...[Ethernet or Token Ring] [Ricky Clark] [IT/242] Due: [6/20/2014] [Sokly Vann] Saguaro Federal has mainframes for all of its banks and businesses. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? In this particular situation I would have to say that the token ring protocol should be used for its banks and businesses and the reason that I say this is because the banks and business seem to not all be located in the same building they are spread out. In Token Ring LAN’s each station is connected to a wiring concentrator called a multistation access unit using UTP or STP. The access method which is used on a Token Ring is called token which is a special data packet that is generated by the first computer that comes online in a token ring network With this being said this seems the most reasonable and secure because the computers cannot operate without a token from the other. XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it occupies. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? In the XYZ technology consultants situation I would suggest an Ethernet protocol. The reason that I came to this conclusion was due in part of the company being located in one building on various floors so everything is central. Ethernet is the most used networking that is available because of the pricing and...
Words: 346 - Pages: 2
...Ethernet or Token Ring Checkpoint Keitha Hinkle IT 242 03/27/2014 LaTrea Shine Ethernet or Token Ring Checkpoint Sanguaro federal has mainframes for all of its banks and businesses, must the company use the Ethernet or token ring protocol. I feel this would be a good option because the bank and businesses are probably not all located in the same building. So if they are located in separate buildings it would be the best option. In a token ring LAN each station is connected to a center wiring concentrator. This is called a multi-station access unit using a UTP or an STP. The access method that is used is called Token. This type of method is a special data package that is generated by the first computer which connects to the token ring network and then passed from one station to another station around the ring. This type of device only communicates over the network when it has the token. XYZ technology consultation has offices on the second, third, and fourth floors of the office building it occupies. Most of the company uses the Ethernet or token ring protocol. Explain your choice. Why is this choice appropriate? I think for this situation I would suggest an Ethernet protocol. I think this would be a better choice because the company is all located in the same building just on different floors. This is the most common type and popular used LAN technology. This is due to its reliability and ease of installation as well as its cost. An Ethernet network can be connected...
Words: 330 - Pages: 2
...Ethernet The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps. Ethernet is a physical and data link layer technology for local area networks (LANs). Ethernet was invented by engineer Robert Metcalfe. It uses wires (meaning it is not a wireless technology). The wires used for a LAN are mostly those headed by an RJ-45 jack, which is similar to the jack plugged into your telephone set, but twice as big. Some Ethernet networks use coaxial cables, but that’s rarer, and present in rather large LANs, which span over areas between buildings. Ethernet is by far...
Words: 2787 - Pages: 12
...Ethernet cards are essential parts of a network. They connect a computer to another computer or to a server by using a cable, an alternative to a wireless network. Ethernet Network – The Role of Ethernet in Computer Networks An ethernet network is a situation in which multiple computers are connected to one another and share the same Internet protocol address. An ethernet network has multiple computers on the same server. The benefit in this is that multiple networks do not need to be created. The downside to an ethernet network is that the connection of multiple computers leaves each computer open to hacking, malware, and viruses — in the event that a virus should attack one computer on the system. There are certain components necessary for an ethernet network: * Ethernet cable * Ethernet hub * Crossover cable * Router Ethernet Cable An ethernet cable is a necessary cord to connect two or more computers to the same network. Each computer must have its own ethernet cable in order to operate on the same ethernet network. Ethernet Hub An ethernet hub is a device used to string together each ethernet cable, which connects each computer on the same network. An ethernet hub contains several ethernet ports. Crossover Cable A crossover cable is a substitute for ethernet cables when one wants to connect two or more computers to the same ethernet network. Router A router is similar to an ethernet cable in that it connects two or more devices. Routers are more often used for...
Words: 9787 - Pages: 40
...small limited geographical area. Examples of LAN Technology include; Token Ring, Fibre Distributed Data Interface (FDDI) and ARCNET. Local Area Network is a data communication network connecting Terminals, Computers and Printers within a building or other geographically limited area. These devices can be connected through wired cables or wireless link. It is also a communication network for computers within a building or small group of buildings. It may be configured as; 1. A bus, a main channel to which nodes or secondary channels are connected in a branching structure. 2. A ring in which each computer is connected to two neighbouring computers to form a closed circuit. 3. A star in which each computer is linked directly to a central computer and indirectly to one another. Each of these has an advantage though a bus configuration has become the most. ETHERNET Ethernet is a standard communications protocol embedded in software and hardware devices, intended for building a local area network (LAN). It was designed by Bob Metcalfe in 1973, and through the efforts of Digital, Intel and Xerox (for which Metcalfe worked), "DIX" Ethernet became the standard model for LANs worldwide EVOLUTOIN OF ETHERNET Ethernet evolved to include higher bandwidth, improved media access control (MAC) method and different physical media. The coaxial cable was replaced with point-to-point links connected by Ethernet, repeaters or switches to reduce installation cost, increasing reliability...
Words: 1134 - Pages: 5
...will be addressed are the following: Topologies: • Mesh • Bus • Ring • Star Connection Mediums: • Ethernet • Token Ring • FIDDI • Wireless Mesh Topology A mesh topology consists of two types, full mesh and partial mesh. Full mesh topology interconnects all systems to each other. This allows for redundancy if one connection is severed. With partial mesh topology only some workstations are interconnected to other computer systems while; others are only connected with systems that an exchange of data occurs (Mitchell, 2011). The advantages and disadvantages of a mesh topology are: Advantages: Disadvantages: Provides redundant paths between systems Time and material to implement The network can be expanded without disruption to current users. Cost to implement (many connections) Dedicated links for transmitting data Complicated implementation Bus Topology A bus topology uses a common backbone that directly connects each system. The backbone consists of a single cable that all transmissions are sent across by the systems that are attached (Mitchell, 2011). The advantages and disadvantages of a bus topology are: Advantages: Disadvantages: Easy to implement Potential performance problems with many systems connected Low cost to implement One point of failure, backbone cable Redundancy for systems, if one fails the rest will function. Cable length limitation Ring Topology The ring topology connects all devices onto one cable within a closed loop...
Words: 988 - Pages: 4
...its banks and businesses. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? In this specific circumstance I would need to say that the token ring convention ought to be utilized for its banks and organizations and some piece of my thinking is on account of it has banks and business that are not all found in the same building or thereabouts it appears. In Token Ring LAN's each one station is associated with a wiring concentrator called a multi-station access unit utilizing UTP or STP. A few topologies for this are a ring or star with the ring topology being the more consistent decision. The right to gain entrance technique utilized on a Token Ring is called token which is an uncommon information bundle that is produced by the first machine that comes online in a token ring system, this token is passed starting with one station then onto the next around the ring. A system gadget just imparts over the system when it has the token. XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it occupies. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? In the XYZ engineering advisors specific circumstance an Ethernet convention. What first brought me to this conclusion was expected of the organization being placed in one expanding on different floors. Ethernet is a standout amongst the most prevalent and broadly...
Words: 351 - Pages: 2
...devices attached to this shared cable. However, only the intended device will receive and accept the message being processed. An example of a bus topology is an Ethernet cord which is easy to install. One problem with a bus topology if the main source fails, all devices attached will become unresponsive. Star Topology Star topologies are the most popular forms of networking used today, in both homes and businesses. The star is the central device of the network and is located in most homes today, the router. In order for the star topology to work, it does require more cabling than the bus topology, but unlike the bus topology, if a computer in the star topology fails, all other computers are not affected. However, if the router fails, this will cause the network to shut down. Ring topology is no longer used as widely as in the past. Mesh Topology Mesh topology works with many different routes. The term mesh is exactly the way mesh topology works, sending messages out and it will pick the shortest and easiest route. Mesh topology can also only travel in one direction, clockwise or counterclockwise. One example of a mesh topology would be the Internet. Ethernet An Ethernet is a physical data link that is used for local area networks. The Ethernet runs from 10 Mbpps to 1 Gbps. Some of the advantages of the Ethernet is that is not expensive to implement. It is a single solid cord that plugs into the computer and then into the router. It is able to handle a...
Words: 680 - Pages: 3
...Definition Movement of encoded data from one point to another by means of electrical or optical transmission systems. Transfer of information from one computer to another via direct cable connection, over telephone lines, or via air. History Smoke signals Sumerian clay tablets (3300 B.C.) Greek messengers/scrolls Telegraph system Telephone system Computers Networking Science and Technology Information Institute Department of Science and Technology Overview Introduction LAN Technologies Network Transports WAN Technologies Definition Through a combination of hardware and software, networks permit information and peripherals to be shared efficiently and economically. Definition An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. Figure illustrates some different kinds of network technologies that can be interconnected by routers and other networking devices to create an internetwork. PC LAN with Host Connection Network cable plant Workstation Host computer Virtual connection to the host Workstation to file server File server Network Architecture The OSI Model Implement a layered data communications system Establish a common basis for standards development Qualify products as open by their use of these standards...
Words: 4600 - Pages: 19
...Twisted Pair (STP) cable or UTP cabled. The STP stands for shielded twisted pair cable and UTP stands for unshielded pair cable. It is a most usable topology in local area network from all over the world. In Ring Topology all computers are situated in the form of a ring and each computer connected within two neighbor’s computer by the means of communication. In Ring topology all computers communicate with each other clockwise or counter-clockwise. The use of ring topology is increasing day by day because a network can be easily implemented in home, office, building, and school. Ring topology has some benefits such as equal access to everyone, transformation of data at very high speed but has disadvantages like the fault in any cable or wire may cause of failure network. Mesh Topology designed on the concept of Router because its work depends on router. When a user send a message to any other user, then router search any shortest way to reach their destination. In all other topologies messages are usually send and receive to every computer but in mesh topology message find its way for destination. If all devices are connected to all other devices then it’s called full mesh topology but if a device connected indirectly to the other then it is called partial mesh. Ethernet is a physical and data...
Words: 863 - Pages: 4
...transmission method used in Ethernet networks. When Ethernet was designed in the 1970s, it was a shared medium. At any moment, only one frame from one station was transmitting in one direction (half duplex). With CSMA/CD, if the network is busy when a station wants to transmit (carrier sense), the station waits a random number of microseconds before trying again. However, if two stations coincidentally transmit their frames at exactly the same time, their signals will collide. Both stations detect the collision and back off a random duration before retrying. Today, collisions have been mostly eliminated, because shared Ethernet gave way to full-duplex, point-to-point channels between sender and receiver (see switched Ethernet). However, CSMA/CD provides compatibility for older shared Ethernet hubs that may still be in place. Ethernet is a data link protocol, and CSMA/CD is a MAC layer protocol. Token Ring is a data link technology for local area networks (LANs). It operates at layer 2 of the OSI model. Unlike all other standard forms of LAN interconnects, Token Ring maintains one or more common data frames that continuously circulates through the network. These frames are shared by all connected devices on the network as follows: a frame (packet) arrives at the next device in the ring sequence, that device checks whether the frame contains a message addressed to it. If so, the device removes the message from the frame. If not, the frame is empty (called a token frame), the device holding...
Words: 315 - Pages: 2
...bus topology is a passive topology, which means that it is listening to the data being sent but is not participating in network communications. The advantages of possessing a bus network is that is a quick, inexpensive network to set-up and easy to implement. The disadvantages are the amount of computers that attached to the network and the amount of data that flows through them causes the network to be slow. Another disadvantage is if something happens to one part of the network the whole network fails. Ring Topology The ring topology is each computer is connected directly to the next computer in line, making a circle effect with the cables. If one computer receives a signal it either acts on it or it passes it to the next computer. The signal travels only in one direction (Tomosho, Tittel, & Johnson, 2004). Termination is not necessary since it is a circle with no end. Some advantages of a ring topology are the computers have equal access to the entire network. The ring network has a very steady performance, even though it has many users. Some disadvantages are if one computer fails the entire network is affected. When there is a problem within the network it is hard to find the source of the issue. For the computers to communicate, they must all be on, and to add a computer to the network the entire network must be shut down. Star Topology The star topology is the most dominant topology in today’s...
Words: 912 - Pages: 4
...What is a Dialup Internet Service Dialup internet service is a service that allows connectivity to the internet through a standard telephone line. By connecting the telephone line to the modem in your computer and inserting the other end into the phone jack, and configuring the computer to dial a specific number provided by your internet service provider(ISP) you are able to access the internet on your computer. Dial up internet service is provided through several ISP. The majority of internet service providers give you a set of telephone numbers either national or local that allows you to dial into a network that feeds into the internet. This allows you to receive and send email, search the World Wide Web, participate in chat rooms and plenty of other features the web has to offer. In order to get a dial up internet service a person must definitely have a computer and even more important a modem. There are different types of modems, and most of them are inexpensive to purchase. You can have an internal modem installed in a free slot of your computer, or you can have an external modem that's hooked up to the computer through cables. A telephone line is linked to the modem. The modem whether external or internal is controlled by software on the computer. With Microsoft Windows operating system that software is the Network Connection utility which allows you to connect to the internet. How? In the Network Connection utility you have to set up ISP profile so that the modem knows...
Words: 2286 - Pages: 10
...performance of an Ethernet LAN decreases with an increase in the number of stations on the LAN, whereas it increases (at least initially) with the increase in the number of stations in a token-ring LAN? A) There are too many differences between Token Ring and Ethernet to list out here. You could read more about it from many useful search results for "ethernet vs. token ring." I'll point out a key difference and give you a source answering your question on performance. Ethernet is based on CSMA/CD (carrier sense multiple access with collision detection), meaning multiple stations sense the carrier at the same time and send data when the carrier is free. However, there might be multiple stations sending a free carrier and send the data at the same time, causing "collision." Collision is the main factor affecting ethernet's performance. The more stations on the same LAN, the higher the collision rate, the lower the performance. Token Ring, on the other hand, is based on a control/access given to the station owning the "token." Think of a token as the key to the media: whichever station has the token would be allowed to use the ring to send the data. So there would be no collision, just multiple stations competing for the same token. With not too many stations, the wait-for and claim of the token is very efficient (think of a video game with less players waiting to play it.) But if there are too many stations, most would just sit around and wait for the token, hence the flat-out...
Words: 923 - Pages: 4
...designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in building the new network. Describe the network you would recommend and how it would be configured with the goal of building a new network that will support the company’s needs for the next 3 years with few additional investments. Be sure to include the devices and type of network circuits you would use. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way. Because we are considering the company present needs and over the next 3 years and not adding any addition investments, I would design the network using the traditional network design process. Computer Dynamics is centrally located in three adjacent five-story buildings, however there is no network connectivity amongst the buildings, which means we have to build a backbone to connect all three LANs. Before addressing the connectivity issues amongst the buildings, lets first look at the current topologies in each building; 2 Ethernet and token ring. I recommend going with Ethernet, it is a simpler topology, which has less room for errors. With 100 computers in each building I would recommend 100base-T Switched Ethernet LANs, in all...
Words: 460 - Pages: 2