Point out the drawbacks of token ring, Computer Networking

Assignment Help:

Point out the drawbacks of Token Ring.

Few of the drawbacks of Token Ring are:

a. Token Ring is very costly. All topology components cost much more than other more popular standards.

b. Token Ring is relatively proprietary. Token Ring's complexity is built into the hardware components. This means that you require choosing a manufacturer and sticking with it.

c. Engineers must have considerable expertise to manage and troubleshoot token ring components.

 


Related Discussions:- Point out the drawbacks of token ring

What is an arp and how does it work, ARP(ADDRESS RESOLUTION PROTOCOL) is a ...

ARP(ADDRESS RESOLUTION PROTOCOL) is a network layer protocol which associates the physical hardware address of a network node(commonly called as a MAC ADDRESS) to its ip address. n

What is meant by asymmetric multiprocessing, What is meant by Asymmetric Mu...

What is meant by Asymmetric Multiprocessing (AMP)? It imposes hierarchy and a division of labor between processors. Only one designated processor, the master, controls (in a ti

Compute shortest path, Compute the shortest path from t to all network node...

Compute the shortest path from t to all network nodes.

Components of the vpn - point to point , Components of the VPN When  us...

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

Coffee and Company Security Case Study, This is a report, I am working on a...

This is a report, I am working on another one. This report is on finding a better solution dealing with customer, wifi, management, etc.

Explain the 802.11 fhss, 802.11 FHSS Frequency-hopping spread spectrum ...

802.11 FHSS Frequency-hopping spread spectrum in a 2.4 GHz band Carrier sends on one frequency for short duration then hops to another frequency for same duration, hops agai

Controlling and monitoring access to the intranet, Controlling and monitori...

Controlling and monitoring access to the Intranet Digital certificates provide excellent means of controlling and monitoring access to the Intranets. The certificate itself act

Recognize the definition of demarcation, Demarcation is the point in which ...

Demarcation is the point in which responsibility changes hands.

What is network architecture, What is Network Architecture? When two o...

What is Network Architecture? When two or more computer are linked with one another for the purpose of communicating data electronically, besides physical connection of comput

Give the types of firewalls, Give the types of firewalls Conceptually,...

Give the types of firewalls Conceptually, there are two types of firewalls: 1.  Network Level 2.  Application Level Network Level Firewall/Packet Filters The Net

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd