Sales: Sales: Support: Support:
Academic writing services  
Custom written essay Book report Research paper Dissertation Resume and CV Editing and proofreading  
main menu
By ordering custom paper you get
  • 24/7 Support
  • Over 100 professional US Writers
  • 300 words per page
  • Flexible discount system
  • FREE revision (within 2 days)
  • Anti-Plagiarism Software Check
we accept
sample essays
Accounting Essays
Admission Essays
Analysis Essays
Art Essays
Biography Essays
Biology Essays
Book Review Essays
Business Essays
Case Studies Essays
Cause and Effect Essays
Character Analysis Essays
Communication Essays
Communication and Media Essays
Compute Technologies Essays
Consideration Essays
Controversial Essays
Description Essays
Economics Essays
Education Essays
Evaluation Essays
Explanation Essays
History Essays
Job Essays
Law Essays
Management Essays
Medicine Essays
Music Essays
Personal Essays
Personal Experience Essays
Persuasive Essays
Persuasive Speech Essays
Philosophy Essays
Political science Essays
Politics Essays
Proposal Essays
Psychology Essays
Reflective Essays
Religion Essays
Research Essays
Response Essays
School Essays
Science Essays
Sociology Essays
Technology Essays
World Literature Essays
Migrating from Token Ring essay
← Faith in Leadership of AsiaThe Increasing Use of Water →

Migrating from Token Ring. Custom Migrating from Token Ring Essay Writing Service || Migrating from Token Ring Essay samples, help

Token-ring network emerged in the networking field in 1980s. In that era, it presented unsurpassed performance, reliability, as well scalability characteristics far overwhelming the capabilities of other local area networking technologies. However, during the recent decade, development in Ethernet technology has outdone the capabilities of token-ring. Today, even though there are still countless token-ring equipment s sold yearly, networking experts have almost exclusively opted for Ethernet technology. Things to Consider

Preparation for a switch from token-ring technology to Ethernet technology should comprise of a careful reflection on various components of the network. Adapters and workstations, type of cabling, hubs and switches, Layer 2/ Layer 2 network structure, servers, and network organization (Clark, & Hamilton, 1999).

Adapters and Workstations

For a network device to access a network, it requires an Ethernet adapter. Luckily, various network devices now come with an in-built Ethernet adapter, but for those do not have, adapters are readily available.        

Tools required


This system consist of a set of shielded twisted pair (STP) cable arrangements, connectors as well other hardware that IBM came up with and tested to offer an inclusive building wiring structure for token-ring.

The cable specifications used in ICS token-ring differ from those specified later for Ethernet using unshielded twisted pair. Luckily, the disparity can be handled, and that in most instances present STP cable can be utilized quite efficiently in Ethernet (Clark & Hamilton, 1999).

Rings and stars

Token-ring utilizes ring topology, which has special self-healing features that offer survivability of special network outage scenarios. Ethernet technology is based on a star topology, and redundancy is attained using backup connections and backup switches. One of the first details in scheming for a migration to the Ethernet is to examine the present token-ring cable topology.

Hubs and switches

Ethernet hubs and switches stand for the cabling closet tool of the Ethernet network. Considering the condition of the Ethernet hardware industry at present as well as the price disparity of hubs and switches, switches are specially the favored attachment component for Ethernet client stations.

This network design refers to all the concerns surrounding the placement and linkage of Layer 2 switches and Layer 3 switches or routers. Token-ring technologies were normally structured in a fairly “plain” manner, using more (source routing) bridges and fewer routers than Ethernet technologies.


Each program and/or protocol that runs on a certain server should be listed, so that its appropriateness for the functioning over Ethernet can be ascertained.

Network management should be a major tool of the structure of the new Ethernet technology. Network organization programs and platforms are extensively available.

General Steps Involved in Migration

Like in any other plan, considering the present network is the first and most significant step. To consider the structure of a list of workstations, cabling, closet hubs/switches, LAN main cables, server connectivity/protocols and overall structure is necessary.

Step 2 is to come up with a target network design for the Ethernet technology. This step should consider all the parts mentioned in step one (Dean, 2009). 

Step 3 is to decide on migration staging structure. To settle on how to maneuver the migration of token-ring edge components to Ethernet.

Step 4 is to prepare for the destination network. In this step, the items listed in step will be purchased or put in place. If the existing cabling is utilized, it is advisable to test the cables to make sure of proper specifications with correct connectors intact.

Step 5 is to put the new network backbone in place. This consists of structuring a parallel network to the present token-ring network without users or servers connected.

Step 6 is to tie the new Ethernet main cables to the token-ring main cables through a router or Layer 3 switch.

Step 7 is to move the servers to the new Ethernet technology. In this step, adapters would be connected to the present servers and the servers would be linked to the new Ethernet network (Dean, 2009).

Finally, user groups are migrated basing on the structure already specified above. Owing to the process employed in the migration scheme, new adapters will be put in place. 

Migrating from Token Ring. Custom Migrating from Token Ring Essay Writing Service || Migrating from Token Ring Essay samples, help

Order Now
Order nowhesitating

Related essays

  1. The Increasing Use of Water
  2. Climatology of Mid Latitudes
  3. Faith in Leadership of Asia
  4. Japanese Imperialism and Militarism

order now

Order now
why choose us
96% of satisfied returning customers
24/7 customer support
A wide range of services
Up-to-date sources
100% privacy guaranteed
MA/PhD writers
Custom written papers only
Free plagiarism report (on demand)
Free revision (within 2 days)
Free cover and bibliography page
Direct communication with a writer
Are your writers qualified for the custom writing?
How quick can my order be accomplished?
Is it legal to buy custom essays, term papers or book reports from your company?
Are essays offered by your company truly custom-written?
Is it safe to buy from
How secure is the payment system of your company?
Can I submit custom essays or term papers done by your company as my own?
How can I contact your company if I've got problems with my ordered paper?

Finally, I've found the real custom writing service . My grades are saying "Thank you, it's been a pleasure to work with you."

Jamal, South Africa

I can't believe you finished my essay under such a short deadline! You saved me from a disaster once again. You guys deliver exactly what you promise. I'll be back. That's for sure!

William H , Kansas, US

contact us
Toll free for US & Canada only. International callers are charged for outgoing calls.

Our phone numbers: provides custom term paper writing/rewriting services inclusive of research material for assistance purposes only. The term papers should be used with proper reference and are not meant to replace actual assignments.

Get 15% off your first custom essay order

Order now

from $12.99/PAGE