Last Updated 19 Jan 2017

Ethernet or Token Ring Checkpoint

Essay type Research
Words 328 (1 pages)
Views 164

Ethernet or Token Ring checkpoint •Saguaro Federal has mainframes for all of its banks and businesses. Must the company use the Ethernet or Token Ring protocol? Explain your choice.

Don't use plagiarized sources. Get Your Custom Essay on

Ethernet or Token Ring Checkpoint

just from $13,9 / page

get custom paper
. Some topologies for this are a ring or star with the ring topology being the more logical choice. The access method used on a Token Ring is called token which is a special data packet that is generated by the first computer that comes online in a token ring network, this token is passed from one station to another around the ring.

A network device only communicates over the network when it has the token. •XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it occupies. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? In the XYZ technology consultants particular situation an Ethernet protocol. What first brought me to this conclusion was due of the company being located in one building on various floors.

Ethernet is one of the most popular and widely used LAN technologies because of its speed, reliability, the cost, and lastly its ease of installation. Ethernet networks can be configured in either a star topology using UTP connected to a hub or a bus topology using a coaxial cable acting as a backbone

Remember. This is just a sample.
You can get your custom paper from our expert writers

get custom paper

Cite this page

Ethernet or Token Ring Checkpoint. (2017, Feb 03). Retrieved from

Not Finding What You Need?

Search for essay samples now

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Your Deadline is Too Short?  Let Professional Writer Help You

Get Help From Writers