Preview

Ethernet and Token Ring

Satisfactory Essays
Open Document
Open Document
325 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethernet and Token Ring
CheckPoint: Ethernet and Token Ring STUDENT
IT/242
November 10, 2011
Philippe Rowland

CheckPoint: Ethernet and Token Ring Network

Saguaro Federal should use the Token Ring protocol for their banks and businesses. This is appropriate because the physical topology of the token ring is a star, but the logical topology is a ring. In Token Ring LAN’s each station is connected to a wiring concentrator called a multistation access unit (MAU) using UTP or STP. Like Ethernet hubs, MAUs are located in a wiring closet. The access method used on a Token Ring is called token passing. A network device only communicates over the network when it has the token. A token is a special data packet that is generated by the first computer that comes online in a token ring network this token is passed from one station to another around the ring, when a station gets a free station and summits a packet it travels around the ring in one direction passing all the other stations along the way. XYZ Technology Consultants should use the Ethernet protocol for their offices located on the second, third, and fourth floors of their office building. Ethernet is the most widely used LAN technology because of its speed, reliability, price, and ease of installation. All popular operating systems and applications are Ethernet compatible, as are upper layer protocol stacks such as IPX, TCP/IP, and NetBEUI. Newer and faster Ethernet standards combined with switches have significantly increased the performance of networks. Ethernet networks can be configured in either a star topology using UTP connected to a hub or a bus topology using a coaxial cable acting as a backbone. When a computer wants to send data over the network, it will listen to see if there is any traffic on the network, if it is clear, it will then broadcast. Wide Area Networks, by Patrick Regan. Published by

You May Also Find These Documents Helpful

  • Better Essays

    The Administrative functions on the workstation using the server DHCP to obtain IP addresses. The black and white or color laser printer network is only a static DHCP IP is set to DHCP on the server using hardware MAC addresses. Data is transported through the hospital using a 1000 Base-T network as the backbone structure. 1000 Base-T network also known as IEEE802.3ab is a standard for gigabit Ethernet over copper wiring using mostly CAT 5 or CAT6 type network cabling. Each segment of the network has a maximum cable length of about 328 feet or 100 meters. 1000 Base-T standard uses automatic MDI/MDI-X configuration which means straight through cables will often work between gigabit-capable interfaces that can eliminate the needs of a crossover cable (Switch Cabling And Auto-MDIX,…

    • 1549 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    NT1310 Unit 3 Exercise 1

    • 443 Words
    • 2 Pages

    Application (in terms of cabling infrastructure) – systems supported by telecommunications cabling; includes Ethernet, Token ring, Fiber Distributed Data Interface (FDDI), and Asynchronous Transfer Mode (ATM)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It/242 Week 4 Chekpoint

    • 379 Words
    • 2 Pages

    I believe that an Ethernet should be used. When a company which is spread out between multiple floors, such as XYZ Technology Consultants, a Token Ring Architecture is not the correct choice for this type of building. Token Ring Architecture, by design is a way to set up multiple computers together, enabling each PC to pass along information without data collision. However, Token Ring Networks, can also process data remarkably slower than Ethernet Architecture (sometimes as slow as 4 or 16 Mbps). Ethernet, by design are typically used in office buildings that are wired with twisted pair CAT-5 cables, or fiber optic cables for fast transmission of data, with each employee location fitted with an Ethernet jack to connect to the network. Utilizing this type of Architecture, if a problem arises in network…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It240 Lan Topologies

    • 268 Words
    • 2 Pages

    13. Your network’s physical topology is that of a star configuration. From time to time, each workstation will hold a packet called a token, during which time it will transmit data and then pass the token along to the next workstation. What is the logical topology of your network?…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The most important piece of hardware would be the network interface card (NIC). Connectivity devices such as hubs, repeaters, bridges, routers, switches, and gateways can be used to extend the LAN. Transmission media can include coaxial cable, twisted pair wiring, fiber cable, and radio waves.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    e. One thing all Ethernet networks have in common is their access method, known as…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The next steps ethnet will be taking will be to increases speed and security. An organization using medical equipment or financial information has to consider what security protocols and policies it would use. Using Category 6 twisted pair cabling. These cables are hardier versions of Cat5E and are covered in a shielding that prevents them from being compromised by electrical wiring or magnetic fields. Once the speeds of Ethernet have been completely maxed out, the next upgrade will have to the security features they provide.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    INDP Final Project

    • 3551 Words
    • 12 Pages

    * A traditional LAN standard for Ethernets is a logical characteristic of a bus topology. Other…

    • 3551 Words
    • 12 Pages
    Better Essays
  • Best Essays

    When designing the layout of a LAN, the party can choose from a selection of different technologies on which to base the main part of their LAN. The technology choices that the party adopts will be a critical part in the way their LAN performs. Two important LAN setups are a network based on Ethernet or Token Ring technology. Besides operating in a small space, LANs have some other distinctive features. LANs are typically owned, controlled, and managed by a single person or organization.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    IT220 Unit 5 assignment

    • 286 Words
    • 2 Pages

    Ethernet LANs: collection of devices which use IEEE Ethernet standards at the physical and data link layers, so that the devices can send Ethernet frames to each other…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Constant stream of multimedia traffic between offices – average file size 25MB; file transfers less than 5 seconds…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    With the advancement information technologies such as multi-core processors, digital media and mega storage architectures, increased Ethernet capacities will continue to be developed. It is likely that approximately every five to seven years will produce new standards to meet new technologies in Ethernet capacities. We can expect to see a greater push towards unified networking with an increasing emphasis on increased data storage at lower costs. New standards will be developed and evolve as the technologies continue to expand.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    LYT2 Task 2

    • 2054 Words
    • 8 Pages

    T carriers, e.g., T1 and T3, are digital, leased twisted-pair lines, designed to carry voice…

    • 2054 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    1.What’s a routing table? Keeps track of the routes to use for forwarding datat to its destination…

    • 1575 Words
    • 7 Pages
    Powerful Essays