Tuesday, September 23, 2008

Meliza C. Lerio

1. Explain the circumstances under which a token-ring network is more
effective than an Ethernet network.

ETHERNET VS TOKEN RING NETWORK

My suggestion would be to convert to Ethernet. Not that token ring wouldn?t work fine, but Ethernet has become more of the standard being used today. Ethernet has faster speeds available today and much faster speeds on the horizon (1000BaseT and 10000BaseT). Also Ethernet equipment is cheaper. Probably the best reason however, is that Ethernet is a non-deterministic protocol. Token ring on the other hand is deterministic, which means that the data (frames) must pass through every device on the network on its path to its destination. In a large network, this can cause heavy network traffic jams. Ethernet is much more efficient for large networks, which will give you plenty of growth potential for your environment.


Ethernet and Token Ring LAN technologies operate in different ways and both systems have their inherent advantages and disadvantages. The decision on which topology to use can be influenced by a number of factors. The most common factors to consider are cost, reliability, speed, size, administration, security and growth.

Ethernet is a frame-based computer networking technology for local area networks (LANs). It defines wiring and signaling for the physical layer, and frame formats and protocols for the media access control (MAC)/data link layer of the OSI model. Ethernet is mostly standardized as IEEE 802.3. It has become the most widespread LAN technology in use during the 1990s to the present day. Each network peer has a globally unique 48-bit key known as the MAC address factory-assigned to the network interface card (NIC), to ensure that all systems in an Ethernet LAN have distinct addresses. Due to the ubiquity of Ethernet, many......






TOKEN RING NETWORK



The advantages of Ethernet are cost, availability of materials, the fact that most PCs come with network cards that support Ethernet connectivity and speed. Data transfer rates can range from 10 Mbps to 10 Gbps. The main disadvantages are as network loads increase performance goes down and troubleshooting network issues can be difficult if you are using a bus topology.
The token ring architecture was developed by IBM in the mid 1980s and provides users with fast, reliable data transport. Token ring is based upon the IEEE 802.5 standard and the networks are wired in a star topology configuration but act as a logical ring.

The main advantages that token ring offers over Ethernet are a more efficient use of network resources between users, better network stability and network expansion can be achieved without a significant drop in performance. The ring topology allows for users to share traffic without necessarily overloading the network. The obvious disadvantages are cost and the complexity of implementing such a network.

One scenario where token ring may be used over Ethernet is in the case of a travel agency. Each travel agent would need to frequently access data over a network for reservation and booking information. In a token ring topology, each request would be sent to each user station so that all users have access to the data in the order that their machines are connected in the ring. The data would be transported over the network to each user instead of having that data travel to each individual user at the time that it's requested. By organizing how data is accessed, token ring offers a more efficient data access method. If one were to use an Ethernet network in this situation, the network would experience constant bottlenecks every time more than one user wanted to access the reservation database. Ethernet doesn't work well in environments where data is frequently accessed over the network by many users. Token ring allows for speedy yet efficient data access methods leading to fewer bottlenecks. Furthermore, the test procedures implemented with this topology would be helpful to troubleshoot and maintain the network.

Source: http://en.wikipedia.org/wiki/Token_ring

http://en.wikipedia.org/wiki/Ethernet


2. Although security issues were not mentioned in this chapter, every network owner must consider them. Knowing that open networks all data to pass to every node, describe the posssible security concerns of open network achitectures. include the implications of passing logon procedures, user IDs, and passwords openly on the network.

In the development of computer networks, the spread of malicious network activities poses great risks to the operational integrity of many organizations and imposes heavy economic burdens on life and health. Therefore, risk assessment is very important in network security management and analysis. Network security situation analysis not only can describe the current state but also project the next behaviour of the network. Alerts coming from Firewall and other security tools are currently growing at a rapid pace. Large organizations are having trouble keeping on top of the current state of their networks. The implicatiions of passing logon procedures, user IDs, and passwords openly on the network are great risk to protect critical information on the network. Appropriate access controls assist to protect information processed and stored in computer systems. The organisation's system security policy must clearly define the needs of each user or group to access systems, applications and data. The file-access rights should be configured according to business requirements and the "need to know" principle. Formal procedures should control how access is granted to information-system services or how such access is changed, so as to prevent unauthorised access to data or system resources. Access control can start by allowing access to everything, and then revoking access to whatever systems, applications or data repositories a user does not need. However, it is better to start by denying access to everything, and then explicitly granting access to just the specific resources a user needs. Secure logon procedures can control access to host-based information systems. Logon procedures should reveal minimal information about the system, to deter unauthorised use.

Source:http://support.novell.com/techcenter/articles/ana19960802.html


3. Remembering the discussion of deadlocks, if you were designing a
networked system, how would you manage the treat of deadlocks in
your network? Consider all of the following: prevention, detection,
avoidance, and recovery.

In an apparatus having a network including successive stages of cross-point switches which collectively interconnect a plurality of nodes external to said network, wherein at least one message is carried between one of the nodes and one of the cross-point switches over a route through said network, a method for preventing routing deadlocks from occurring in the network which comprises the steps of: creating a graphical representation of the network; searching for the existence of cycles within the graphical representation; partitioning the graphical representation into at a first subgraph and a second subgraph if cycles exist in the graphical representation; searching for the existence of edges directed from the first subgraph to the second subgraph; and removing the edges directed from the first subgraph to the second subgraph. Preferably the step of partitioning the network into at a first subgraph and a second subgraph is performed such that the first subgraph and the second subgraph have an equal number of vertices, a number of directed edges from the first subgraph to the second subgraph is minimized so as to minimize the number of routes prohibited, and a set of partition constraints are satisfied. The method is recursively applied to the first subgraph and then the second subgraph, thereby removing all of the deadlock prone cycles in the network while minimizing the number of routes prohibited due to remove edges.



4. Assuming you had sufficient funds to upgrade only one component for a system with which you are familiar, explain which component you would choose to upgrade to improve overall performance, and why?

At present, both business and personal transactions take place through the computer more specifically through the Internet. Be it banking or job interview the need for an optimized computer with all the latest add-ons is imperative. Therefore the need for a user-friendly registry cleaner, easily assessable and trouble free operating system is the need of the hour. The system registry is where both the much needed as well as some unnecessary datas are stored for the smooth running of the system. Every time the system connects with the registry to open, install or run programs on a computer. Thus considering the registry as an important component in a computer a clean registry has to be maintained for hassle free performance. Windows registry cleaner help maintains the registry operations by scanning and cleaning up the problematic fragments which cause error messages or slows down the system performance. The registry cleaner also secures the important configuration and other password related files for future usage. The registry cleaner also setup startup registry cleaning function which might automatically cleanup the registry on every startup of the computer. The registry cleaner can also identify missing or corrupt hardware drivers, or orphaned software programs during its operation. It is a vivid report about the files cleaned and the error files with which you can either manually or automatically clean up the registry. Many free registry cleaner downloads are available and it is important to choose the right registry cleaner suited to your system requirements. For the sole purpose of maintaining a clean registry, free registry cleaner downloads, are widely available online as freeware. Almost all windows operating system from windows 98/2000/20002/xp to the latest windows vista need these registry cleaners for effective and smooth operation. Modifying the system registry can cause serious problems and you might even reinstall the whole operating system. Thus a high performance registry cleaner should be chosen with great care so as not to damage the registry thereby stranding the whole system performance. Most freeware that boast of thorough registry check may not be that useful and as one has to choose these registry cleaners at one's own personal risk, careful study of the free registry cleaner downloads available must be first scrutinized before actually downloading the freeware. Whatever be your ultimate choice the purpose of effective cleaning of the registry is the top priority, which one should never postpone or forget.

Source: http://groups.google.com/group/regrepairsbv/browse_thread/thread/c2259dc0a9f67eae