Ethernet or token ring protocol

Assignment Help Operating System
Reference no: EM1379526

Question1. Saguaro Federal has mainframes for all of its banks and businesses. Should the corporations use the Ethernet or Token Ring protocol? Describe your choice. Discuss why is this choice appropriate?
Question2. XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it occupies. Should the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate?
Describe your answers to the two scenarios in a total of 200 to 300 words. Each of your responses should include a description of the main features of the protocol you selected.

Reference no: EM1379526

Questions Cloud

Disk scheduling algorithms : Assume that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is recently serving a request at cylinder 143, and the last request was at cylinder 125.
Disadvantages to living in an information age : Discuss some of the disadvantages to living in an Information Age? At present more and more people rely on computers to create, store, and manage critical information.
Productivity across an organization : Explain how does an company weigh the require to share data to the maximum extent to fully utilize this resource for productivity across an organization.
Steps and sub steps required to start an e business : Discuss the steps and sub steps required to start an e-business. Assume the Idea is already approved and the viability is already established through e-business plan.
Ethernet or token ring protocol : Saguaro Federal has mainframes for all of its banks and businesses. Should the corporations use the Ethernet or Token Ring protocol? Describe your choice. Discuss why is this choice appropriate?
Question about network security : Suppose that you are the network security officer of one corporation, what will be your plan to enhance your network security firewall? VPN, Content level protection or combination of them?
Traditional sdlc and the proposed higher level sdlc : Describe the differences between the traditional SDLC and the proposed "higher-level" SDLC. How could the higher-level SDLC be applied in your corporation?
Regulation of the telecommunications industry : Discuss how has the telephone service changed over the past sixty years also explain how regulation of the telecommunications industry changed and what ar some of the outcomes of that change?
Multitasking scheduling schemas : Think about a particular system that does not have an interrupting clock. The only way a procedure can lose the processor is to voluntarily surrender it.

Reviews

Write a Review

Operating System Questions & Answers

  Challenges os faces-passing parameter among user-kernel mode

Write two challenges an OS faces when passing parameters between user and kernel mode. Describe how an OS can overcome them

  Security monitoring activities in it

Discuss and explain the security monitoring activities that should be conducted in an company with both internal IT and e commerce applications.

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Solving wired versus wireless lan issues

Suppose your local hospital has decided to extend their offices to another department of the building where it is difficult to have cables installed,

  Describe how to prevent race condition from occurring

Function and wife calls deposit (). Explain how a race condition is possible and what might be done to prevent race condition from occurring.

  Discussion on dns for internet operations

Discuss how do you think the DNS is important for internet operations and what would happen if the DNS of your company/orgnization or your provider or root DNS fails?

  Question about software and staff training

As was stated before, the corporation X is going to expand its data system. To do this, it is going to choose and buy new hardware and software and retrain workers.

  Explain basic network security concepts

Explain an example of the Public Key Infrastructure that would describe the differing usages of symmetric and asymmetric encryption and how these encryption technique might use either a substitution or a transposition cipher.

  Question about network security

Suppose that you are the network security officer of one corporation, what will be your plan to enhance your network security firewall? VPN, Content level protection or combination of them?

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Automatic or traditional method to open a file

Some systems automatically open a document when it is referenced for the 1st time and close the file when the job terminates.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd