Ethernet or Token Ring Checkpoint

Last Updated: 11 Feb 2021
Pages: 2 Views: 86

Saguaro Federal has mainframes for all of its banks and businesses. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? In this particular situation I would have to say that the token ring protocol should be used for its banks and businesses and part of my reasoning is because it has banks and business that are not all located in the same building or so it seems.

In Token Ring LAN’s each station is connected to a wiring concentrator called a multistation access unit using UTP or STP. Some topologies for this are a ring or star with the ring topology being the more logical choice. The access method used on a Token Ring is called token which is a special data packet that is generated by the first computer that comes online in a token ring network, this token is passed from one station to another around the ring.

A network device only communicates over the network when it has the token.XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it occupies. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? In the XYZ technology consultants particular situation an Ethernet protocol. What first brought me to this conclusion was due of the company being located in one building on various floors.

Order custom essay Ethernet or Token Ring Checkpoint with free plagiarism report

feat icon 450+ experts on 30 subjects feat icon Starting from 3 hours delivery
Get Essay Help

Ethernet is one of the most popular and widely used LAN technologies because of its speed, reliability, the cost, and lastly its ease of installation. Ethernet networks can be configured in either a star topology using UTP connected to a hub or a bus topology using a coaxial cable acting as a backbone. When a computer wants to send data over the network, it will listen to see if there is any traffic on the network, if it is clear, it will then broadcast the data through the network.

Cite this Page

Ethernet or Token Ring Checkpoint. (2017, Feb 03). Retrieved from https://phdessay.com/ethernet-or-token-ring-checkpoint/

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

plagiarism ruin image

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer