132*

16 Mbps

100 m (328 ft)

140 m (460 ft)

2 km (6600 ft)

132*

Model 2 with 16/4 Unshielded Media LAM and Filters 4 Mbps UTP Cat 4,5 UTP Cat 4,5 UTP Cat 3 UTP Cat 3 100 m (328 ft) 300 m (990 ft) 2 km (6600 ft) 132*

16 Mbps

100 m (328 ft)

140 m (460 ft)

2 km (6600 ft)

132*

4 Mbps

100 m (328 ft)

300 m (990 ft)

2 km (6600 ft)

132*

16 Mbps

90 m (297 ft)

140 m (460 ft)

2 km (6600 ft)

132*

*72 if any 4 Mbps only adapters in ring

Saudi Aramco DeskTop Standards

61

Engineering Encyclopedia

Communication Token Ring LAN Design

WORK AID 3.

IEEE 802.05 TOKEN RING GUIDELINES

The physical specifications for Token Ring are defined in IEEE 802.5. The following is an extract of that standard (1995). Objective Ensure compatibility of independently developed physical and electrical interfaces. Provide a communication channel that consists of a transmitter, receiver, and channel with an equivalent bit error rate (BER) of less than or equal to 10 -9 and with a ring equivalent BER of 10-8.

Media Independent Physical Specifications Accumulated Jitter Accumulated Jitter is the jitter that builds up as it passes through each ring station subsequent to the active monitor. Since each ring receiver is unable to fully compensate for signal distortion introduced by each sending transmitter, interconnecting channel, and its own receiver, jitter is introduced at each station. And since each station subsequent to the active monitor transmits with the clock derived from the jittered signal at the receiver, a filtered form of the jitter at each station is transferred to subsequent stations, causing the jitter to accumulate as the signal passes around the ring. The accumulated jitter is measured as the time displacement of the transmitted waveform driving a channel with respect to the active monitor station clock. Each station must track the accumulated jitter and the elastic buffer in the active monitor must compensate for this jitter. Accumulated Jitter (AJ) specifications: 4 Mbps 16 Mbps <600 ns <750 ns

Saudi Aramco DeskTop Standards

62

Engineering Encyclopedia

Communication Token Ring LAN Design

Media Dependent Specifications Both STP and UTP cable media is supported. Media STP STP UTP UTP Data Rate 4 Mbps 16 Mbps 4 Mbps 16 Mbps Minimum Physical Media Connectors 250 250 144 250

NOTE: each active retiming port in the ring counts as a single Physical Media Connector (PMC), so that, for example, a 4 Mbps UTP ring using all active retimed ports supports a minimum of 72 stations connected to 72 retiming ports for a total of 144 PMCs. UTP Category 5 is recommended for all installations. Concentrator Specifications Two types of concentrators are specified: passive concentrators and active concentrators. Both concentrator types perform the following functions: Couple into a ring, stations attached to lobe cabling to the ring trunk Interconnect multiple trunk coupling units (TCUs) to form a concentrator to support a star-wired topology. Support message traffic at data signaling rates of 4 or 16 Mbps. Provide for station confirmation of TCU presence and support of station detection of any open wire condition and certain short-circuit conditions in the lobe cabling. May include ring-in (RI) and ring-out (RO) trunk attachments for serial connection of multiple concentrators.

Saudi Aramco DeskTop Standards

63

Engineering Encyclopedia

Communication Token Ring LAN Design

Passive Concentrator The passive concentrator is a simple device aimed at installations where repeating elements are not required to support channel drive distance. In the case of the passive concentrator, the channel losses include: Two-directional lobe cabling loss, Plus the concentrator loss, Plus the losses of any additional passive devices in the channel. Active Concentrator The active concentrator performs an imbedded repeater function in the lobe ports data path, thereby providing ring segment boundaries at the concentrator lobe port connector. Channel Design Considerations (IEEE 802.5 Annex B) When designing a passive or active channel, the primary parameters of interest are: Insertion Loss NEXT Loss-to-Insertion Ratio (NIR) Total flat loss for passive channels. Channel impedance is satisfied by selecting the appropriate media

Insertion Loss Insertion loss is the loss of power (measured in dB) between a transmitter and a downstream receiver. This loss includes all the components in the channel (e.g., cords, cables, connectors, and concentrator). The maximum insertion loss for a 16 Mbps channel is 19 dB. Passive channel insertion loss = loss of cables and cords + loss of connectors + loss of concentrator. Loss of connectors can generally be neglected if there are less than 4 in the lobe and the insertion loss of each is less than 0.1 dB.

Saudi Aramco DeskTop Standards

64

Engineering Encyclopedia

Communication Token Ring LAN Design

Example: 16 Mbps Token Ring Lobe flat loss = 0.4 dB Concentrator Loss = 1.0 dB UTP Cat 5 cable = 8.2 dB/100 m Composite NEXT of cords and cables = 40.6 dB The maximum allowable loss for cables and connectors would be: Loss of cables/connectors = 19 dB - (1.0 dB + 0.4 dB) = 17.6 dB The lobe insertion loss is then 17.6 divided by 2 = 8.8 dB NIR The NIR requirement is >15.5 dB. In order to determine NIR, the sources of crosstalk must first be determined, and then the composite NEXT loss of the channel at the station determined. The primary sources of crosstalk are: Cabling System Concentrator

The crosstalk noise generated within the concentrator can be neglected in the example problem because the noise will be 8.8 dB lower when it reaches the concentrator (due to lobe insertion loss). When the concentrator noise reaches the station, it is again 8.8 dB lower. Since the NEXT of the concentrator has a minimum requirement 40 dB, the noise is 40 + 8.8 + 8.8 = 57.6 dB lower than the transmitter signal level. Which when compared to the NEXT noise due to the channel , is insignificant. Therefore, the NIR is 40.6 - 19 = 21.6 dB which exceeds the 15.5 dB requirement.

Saudi Aramco DeskTop Standards

65

Engineering Encyclopedia

Communication Token Ring LAN Design

Cable Length In the example, all Category 5, the total cable length is 17.6 dB/8.2 dB/100m = 214 m or a maximum lobe cable/cord length of 107 m. This length may be divided as follows: Station Cord: Patch Cord: Equipment Cord: Building Cable: 3m 3m 3m 98 m

Saudi Aramco DeskTop Standards

66

Engineering Encyclopedia

Communication Token Ring LAN Design

WORK AID 4: BAY NETWORKS CONCENTRATOR GUIDELINES Table 2. System 3000/5000 Lobe Lengths Model Cable Type/ Category Type 1, 1A, 2 Types 6, 9 Type 8 Category 3 Category 4 Category 5 3505B host module 5505 host module Types 1, 1A, 2 Types 6, 9 Type 8 Category 3 Category 4 Category 5 4 Mbps 350 m 200 m 150 m 100 m 200 m 200 m 600 m 400 m 300 m 200 m 300 m 300 m 16 Mbps 180 m 120 m 90 m NA 100 m 100 m 300 m 200 m 150 m 100 m 160 m 180 m

3502B host module 5502 host module

Saudi Aramco DeskTop Standards

67

Engineering Encyclopedia

Communication Token Ring LAN Design

Table 3. System 3000/5000 Trunk Lengths Model 3532 repeater module 3513 NMM 3552, 3512 host module 3534 repeater module 5575-F host module 5575-C host module Fiber Trunk NA STP Trunk 2500 ft (4 Mbps) UTP Trunk NA

NA NA 2 km

1000 ft (16 Mbps) Use Worksheets* NA

NA NA NA

2 km NA

NA 700 m (4 Mbps) 600 m (4 Mbps) 300 m (16 Mbps)

NA 300 m (4 Mbps) 180 m (16 Mbps)

*Supplied with equipment

Table 4. System 3000/5000 Maximum Station Count Model 3502B host module 3505B host module 3xxx modules 5xxx modules UTP 144 144 132 132 STP 260 144 250 250

Saudi Aramco DeskTop Standards

68

Engineering Encyclopedia

Communication Token Ring LAN Design

Table 5. System 3000/5000 Station Equivalents Model 3504-ST host module 3512 NMM 3513 NMM 3514-ST NMM 3517SA NMM 3522 Local Bridge 3532 STP Active repeater module 3534-ST fiber active repeater module 3552 STP passive repeater module 5505 host module 5505P host module 5510 NMM 5511 DCE 5575-C host module 5575-F host module Bridges and routers Station Equivalent 1 1 5 5 4 1 4 4 0 1 1 per ring 1 per DCE 1 3 per cluster 3 per cluster 1

Saudi Aramco DeskTop Standards

69

Engineering Encyclopedia

Communication Token Ring LAN Design

GLOSSARY controlled access unit (CAU) frame This is an IBM Corporation manufactured hardware device that interfaces with a LAM. A group of data bits that are in a specific format. A specific bit sequence defines the beginning and the end of the frame. The frame conveys information between network stations. This is a hardware device that is manufactured by the IBM Corporation that connects the Lobe Cable from a PC to the main ring cable. The LAM interfaces to the Main Ring cable through a CAU. A LAM performs a similar function as an MAU. This is a hardware device that interfaces the lobe cables and attaches PCs to the Main Ring cable. This device is similar to the LAM. A point of connection into a network. On a LAN, a station is a PC in which an NIC is installed. A station is also called a node, a lobe, or device. A high-speed personal computer (PC). The PC is generally attached to a LAN; however, it can be operated as a stand alone device.

lobe access module (LAM)

multistation access unit (MAU)

station

workstation

Saudi Aramco DeskTop Standards

70

Engineering Encyclopedia

Communication Token Ring LAN Design

BIBLIOGRAPHY SAES-T-916, January 1997 BICSI LAN Design Manual, October 1996 ISO/IEC 8802-5 (ANSI/IEEE Std 802. 5), 1995 Bay Networks Connectivity Guide, Part No. 345B-1103-BK, December 1995

Saudi Aramco DeskTop Standards

71

Anda mungkin juga menyukai