Ethernet or Token Ring

In: Computers and Technology

Submitted By mrsynge
Words 385
Pages 2
Ethernet or Token Ring

Ethernet or Token Ring
I had an issue with this question that I have to address before I answer it. I understand that the answer that you are looking for is token ring for this scenario but the scenario lacks appropriate detail to really make the decision. It does not tell you the specific type of setup that the bank has or if there even is one. Not to mention that token ring is almost completely dead as far as LAN is concerned. There is no reason that the bank could not use an ethernet setup to accomplish its set goals. I just wish the assignment as a whole would be a little more detailed. That being said lets get to the scenario.
Saguaro Federal should use a token ring. I say this because of the topology and function of a token ring. The general overview of a token ring is a circle. Within this circle each system is connected through a MAU by either UTP or STP. The token refers to a data packet that travels around the ring to its destination or destinations. The bank would benefit from a token ring because of the closed aspect of the network, and also because of the one way traffic that happens within the ring. You would avoid data collisions and by using a token ring you can predict the travel time of your data packet arrival. The security aspect of a token ring suits the needs of a financial institution, but also costs more money and difficult technical aspects.
XYZ Technology Consultants would benefit for an ethernet setup. Since the company is centrally located in one building and ethernet setup would make more logical sense. Not only is an ethernet setup easier to install, plan, and all at lower costs the topology can be setup in a variety of ways that would best suit the company. The versatility that an ethernet setup offers would benefit a smaller company such as the one in the scenario. If the company needs to…...

Similar Documents

Aladdin and the Rings

...Aladdin and the Rings Fairy tales have been around for countless centuries, and their impact on story telling is still extremely influential to this day. The main morals that these tales first displayed is still what drives the plotlines of countless movies and books today. There is a large amount of these entertaining stories that owe credit to the original plots and morals of fairy tales. One fairy tail in particular that stands out when it comes to repeating plots and morals among today’s stories is Aladdin, more specifically Aladdin’s heroic qualities and his will to overcome adversary and obstacles. Aladdin is a folk tale that originated in the Middle East; it was included in the vast book of tales known as “The book of one Thousand and One Nights,” which is better known as “Arabian Nights.” The true origins of Aladdin are not precisely known, but some say a Frenchman wrote the tale in 1704, his name was Antoine Galland (Aladdin's origins likely European, and not Arabic). Many claim it is a possibility that Galland also took the tale and made it sound more Arabic, explaining why it was then put into “Arabian Nights.” (Aladdin's origins likely European, and not Arabic) Aladdin was also made into a film in 1992 by Walt Disney pictures, which altered the original story details to those of their liking for the production (IMDB). I believe that the plot of Aladdin and the morals it tries to convey are extremely similar to a particular series of books, which was......

Words: 2374 - Pages: 10

Ring Medicals

...| Case Analysis Ring Medicals | | | | | | Major Issues Paul Ruggieri; President and CEO of Ring Group strongly believed that the HCS-100 product could well represent the single major opportunity for the company to turn profit however this is with some major issues faced by the firm which includes, * An average of two to three units a month are expected to sold which would yield a total revenue of $150,000 per month at average gross margin of nearly 50%. As of April 1988, only 5 systems where sold versus a budgeted sales of over 30 annually. Revenues totaled about 15% of the targeted annual amount of over $1.7 billion. * The company appointed 8 manufacturers rep with 20% commission on sales however the sales through them was only one system. The reason was highlighted as lack of consistency in the product policy, pricing and customer support in the region. * Scanvest Ring had spent an excess of $700,000 on the HCS-100 effort and the board of members are hesitant to invest any further in this as there is no good result with the investments made as of now. * The price of Ring ACD which was priced 50% - 80% above the US competition. * Management unwillingness to allow Ring Group to make revision in Scanvest Ring or to customize it. * Disagreement in the most appropriate distribution channel wherein three thoughts prevailed in them. Actionable Recommendations HCS-100 served to improve the cost and effectiveness and quality of......

Words: 375 - Pages: 2

The Lord of the Rings

...The Lord of the Rings: the longest fable ever told It is no secret that The Lord of the Rings has been one of the most beloved trilogies ever written. It has conjured up a fanatical group of followers over its history. The question is why is this book so beloved? Why when we pick up this book are we so enthralled with it? What about this book keeps us coming back for more? I believe for this book that it is because it has so many great messages hidden inside a package wrapped with adventure. A book becomes great when we can relate to its messages and characters very deeply. The never ending battle of good versus evil goes on to this day all around us. This book tells us everything that we should and should not do in our lives. It is like reading the entire collection of Aesop’s fables at one sitting. I don’t think that I have ever been so moved to laughter and tears by written words. The morals of this story are the reasons that I will list for its greatness. I will start with a fierce warning against the evils of greed. The dwarves of Moria were a great and powerful race. They lived in this particular mountain because they could find the mithril ore no where else in the world. It was very light but very hard, excellent for making weapons and armor. They became very greedy and delved deeper and deeper into the ground to keep there supply coming. They were warned that evil things lie deep in the ground, but they did not heed these warnings. It was there doom.......

Words: 1386 - Pages: 6

Ethernet Wire

...Ethernet Cabling Pin-Out On the back of each keystone jack is a two-sided connector that is labeled with similar colors. In the keystone jack we're using, the label has sets of colors labeled A and B. This refers to the two main wiring standards used in Ethernet, 568A and 568B. You can use either standard as long as you are consistent with that standard throughout your installation. Using the 568B standard, the left side of our keystone jack is labeled (from top to bottom) blue, white-blue, orange, whiteorange, and the right side is labeled green, white-green, brown, white-brown. Working from the top, place the specified color in the corresponding slots on the top row of slots on connector. Try not to untwist the wire, since the Ethernet standard requires the wires stay twisted down to the last 1/2 inch. ETHERNET CABLE: COLOR-CODE STANDARDS The information listed here is to assist Network Administrators in the color coding of Ethernet cables. Please be aware that modifying Ethernet cables improperly may cause loss of network connectivity. Use this information at your own risk, and insure all connectors and cables are modified in accordance with standards. The Internet Centre and its affiliates cannot be held liable for the use of this information in whole or in part. T-568A Straight-Through Ethernet Cable The T-568A standard is supposed to be used in new network installations. Most off-the-shelf Ethernet cables are still of the T-568B standard; however, it makes......

Words: 1012 - Pages: 5

Java Ring developing a new Java-based, computerized ring that will automatically unlock doors and log on to computers. This mobile computer can become even more secure. You can keep the iButton with you wherever you go by wearing it as a closely guarded accessory - a watch, a key chain, a wallet, a ring - something you have spend your entire life practising how not to lose. Here are a few reasons why you might want to wear the iButton in the accessory that best fits your life style : ◆ It is a safe place to keep the private keys to conduct transactions. ◆ It overcomes the deficiencies of the secret password. ◆ You eliminate keystroke with a quick, intentional press of the Blue Dot. ◆ You keep your computer at hand versus lugging your everywhere you roam ◆ You become part of the network economy ◆ This steel-bound credential stands up to the hard knocks of everyday wear, including sessions in the swimming pool or clothes washer What is Java Ring? A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger. Sun Microsystem's Java Ring was introduced at their JavaOne Conference in 1998 and, instead of a gemstone, contained an inexpensive microprocessor in a stainless-steel iButton running a Java virtual machine and preloaded with applets (little application programs). The rings were built by Dallas Semiconductor. ......

Words: 7793 - Pages: 32

The Evolution of Ethernet

...Evolution of Ethernet * 1973 - Bob Metcalfe, working at Xerox's Palo Alto Research Center, was told to come up with a way to link hundreds of computers to the company's new laser printers. Metcalfe created a diagram describing a design for Ethernet at 3Mbps over shared coaxial cable. * 1976 - Metcalfe and David Boggs publish a paper entitled: "Ethernet: Distributed Packet-Switching for Local Computer Networks." The paper defines multipoint data communication system with collision detection. * 1979 -Metcalfe leaves Xerox and founds 3Com. The next year, he publishes standard for 10Mbps Ethernet, known as the DIX standard (for Ethernet backers Digital, Intel and Xerox). * 1985 - The IEEE becomes the official standards body for Ethernet. Open standards help make Ethernet the dominant LAN technology. * 1986 - IEEE publishes standard for 10Base5 Ethernet, also known as thick Ethernet because it ran over yellow coax that resembled a garden hose. * 1989 - Start-up Kalpana introduces first Ethernet switch, which eventually replaces bridges and hubs. The Cisco Company buys out Kalpana. * 1991 - IEEE approves 10Base-T Ethernet over Cat-3 twisted pair cabling, which becomes the standard for LAN deployments. * 1994 - IEEE approves 10BaseF, Ethernet over fiber for use in data centers. * 1995 - IEEE adopts standard for Ethernet at 100Mbps. It becomes known as Fast Ethernet. * 1998 - Standard for 1000Base-T or Gigabit Ethernet is approved. * 2002...

Words: 277 - Pages: 2

Lord of the Rings

...Lord of the Rings and Modern Day Epic? Epic adventures are one of the oldest and most celebrated works of literature. These adventures paint pictures of larger-than-life heroes, terrifying battle scenes, and heroic triumphs. Most epics served the purpose of transmitting culture and history, as well as entertaining readers. Among classical epics are the well-known Epic of Gilgamesh, The Iliad, and The Odyssey. However, is the epic adventure a dying breed of literature? Is it possible that epic stories have sustained the test of time and evolved over the centuries? The Lord of the Rings trilogy, including The Fellowship of the Ring, The Two Towers, and The Return of the King, is one of the greatest examples of a modern day epic. What do The Iliad, The Odyssey, The Epic of Gilgamesh, and The Lord of the Rings all have in common? They all share typical characteristics of epic adventures in some form or another. Though the motives and reasons may differ, the theme of journeying is common to all epic adventures. In The Epic of Gilgamesh, King Gilgamesh sets out on a perilous adventure with his closest friend Enkidu in order to find enduring fame and glory. In The Odyssey, the main character Odysseus embarks on a 10 year-long journey through trials and tests to find his way back home to his wife and son. Epic hero Achilles, of The Iliad, sets out to fight in the legendary Trojan War. Similarly, Frodo Baggins, unassuming hero of The Lord of the Rings, sets out from his home......

Words: 2317 - Pages: 10

Gyges’ Ring

...GYGES’ RING Glaucon's initial speech in Plato’s book II of the Republic tells “The story of Gyges the Lydian”. Glaucon steps in when Thrasymachus has been silenced by Socrates and uses the story to defend the opinion that people don't practice justice for itself, but only because they fear what would happen to them if they don't. On this paper I will provide an example of a situation in which a just person may choose to do the unjust in order to get what he/she desires, if he/she would not be punished for doing so. Maya was a great high school volleyball player, during her junior year she was invited to spend a summer in California playing volleyball with girls from all around the world. All the girls in this program were very skilled and talented, so Maya did not stand out as much as she used to. During her stay, she made a lot of friends, but she had become extremely close friends with one girl in particular, Joy. Joy was by far the most athletic girl in the program. Although her technique was not so unique, she had amazing reflexes and she could out jump and out run everyone else. Joy had no plans to play for any Division I Universities in the U.S. ; she already had a contract coming up the following year to play for a professional team in Europe, and the purpose of this program for her was only to achieve more playing time and experience, not recruitment. Maya had become amazed by how well Joy performed every day, so one day she talked to Joy about her dreams of......

Words: 983 - Pages: 4


...Ethernet standards continue to transcend boundaries and play ever-expanding roles in global communications, from fast Ethernet to 1terabit Ethernet standard. IEEE, the world's largest professional organization advancing technology for humanity, celebrated Ethernet's 40th anniversary on May 22 2013. IEEE 802.3 "Standard for Ethernet" and the varied technologies, applications and networks that the family of standards helps enable have changed the world as we knew it, and multi-dimensional innovation never stops. Frontiers of IEEE 802.3 Ethernet innovation include ever-increasing speeds and new applications for the technology. For example, in April 2013, IEEE announced the launch of an IEEE 802.3 study group to explore development of a 400 Gb/s Ethernet standard to efficiently support ever-increasing, exponential network bandwidth growth. Fast-growing IEEE 802.3 Ethernet application areas include energy efficiency, the globally emerging smart grid, data centers and supercomputing, access networks, mobile-communications infrastructure, healthcare and medical-device communications, entertainment and networking for automotive and other industries. Furthermore, in both developed and developing areas of the world, IEEE 802.3 Ethernet is being deployed with infrastructure build outs to support the exploding array of applications that users rely on in their every-day lives. Initially developed in order to standardize connectivity among computers, printers, servers and other devices......

Words: 420 - Pages: 2

It 242 Ethernet or Token Ring

...Ethernet or Token Ring Checkpoint Keitha Hinkle IT 242 03/27/2014 LaTrea Shine Ethernet or Token Ring Checkpoint Sanguaro federal has mainframes for all of its banks and businesses, must the company use the Ethernet or token ring protocol. I feel this would be a good option because the bank and businesses are probably not all located in the same building. So if they are located in separate buildings it would be the best option. In a token ring LAN each station is connected to a center wiring concentrator. This is called a multi-station access unit using a UTP or an STP. The access method that is used is called Token. This type of method is a special data package that is generated by the first computer which connects to the token ring network and then passed from one station to another station around the ring. This type of device only communicates over the network when it has the token. XYZ technology consultation has offices on the second, third, and fourth floors of the office building it occupies. Most of the company uses the Ethernet or token ring protocol. Explain your choice. Why is this choice appropriate? I think for this situation I would suggest an Ethernet protocol. I think this would be a better choice because the company is all located in the same building just on different floors. This is the most common type and popular used LAN technology. This is due to its reliability and ease of installation as well as its cost. An Ethernet network can be......

Words: 330 - Pages: 2

Gigabit Ethernet

...Table of Contents Introduction 2-4 Reasons 4-5 Advantages 5 Disadvantages 5 Summary 6 Reference 7 Introduction     The Ethernet is a system used in the connection between a number of computers to form a Local Area Network(LAN), which consist of the physical and data link layer. During the 1980s, one of the first widely deployed Ethernet supported a theoretical data rate of 10Megabit per second(Mbps). Over the years through the advancement of technology, the maximum data rates were increased to 100Mbps to todays peak performing a whopping 1Terabit per second(Tbps), but only active in area of research. As workplaces slowly become a more computerised and network based, with the rise of emails and the internet, Ethernet has become more prevalent. Every computer that requires a connection to another or link to systems uses the Ethernet. The computers you use at home, in your office at work, in school that accesses the internet through the use of the Ethernet.     Ethernet LANs consist of network nodes and interconnecting media. The network nodes fall into two major classes: Data terminal equipment (DTE) - Devices that are either the source or the destination of data frames. DTEs are typically devices such as PCs, workstations, file servers, or print servers that, as a group, are all often referred to as end stations. Data communication equipment (DCE) - intermediate network devices that receive and......

Words: 1657 - Pages: 7

Ethernet Token Ring

...[Ethernet or Token Ring] [Ricky Clark] [IT/242] Due: [6/20/2014] [Sokly Vann] Saguaro Federal has mainframes for all of its banks and businesses. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? In this particular situation I would have to say that the token ring protocol should be used for its banks and businesses and the reason that I say this is because the banks and business seem to not all be located in the same building they are spread out. In Token Ring LAN’s each station is connected to a wiring concentrator called a multistation access unit using UTP or STP. The access method which is used on a Token Ring is called token which is a special data packet that is generated by the first computer that comes online in a token ring network With this being said this seems the most reasonable and secure because the computers cannot operate without a token from the other. XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it occupies. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate? In the XYZ technology consultants situation I would suggest an Ethernet protocol. The reason that I came to this conclusion was due in part of the company being located in one building on various floors so everything is central. Ethernet is the most used networking that is available because of the pricing......

Words: 346 - Pages: 2

Olympic Rings

...In 1913, when Baron Pierre de Coubertin first sketched five interlocking rings – blue, black, red, yellow and green – on a white background, it would have been difficult to imagine the impact they would have over the course of the next century and beyond. The origin of the Rings Coubertin had conceived the rings as an “international emblem” to  reflect the global reach of the Olympic Movement following the 1912 Olympic Games in Stockholm, which was the first time that athletes had come from all five continents to compete. One year later, the five rings first appeared at the top of a letter written by Coubertin. “These five rings represent the five parts of the world now won over to Olympism and ready to accept its fruitful rivalries,” wrote Coubertin in a 1913 edition of Olympic Review. “In addition, the six colours combined in this way represent the colours of every country, without exception. This is a real international emblem.” The Olympic rings made their official debut at the IOC Congress in Paris in 1914 and were seen at the Olympic Games for the first time in 1920, when the Olympic flag was first raised in Antwerp. Since then, the rings have gone on to become one of the world’s most recognised symbols, seen by billions of people during each edition of the Games and spread throughout the world as the official symbol of the Olympic Movement. The global recognition of the Olympic rings is down to the uniqueness of the symbol and the meaning each one of us......

Words: 1329 - Pages: 6

Lord of the Rings

...going to analyze an excerpt from Lord of the rings, where we hear about Bilbo baggins turning eleventyone 111 and Frodo be coming of age at 33. * What are you going to analyze - We are going to analyze the mysterious circumstances of Bilbo’s age, and why hobbits become of age at 33. * Analysis – what is important? * Frodo becoming of age at 33, could be because of people having such a high life-expectancy. Bilbo’s adventure, and his rich treasures. What kind of treasure he might have stumbled upon on his trip. For example the ring. “Bilbo was very rich and very peculiar, and had been the wonder of the Shire for sixty years, ever since his remarkable disappearance and unexpected return. The riches he had brought back from his travels had now become a local legend, and it was popularly believed, whatever the old folk might say, that the Hill at Bag End was full of tunnels stuffed with treasure. And if that was not enough for fame, there was also his prolonged vigour to marvel at. Time wore on, but it seemed to have little effect on Mr. Baggins. At ninety he was much the same as at fifty. At ninety-nine they began to call him well-preserved, but unchanged would have been nearer the mark. There were some that shook their heads and thought this was too much of a good thing; it seemed unfair that anyone should possess (apparently) perpetual youth as well as (reputedly) inexhaustible wealth. * One may argue that the ring may be his source of life. * The......

Words: 349 - Pages: 2

Ethernet, Local Talk, Token Ring

...Ethernet The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps. Ethernet is a physical and data link layer technology for local area networks (LANs). Ethernet was invented by engineer Robert Metcalfe. It uses wires (meaning it is not a wireless technology). The wires used for a LAN are mostly those headed by an RJ-45 jack, which is similar to the jack plugged into your telephone set, but twice as big. Some Ethernet networks use coaxial cables, but that’s rarer, and present in rather large LANs, which span over areas between buildings. Ethernet is by......

Words: 2787 - Pages: 12

Sport & Action Videokameras | Descarga Dlc PS3 | Bounty Hunters (2011)