lec10 - UCI University of California, Irvine EECS 161 -...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
EECS 161 - Introduction to Computer Networking Scott Jordan Local Area Networks / Rings UCI University of California, Irvine Token Ring - Topology: (Walrand fig. 4.5) Token Ring - Physical Layer: - Logical bits are encoded using differential Manchester encoding using approxi- mately +/- 4 volts. - Often, there are bypass relays in the hub to drop a computer out of the ring. - Each computer delays each bit by at least 1 bit transmission time & retransmits it on the ring, unless the computer is the source. - An elasticity buffer stores bits in between reception and transmission.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
EECS 161 - Introduction to Computer Networking Scott Jordan Local Area Networks / Rings UCI University of California, Irvine Token Ring - MAC layer: A specific bit pattern (3 bytes) is called a "token". (1) Wait for token (2) Flip last bit of token, turning it into a "start of frame delimiter". (3) Transmit packets, up to a maximum transmission time of "token holding time" (THT). (4) Transmit token.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 6

lec10 - UCI University of California, Irvine EECS 161 -...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online