Loading content...
The elegance of Token Ring lies in its solution to a fundamental networking problem: How do multiple stations share a single communication channel without collisions?
Ethernet answered this question with a probabilistic approach—transmit and detect collisions, then retry with randomized backoff. Token Ring's answer is fundamentally different: serialize access through explicit coordination. A small control frame—the token—circulates continuously, and only the station holding the token may transmit.
This simple concept yields remarkable properties:
In this page, we'll dissect the token passing mechanism with the precision of a Principal Engineer analyzing a production system. You'll understand not just what happens, but why each design decision was made and how the system achieves its reliability guarantees.
By the end of this page, you will master the complete token passing lifecycle—from token capture to frame transmission to token release. You'll understand the critical differences between different token release strategies, analyze the efficiency implications of each, and be able to calculate ring utilization for various network configurations.
At its core, token passing implements a distributed mutual exclusion algorithm. The token is a lock on the shared medium—whoever holds the token has exclusive right to transmit. When finished, the station releases the token, passing the lock to the next station.
The Token as a Permission Slip:
The token is extraordinarily compact—just 3 bytes (24 bits) containing the Starting Delimiter, Access Control, and Ending Delimiter. Despite its minimal size, the token carries all the information needed for access control:
Continuous Token Circulation:
When no station has data to transmit, the free token circulates around the ring continuously. Each station receives the token, examines it briefly, and retransmits it to its downstream neighbor. The token visits every station in sequence, traveling at line speed minus processing delays.
The time for the token to complete one circuit is called the Token Rotation Time (TRT). This is a critical metric for understanding ring performance:
Token Rotation Time (TRT) Components: TRT = Propagation Delay + Station Latencies + Token Bits Where:- Propagation Delay = Total cable length × propagation speed (approximately 5 μs/km for copper, 5 μs/km for fiber) - Station Latencies = Number of stations × latency per station (typically 2.5 μs per station for processing and retransmission) - Token Bits = Size of token / bit rate (24 bits / 16 Mbps = 1.5 μs for 16 Mbps ring) Example: 100-station ring over 2 km at 16 Mbps Propagation: 2 km × 5 μs/km = 10 μsStations: 100 × 2.5 μs = 250 μsToken: 24 bits / 16 Mbps = 1.5 μs TRT (idle ring) ≈ 261.5 μs This means each station has an opportunity to transmitapproximately every 262 microseconds—3,800+ times per second!Station Behavior During Token Reception:
As the token passes each station, the station makes a rapid decision:
This decision happens at wire speed—each bit of the token is examined as it arrives and potentially modified before retransmission. The station cannot buffer the entire token first; it must operate on the bit stream in real-time.
Token Ring adapters use cut-through (pipeline) processing rather than store-and-forward. Bits are examined and retransmitted with minimal delay—typically a few bit times. This is essential because storing even one complete token would add latency that accumulates around the ring, degrading performance.
When a station has data to transmit and receives a free token with appropriate priority, it initiates the token capture process—a precisely choreographed sequence that transforms the token into a frame header and appends the station's data.
The Capture Moment:
Token capture must occur at exactly the right instant. As the token arrives:
Frame Structure After Token Capture:
When a station captures the token and begins transmitting, the frame expands from the minimal 3-byte token to a complete data frame. The token's SD and modified AC become the first bytes of the frame header:
Token Ring Data Frame Format: +-----+-----+-----+------+------+------+------+-----+-----+-----+| SD | AC | FC | DA | SA | DATA | FCS | ED | FS |+-----+-----+-----+------+------+------+------+-----+-----+-----+| 1 | 1 | 1 | 6 | 6 | var | 4 | 1 | 1 | bytes+-----+-----+-----+------+------+------+------+-----+-----+-----+ Where:- SD: Starting Delimiter (1 byte) - JK0JK000- AC: Access Control (1 byte) - PPPTMRRR (T=1 for frame)- FC: Frame Control (1 byte) - FFrrrrrr F bits = Frame type (00=MAC, 01=LLC data) r bits = Control bits- DA: Destination Address (6 bytes)- SA: Source Address (6 bytes)- DATA: Information field (0-4,500 bytes for 4 Mbps, 0-18,000 bytes for 16 Mbps)- FCS: Frame Check Sequence (4 bytes) - CRC-32- ED: Ending Delimiter (1 byte) - JK1JK1IE I = Intermediate frame (0=last, 1=more follow) E = Error detected (0=no error, 1=error found)- FS: Frame Status (1 byte) - ACrrACrr A = Address recognized C = Frame copied Note: The original token (SD+AC+ED) becomes SD+AC of the frame,with additional fields appended. The token is "expanded" into a frame.Token Holding Time (THT):
A station cannot hold the token indefinitely—this would starve other stations. IEEE 802.5 defines a Token Holding Time (THT), typically 10 milliseconds. During this time, the station may transmit multiple frames. When THT expires, the station must release the token even if it has more data queued.
Multiple Frame Transmission:
Within the THT window, a station can transmit back-to-back frames efficiently:
This pipelining significantly improves efficiency for busy stations with multiple frames queued.
Frame Status Field (FS):
The Frame Status field is ingenious—it provides acknowledgment within the same ring circuit. As the frame passes the destination:
When the transmitting station receives its frame back, it checks FS:
This built-in acknowledgment is more efficient than requiring separate ACK frames.
The FS byte contains A and C bits twice (ACrrACrr). Since these bits are modified during frame circulation, they cannot be protected by the FCS (which was calculated before they were set). The duplication provides redundancy—a valid setting requires both copies to match. Bits marked 'r' are reserved.
One of the most significant design decisions in Token Ring implementation is when the transmitting station releases a new token. Two strategies exist, with dramatically different performance implications:
1. Normal Token Release (NTR) — Original 4 Mbps behavior:
In Normal Token Release, a station waits until its transmitted frame(s) have completely returned before releasing a new token. The sequence is:
This approach is simple and safe but has a significant inefficiency: during the entire frame's propagation around the ring, no other station can transmit. The ring is "locked" for one full circulation per frame.
2. Early Token Release (ETR) — 16 Mbps Enhancement:
Early Token Release was introduced with 16 Mbps Token Ring to improve efficiency dramatically. With ETR:
ETR transforms risk into performance: multiple frames coexist on the ring, dramatically improving utilization for large rings.
Why ETR Matters for Large Rings:
Consider a ring with substantial propagation delay—perhaps connecting buildings across a campus. At 16 Mbps, a single frame might occupy only a fraction of the ring at any moment. With NTR, the sending station waits for the frame to traverse the entire ring before releasing the token—wasting the capacity of the ring segments the frame has already passed.
With ETR, the token follows immediately behind the frame. A station "downstream" can grab the token and start transmitting while the first frame is still traveling to its destination. Multiple frames can be in flight simultaneously, keeping all segments of the ring active.
Ring Parameters:- Speed: 16 Mbps- Ring latency (propagation + station delays): 100 μs- Frame size: 1000 bytes = 8000 bits Transmission time per frame: 8000 / 16 Mbps = 500 μs With Normal Token Release (NTR):- Station transmits: 500 μs- Waits for frame to return: 100 μs (ring latency)- Total cycle: 600 μs per frame- Throughput: 8000 bits / 600 μs = 13.3 Mbps- Efficiency: 13.3 / 16 = 83% With Early Token Release (ETR):- Station transmits: 500 μs- Token released immediately, next station can transmit- Ring can hold: ring_latency × bit_rate = 100 μs × 16 Mbps = 1600 bits- At 8000 bits per frame, ring holds 1600/8000 = 0.2 frames- With pipelining, multiple frames overlap- Effective throughput approaches 16 Mbps- Efficiency: ~99%+ under heavy load ETR benefit grows with longer rings and smaller frames!On very small rings (where the ring latency is small relative to frame size), NTR and ETR performance converge. NTR's simplicity made it appropriate for 4 Mbps Token Ring, where rings were typically smaller and the performance penalty was acceptable. ETR became essential at 16 Mbps to remain competitive with Fast Ethernet.
Frame stripping is the process by which transmitted frames are removed from the ring. Unlike Ethernet (where frames simply propagate to all stations and are discarded after reception), Token Ring frames circulate the entire ring and must be explicitly removed to free bandwidth and prevent endless circulation.
Source Stripping (Standard Method):
In IEEE 802.5, the transmitting station is responsible for stripping its own frames. When a frame returns:
Why Source Stripping?
Source stripping provides several advantages:
Station A transmits frame to Station C: Time T0: Station A captures token, begins transmitting Frame: [SD|AC|FC|C_addr|A_addr|DATA|FCS|ED|FS] └── Destination └── Source Time T1: Frame passes Station B Station B: "Not for me" → forwards unchanged Time T2: Frame arrives at Station C Station C: "This is for me!" → Copies frame to receive buffer → Sets A=1 (address recognized) → Sets C=1 (frame copied) → Forwards modified frame Frame: [SD|AC|FC|C_addr|A_addr|DATA|FCS|ED|FS=AC] └── Status set Time T3: Frame passes Station D Station D: "Not mine" → forwards unchanged Time T4: Frame returns to Station A Station A: "My source address - this is my frame!" → Checks FS: A=1, C=1 → "Delivery successful!" → DOES NOT RETRANSMIT (stripping) → Frame removed from ring Time T5: Station A releases new token (NTR) or has already (ETR)Broadcast and Multicast Stripping:
For broadcast (DA = FF-FF-FF-FF-FF-FF) and multicast frames, the stripping rule is the same: the source strips. Even though multiple stations may copy the frame, only the originator removes it. Each recipient sets A and C bits, but the frame continues around the ring until it returns to the source.
Orphan Frames and Active Monitor Stripping:
If a transmitting station fails after sending a frame but before stripping it, the frame would circulate forever—an "orphan frame." The Active Monitor prevents this using the M bit (Monitor bit):
ETR Stripping Complexity:
With Early Token Release, multiple frames may be on the ring simultaneously. A station must:
This requires more sophisticated buffer management than NTR but is well within the capabilities of modern network adapters.
If a station is slow to strip frames (perhaps CPU overloaded), ring efficiency suffers. Frames linger longer than necessary, delaying token release under NTR or causing "frame train" buildup under ETR. Quality Token Ring adapters offload stripping to hardware to minimize this delay.
Token Ring's reliable operation depends on precise timing. Stations must synchronize not through external clocks but through the bit stream itself—each station derives its clock from incoming data. This creates fascinating engineering challenges and elegant solutions.
Clock Recovery and Synchronization:
Token Ring uses Differential Manchester encoding, which guarantees at least one transition per bit period (the mid-bit transition). Stations use Phase-Locked Loops (PLLs) to track these transitions and recover the clock:
The Elastic Buffer Problem:
As data traverses the ring, each station's clock might be slightly faster or slower than its upstream neighbor's. These tiny frequency offsets (measured in parts per million) accumulate:
Active Monitor Latency Buffer:
The Active Monitor solves timing accumulation with its latency buffer—a delay element that can absorb or generate bits as needed:
Token Ring Timing Specifications:
| Parameter | 4 Mbps Value | 16 Mbps Value | Purpose |
|---|---|---|---|
| Bit Time | 250 ns | 62.5 ns | Duration of one bit |
| Minimum Ring Latency | 24 bits (6 μs) | 24 bits (1.5 μs) | Ensures complete token fits on ring |
| Token Holding Time (THT) | 10 ms | 10 ms | Maximum time station can transmit |
| Good Token Timer | 2.6 ms | 2.6 ms | Standby Monitor timeout for AM failure |
| Active Monitor Present Timer | 7 seconds | 7 seconds | AM broadcasts presence periodically |
| Station Latency | ~2.5 μs | ~1 μs | Typical delay per station |
Ring Latency and Minimum Token Size:
The ring must be able to hold at least one complete token (24 bits) at any time. This is the minimum ring latency requirement. For very small rings (few stations, short cables), the natural propagation delay might be less than 24 bits. The Active Monitor's latency buffer ensures this minimum is always met.
Token Rotation Time Under Load:
Under heavy load, TRT increases because each station transmit data, not just pass the token:
TRT_max = Ring_Latency + (N × THT)
Where:
- Ring_Latency: Propagation time around the ring
- N: Number of stations with data to transmit
- THT: Token Holding Time (10 ms)
For N=100 stations all transmitting continuously: TRT_max = 0.0003s + (100 × 0.010s) = 1.0003 seconds
This means worst-case, a station might wait just over 1 second between transmission opportunities. This bounded maximum is a key deterministic property—Ethernet has no such guarantee.
The ability to calculate maximum wait time is crucial for real-time systems. A factory controller needs to know it can transmit within 1 second—guaranteed. Ethernet's exponential backoff provides no such bound; under heavy load, a station could theoretically wait indefinitely.
Understanding Token Ring efficiency requires analyzing where time is spent during operation. The efficiency depends heavily on ring parameters, frame sizes, and the token release strategy.
Efficiency Formula:
For a single station transmitting continuously with Normal Token Release:
Efficiency = Transmission_Time / (Transmission_Time + Ring_Latency)
= T_frame / (T_frame + τ)
Where:
- T_frame: Time to transmit one frame = Frame_Size / Bit_Rate
- τ (tau): Ring latency = propagation delay + station delays
This formula reveals key insights:
Example 1: 4 Mbps, 1 km ring, 20 stations, 1000-byte frame Ring latency τ:- Propagation: 1 km × 5 μs/km = 5 μs- Stations: 20 × 2.5 μs = 50 μs- Total τ = 55 μs Frame transmission time:- T_frame = (1000 × 8 bits) / 4 Mbps = 2000 μs Efficiency (NTR) = 2000 / (2000 + 55) = 97.3%→ Excellent efficiency! Frame time >> latency ----------------------------------------- Example 2: 16 Mbps, 5 km ring, 100 stations, 500-byte frame Ring latency τ:- Propagation: 5 km × 5 μs/km = 25 μs- Stations: 100 × 1 μs = 100 μs (faster processing at 16 Mbps)- Total τ = 125 μs Frame transmission time:- T_frame = (500 × 8 bits) / 16 Mbps = 250 μs Efficiency (NTR) = 250 / (250 + 125) = 66.7%→ One-third of time wasted waiting for frame return! Efficiency (ETR) ≈ 16 Mbps × (250 + 125) / (500 × 8 + small overhead)→ Approaches 95%+ because ring never sits idle Key insight: ETR essential for 16 Mbps with large rings/small framesComparison with Ethernet Efficiency:
Ethernet's efficiency depends on collision probability, which increases with load. Under light load, Ethernet is very efficient (no collisions). Under heavy load, collisions waste significant capacity.
Token Ring's efficiency is more predictable:
Parameter 'a' Analysis:
Network researchers often use the parameter 'a' = τ / T_frame to characterize LAN performance:
For Token Ring with NTR: Efficiency = 1 / (1 + a) For Token Ring with ETR: Efficiency ≈ 1 / (1 + a/N) where N = number of active stations
To maximize Token Ring efficiency: (1) Use larger frames when possible (aggregate small packets), (2) Minimize ring latency by reducing station count per ring and using shorter cables, (3) Use ETR for 16 Mbps, (4) Segment large networks into multiple smaller rings connected by bridges.
We've dissected the token passing mechanism that makes Token Ring unique among LAN technologies. Let's consolidate the essential concepts:
What's Next:
With token passing fundamentals mastered, we'll examine the Token Ring frame format in detail. You'll learn the purpose of every field, how MAC and LLC frames differ, and how the frame structure supports Token Ring's unique features like priority and error indication.
You now understand the complete token passing lifecycle—from capture through transmission to stripping. You can analyze efficiency for different ring configurations and explain why ETR was essential for 16 Mbps Token Ring. Next, we'll explore the frame format that carries Token Ring data.