Preview

Ethernet or Token Ring

Satisfactory Essays
Open Document
Open Document
476 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethernet or Token Ring
Christina Lilomaiava
6/19/2014
IT/242
Adam Moneypenny

Ethernet or Token Ring

•Saguaro Federal has mainframes for all of its banks and businesses. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate?
In this scenario the best protocol to use would be a token ring because the token ring protocol is mainly used in mainframes. Token Ring uses a token method to go to each work station or main frame that are typically set in a ring or at least all connected together. The way this method works is that one mainframe sends out information (or a token) and it goes down the ‘ring’ either being rejected or accepted and once the receiving system accepts it, it sends out an acknowledgement token back into the ring and again it either gets rejected or accepted until it reaches the destination system.
This method is particularly useful for banks and businesses because it comes with a built-in recovery and management system to ensure that no system gives way to faults or problems and although it may not seem like it, this system is remarkably fast, even for it having to go or be passed by each system before reaching the destination. This protocol also has only one active monitor station that removes any circulating frames from the ring, detects any breaks in the ring and oversees the flow of traffic, with much information that is passed within banks and businesses this protocol fits the situation.
•XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it occupies. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate?
In this scenario the best protocol to use would be an Ethernet because of the many offices and floors involved. Since this seems to be a local network, you can set up an Ethernet network for computers involved. Because of its simplicity, you can connect computers via cable. Usually the frames involved in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    JG NT2640

    • 333 Words
    • 1 Page

    B. PC and switch. C. Router and hub D. Wireless access point (Ethernet port) and switch.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It/242 Week 4 Chekpoint

    • 379 Words
    • 2 Pages

    I believe that an Ethernet should be used. When a company which is spread out between multiple floors, such as XYZ Technology Consultants, a Token Ring Architecture is not the correct choice for this type of building. Token Ring Architecture, by design is a way to set up multiple computers together, enabling each PC to pass along information without data collision. However, Token Ring Networks, can also process data remarkably slower than Ethernet Architecture (sometimes as slow as 4 or 16 Mbps). Ethernet, by design are typically used in office buildings that are wired with twisted pair CAT-5 cables, or fiber optic cables for fast transmission of data, with each employee location fitted with an Ethernet jack to connect to the network. Utilizing this type of Architecture, if a problem arises in network…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 220 Lab 9.1

    • 426 Words
    • 2 Pages

    - First we need to look at all cables and see what will be the most cost effective choice. If using standard copper (Cat6e) you will get gigabit transfer speeds but at only a 328 foot maximum run without repeaters. This cable choice is ideal at the office level with a central switch. If you have to go vertical in between floors and underground, then fiber optic would be ideal. These can go miles per single run and can transfer 100’s of gigbits per second. There is no EMI and is very secure. You could also use multi-run fiber for desktop computers if you require very secure connections that are not susceptible to EMI and can’t be tampered. Most networks today use a combination of both fiber and copper to suit their needs.…

    • 426 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITNW 2335

    • 402 Words
    • 2 Pages

    4. Which network support services team is responsible for testing a new customer connection and for monitoring the ongoing operation of the link?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Describe the three modes of communication available on a network. (Minimum word count: 60)…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Lab 7.1

    • 1302 Words
    • 6 Pages

    Construct a diagram of the most effective structure for the organization's WAN connections and justify your choices.…

    • 1302 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    It 273 Unit 1

    • 316 Words
    • 2 Pages

    4. Describe two hypothetical situations, one in which a peer-to-peer network would be most appropriate and one in which a client-server network would be most appropriate, and explain why the particular network type would be most appropriate for that case.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    3. What is a protocol and why would one be used? Provide an example of a technological protocol or a society-based protocol.…

    • 544 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    SST atm

    • 376 Words
    • 2 Pages

    d. The global communication and connection able human to perform their banking beyond banking physical premises.…

    • 376 Words
    • 2 Pages
    Satisfactory Essays

Related Topics