Token-ring network emerged in the networking field in 1980s. In that era, it presented unsurpassed performance, reliability, as well scalability characteristics far overwhelming the capabilities of other local area networking technologies. However, during the recent decade, development in Ethernet technology has outdone the capabilities of token-ring. Today, even though there are still countless token-ring equipment s sold yearly, networking experts have almost exclusively opted for Ethernet technology. Things to Consider
Preparation for a switch from token-ring technology to Ethernet technology should comprise of a careful reflection on various components of the network. Adapters and workstations, type of cabling, hubs and switches, Layer 2/ Layer 2 network structure, servers, and network organization (Clark, & Hamilton, 1999).
Adapters and Workstations
For a network device to access a network, it requires an Ethernet adapter. Luckily, various network devices now come with an in-built Ethernet adapter, but for those do not have, adapters are readily available.
This system consist of a set of shielded twisted pair (STP) cable arrangements, connectors as well other hardware that IBM came up with and tested to offer an inclusive building wiring structure for token-ring.
The cable specifications used in ICS token-ring differ from those specified later for Ethernet using unshielded twisted pair. Luckily, the disparity can be handled, and that in most instances present STP cable can be utilized quite efficiently in Ethernet (Clark & Hamilton, 1999).
Rings and stars
Token-ring utilizes ring topology, which has special self-healing features that offer survivability of special network outage scenarios. Ethernet technology is based on a star topology, and redundancy is attained using backup connections and backup switches. One of the first details in scheming for a migration to the Ethernet is to examine the present token-ring cable topology.
Hubs and switches
Ethernet hubs and switches stand for the cabling closet tool of the Ethernet network. Considering the condition of the Ethernet hardware industry at present as well as the price disparity of hubs and switches, switches are specially the favored attachment component for Ethernet client stations.
This network design refers to all the concerns surrounding the placement and linkage of Layer 2 switches and Layer 3 switches or routers. Token-ring technologies were normally structured in a fairly “plain” manner, using more (source routing) bridges and fewer routers than Ethernet technologies.
Each program and/or protocol that runs on a certain server should be listed, so that its appropriateness for the functioning over Ethernet can be ascertained.
Network management should be a major tool of the structure of the new Ethernet technology. Network organization programs and platforms are extensively available.
General Steps Involved in Migration
Like in any other plan, considering the present network is the first and most significant step. To consider the structure of a list of workstations, cabling, closet hubs/switches, LAN main cables, server connectivity/protocols and overall structure is necessary.
Step 2 is to come up with a target network design for the Ethernet technology. This step should consider all the parts mentioned in step one (Dean, 2009).
Step 3 is to decide on migration staging structure. To settle on how to maneuver the migration of token-ring edge components to Ethernet.
Step 4 is to prepare for the destination network. In this step, the items listed in step will be purchased or put in place. If the existing cabling is utilized, it is advisable to test the cables to make sure of proper specifications with correct connectors intact.
Step 5 is to put the new network backbone in place. This consists of structuring a parallel network to the present token-ring network without users or servers connected.
Step 6 is to tie the new Ethernet main cables to the token-ring main cables through a router or Layer 3 switch.
Step 7 is to move the servers to the new Ethernet technology. In this step, adapters would be connected to the present servers and the servers would be linked to the new Ethernet network (Dean, 2009).
Finally, user groups are migrated basing on the structure already specified above. Owing to the process employed in the migration scheme, new adapters will be put in place.