answersLogoWhite

0

What else can I help you with?

Continue Learning about Computer Science

What type of network access method is used on a ring network?

Token passing


What is the term for a hub used on a token ring network?

Figure it out your selves If you are doing a National Diploma in IT then you should know this


Assuming the de-528ct cards are compatible with the office network does the lan use ethernet or token ring?

i think the next question is " what is the name of the access method used on the LAN?


What internetworking device is used to connect computers on a Token Ring?

Token ring hub


What roles do various protocols play on the internet?

Best written explaination is from: http://www.edrawsoft.com/Network-Protocol.php Types of Network Protocols The most common network protocols are: Ethernet Local Talk Token Ring FDDI ATM Types of Network Protocols Ethernet The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. The Ethernet protocol allows for linear bus, star, or tree topologies. Data can be transmitted over wireless access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps. Fast Ethernet To allow for an increased speed of transmission, the Ethernet protocol has developed a new standard that supports 100 Mbps. This is commonly called Fast Ethernet. Fast Ethernet requires the use of different, more expensive network concentrators/hubs and network interface cards. In addition, category 5 twisted pair or fiber optic cable is necessary. Fast Ethernet is becoming common in schools that have been recently wired. Local Talk Local Talk is a network protocol that was developed by Apple Computer, Inc. for Macintosh computers. The method used by Local Talk is called CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). It is similar to CSMA/CD except that a computer signals its intent to transmit before it actually does so. Local Talk adapters and special twisted pair cable can be used to connect a series of computers through the serial port. The Macintosh operating system allows the establishment of a peer-to-peer network without the need for additional software. With the addition of the server version of AppleShare software, a client/server network can be established. The Local Talk protocol allows for linear bus, star, or tree topologies using twisted pair cable. A primary disadvantage of Local Talk is speed. Its speed of transmission is only 230 Kbps. Token Ring The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves token-passing. In Token Ring, the computers are connected so that the signal travels around the network from one computer to another in a logical ring. A single electronic token moves around the ring from one computer to the next. If a computer does not have information to transmit, it simply passes the token on to the next workstation. If a computer wishes to transmit and receives an empty token, it attaches data to the token. The token then proceeds around the ring until it comes to the computer for which the data is meant. At this point, the data is captured by the receiving computer. The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to the increasing popularity of Ethernet, the use of Token Ring in school environments has decreased. FDDI Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect two or more local area networks, often over large distances. The access method used by FDDI involves token-passing. FDDI uses a dual ring physical topology. Transmission normally occurs on one of the rings; however, if a break occurs, the system keeps information moving by automatically using portions of the second ring to create a new complete ring. A major advantage of FDDI is speed. It operates over fiber optic cable at 100 Mbps. ATM Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps and higher. ATM works by transmitting all data in small packets of a fixed size; whereas, other protocols transfer variable length packets. ATM supports a variety of media such as video, CD-quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted pair cable. ATM is most often used to interconnect two or more local area networks. It is also frequently used by Internet Service Providers to utilize high-speed access to the Internet for their clients. As ATM technology becomes more cost-effective, it will provide another solution for constructing faster local area networks. Gigabit Ethernet The most recent development in the Ethernet standard is a protocol that has a transmission speed of 1 Gbps. Gigabit Ethernet is primarily used for backbones on a network at this time. In the future, it will probably be used for workstation and server connections also. It can be used with both fiber optic cabling and copper. The 1000BaseTX, the copper cable used for Gigabit Ethernet, is expected to become the formal standard in 1999.

Related Questions

What is access method for ring topologies?

In a ring topology, the access method used is typically token passing. In this method, a token is passed around the ring from one node to the next, allowing nodes to transmit data when they possess the token. This helps in controlling and managing the network traffic in a structured manner.


What type of network access method is used on a ring network?

Token passing


What is the term for a hub used on a token ring network?

Figure it out your selves If you are doing a National Diploma in IT then you should know this


Assuming the de-528ct cards are compatible with the office network does the lan use ethernet or token ring?

i think the next question is " what is the name of the access method used on the LAN?


What internetworking device is used to connect computers on a Token Ring?

Token ring hub


How is a FDDI network like a Token Ring network How is it different?

Both Token Ring and FDDI use the concept of a ring topology structure. However, Token Ring is used in a LAN, and FDDI is used in a MAN.Token Ring is implemented with copper cable (UTP cable) and FDDI uses Fiber Optic cable.Finally, the protocols are very different between the two. FDDI uses a synchronous type of transmission, where Token Ring uses an actual token (a 3 character packet) to control who has access to transmit or receive on the network. FDDI does not use this technique.


Who developed token ring?

IBM created the token ring architecture, which was used for years primarily by Novell.


Why token ring cannot be used in wan?

Token ring is a loacal area network technology. It is limited in ldistance by its physical layer connection requirements.


Nodes transmitting when it is their turn?

You are thinking ring topology. Not used much today.


Can you change the frame type of an Network Interface card in an Ethernet network be used in a token ring network?

no. The differences between ethernet and token ring are greater then the frame type. Ethernet uses CDMA and token ring uses.....well a token. Token ring adapters have an on-board processor for source route bridging which uses a RIF field and ethernet has nothing of the sort. There are many more examples, but the simple answer is it will not work. fm


Is a token a permanent form of authentication?

No, a token is not a permanent form of authentication. Tokens are typically used for temporary access and can expire or be revoked.


What are Ethernet and token ring?

oken-Ring was initially successful for IBM - as most IBM-endorsed technologies are. But beyond IBM, it never garnered much support among top-tier vendors, which gravitated toward Ethernet, the preferred LAN technology of research institutions and manufacturing companies.Token-Ring began its downward spiral soon after the emergence of 10Base-T Ethernet, an inexpensive, 10Mbps transmission technology than ran across telephone grade unshielded twisted-pair copper media. Matters were not helped when Soderblom began demanding royalties from the few Token-Ring vendors and chip makers, driving prices higher.Stations on a token ring LAN are logically organized in a ring topology with data being transmitted sequentially from one ring station to the next with a control token circulating around the ring controlling access. This token passing mechanism is shared by ARCNET, token bus, and FDDI, and has theoretical advantages over the stochastic CSMA/CD of Ethernet. Physically, a token ring network is wired as a star, with 'hubs' and arms out to each station and the loop going out-and-back through each. Cabling is generally IBM "Type-1" shielded twisted pair, with unique hermaphroditic connectors, commonly referred to as IBM data connectors. The connectors have the disadvantage of being quite bulky, requiring at least 3 x 3 cm panel space, and being relatively fragile.Initially (in 1985) token ring ran at 4 M bit/s, but in 1989 IBM introduced the first 16 M bit/s token ring products and the 802.5 standard was extended to support this. In 1981, Apollo Computer introduced their proprietary 12 M bit/s Apollo token ring (ATR) and Proteonintroduced their 10 M bit/s ProNet-10 token ring network in 1984. However, IBM token ring was not compatible with ATR or ProNet-10. Each station passes or repeats the special token frame around the ring to its nearest downstream neighbor. This token-passing process is used to arbitrate access to the shared ring media. Stations that have data frames to transmit must first acquire the token before they can transmit them. Token ring LANs normally use differential Manchester encoding of bits on the LAN media.IBM popularized the use of token ring LANs in the mid 1980s when it released its IBM token ring architecture based on active MAUs (Media Access Unit, not to be confused with Medium Attachment Unit) and the IBM Structured Cabling System. The Institute of Electrical and Electronics Engineers (IEEE) later standardized a token ring LAN system as IEEE 802.5.Token ring LAN speeds of 4 Mbit/s and 16 Mbit/s were standardized by the IEEE 802.5 working group. An increase to 100 Mbit/s was standardized and marketed during the wane of token ring's existence while a 1000 Mbit/s speed was actually approved in 2001, but no products were ever brought to market.