Token Ring Network:
A token ring network is a local area network (LAN) in which all computers are connected in a ring or star topology and pass one or more logical tokens from host to host. Only a host that holds a token can send data, and tokens are released when receipt of the data is confirmed. Token ring networks prevent data packets from colliding on a network segment because data can only be sent by a token holder and the number of tokens available is controlled.
Ethernet:
Ethernet is the traditional technology for connecting wired local area networks (LANs), enabling devices to communicate with each other via a protocol -- a set of rules or common network language.
As a data-link layer protocol in the TCP/IP stack, Ethernet describes how network devices can format and transmit data packets to other devices on the same local or campus area network segment can recognize, receive and process them. An Ethernet cable is the physical, encased wiring over which the data travels.
Ethernet on Token Ring Network:
If you are considering a network design that has a ring topology and you desire to use Ethernet then there some issues arises of using Ethernet with a ring architecture. Ethernet is traditionally thought of an as a bus or star topology. With the pervasiveness of Ethernet technology, you may find yourself contemplating using Ethernet with a ring architecture. These new extensions to spanning tree allow for fast convergence of Ethernet ring topologies.
If you have ever thought about building a ring topology using Ethernet links you quickly come to realize the limitations of a traditional spanning tree. We are all familiar with the limitations of traditional IEEE 802.1D spanning tree.
The first issue you run into with spanning tree is the convergence times.
The second issue that you encounter is the 7-hop maximum dimension of the spanning tree.
Below is a diagram of a ring Ethernet network. If one switch is the root of the spanning tree then another switch somewhere on the opposite side of the ring will have a port leading to the root in blocking mode. Therefore, the topology under normal circumstances would be a long line of Ethernet switches. If a failure were to occur somewhere on the ring then the spanning tree protocol will need to converge the topology which can take longer then desired. The second byproduct is that the interfaces on the STP root will be oversubscribed and probably higher utilized with the cumulative traffic volumes traversing the ring.
Ethernet vs Token Ring:
a) Ethernet network interface cards cannot operate on a passive hub but Token ring can operate on a passive hub.
b) Ethernet does have access for priority system but Token ring doesn't have any access for priority system on the token.
c) Token Ring is more reliable as only one node send data which cause no collision.
d) Token Ring is Slow than Ethernet, as only one node send data at a time. Therefore not good for very large network
e) Ethernet is more secure than Token Ring. Because in Token Ring, data passes through each node whereas in Ethernet data packet is managed by HUB or Switch.
do q1 if i have to post q2 again and typed please! typed pleaae! the goals for q2) connectivity reliable performance...
Explain each of the good network design goals. Connectivity / Reliable performance / Management control and security / Scalability/ typed please
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...