Ethernet or token ring protocol

Assignment Help Operating System
Reference no: EM1379526

Question1. Saguaro Federal has mainframes for all of its banks and businesses. Should the corporations use the Ethernet or Token Ring protocol? Describe your choice. Discuss why is this choice appropriate?
Question2. XYZ Technology Consultants has offices on the second, third, and fourth floors of the office building it occupies. Should the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate?
Describe your answers to the two scenarios in a total of 200 to 300 words. Each of your responses should include a description of the main features of the protocol you selected.

Reference no: EM1379526

Questions Cloud

Disk scheduling algorithms : Assume that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is recently serving a request at cylinder 143, and the last request was at cylinder 125.
Disadvantages to living in an information age : Discuss some of the disadvantages to living in an Information Age? At present more and more people rely on computers to create, store, and manage critical information.
Productivity across an organization : Explain how does an company weigh the require to share data to the maximum extent to fully utilize this resource for productivity across an organization.
Steps and sub steps required to start an e business : Discuss the steps and sub steps required to start an e-business. Assume the Idea is already approved and the viability is already established through e-business plan.
Ethernet or token ring protocol : Saguaro Federal has mainframes for all of its banks and businesses. Should the corporations use the Ethernet or Token Ring protocol? Describe your choice. Discuss why is this choice appropriate?
Question about network security : Suppose that you are the network security officer of one corporation, what will be your plan to enhance your network security firewall? VPN, Content level protection or combination of them?
Traditional sdlc and the proposed higher level sdlc : Describe the differences between the traditional SDLC and the proposed "higher-level" SDLC. How could the higher-level SDLC be applied in your corporation?
Regulation of the telecommunications industry : Discuss how has the telephone service changed over the past sixty years also explain how regulation of the telecommunications industry changed and what ar some of the outcomes of that change?
Multitasking scheduling schemas : Think about a particular system that does not have an interrupting clock. The only way a procedure can lose the processor is to voluntarily surrender it.

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Formulate the linear programming model for this problem

Formulate the linear programming model for this problem Plot a graph indicating and labelling clearly all the constraints, the feasible region (R) and the optimal point (X)

  Hardware and software requirements for ehr systems

Recognize the hardware and software requirements to connect in dissimilar EHR systems. Discuss the solutions that have been suggested through the Federal Government and private organizations.

  Write a java program on professional expression assignment

Write a java program on Professional Expression Assignment

  Focuses on software development process and life cycle model

Discuss how would you address this certification issue with your hypothetical firm for your system that you are trying to certify at the top secret level?

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  P2p file distribution protocol

In the BitTorrent P2P file distribution protocol, the seed breaks the file into blocks, and the peers redistribute the blocks to each other.

  Explain basic network security concepts

Explain an example of the Public Key Infrastructure that would describe the differing usages of symmetric and asymmetric encryption and how these encryption technique might use either a substitution or a transposition cipher.

  Explain decision variables in relation to linear programming

Explain the following terms in relation to linear programming problems- (1) decision variables (2) objective function

  Web security threats

Think about the given threats to Web security and explain how each is countered by a particular feature of SSL.

  Advantages and disadvantages of major operating system

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. In a one-page memorandum to Amy.

  Fragmented mean in reference to hard drives

What does fragmented mean in reference to hard drives, and what, if anything, should be done to prevent it. Describe the general path data takes in an application from user input to the computer hardware.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd