Posted on 2006-04-29
Medium Priority
Last Modified: 2010-03-19
Which type of architecture would be the best for a small company over all.
Needs a little growing room.
Has four seperate rooms.
Token Ring
100 Base T Switch

Thankyou for your help

Question by:endo52
  • 2
  • 2
LVL 78

Accepted Solution

Rob Williams earned 300 total points
ID: 16570640
By architecture are you referring to token ring vs Ethernet (100 Base T) ? If so definitely go with Ethernet, most businesses are currently running Ethernet and equipment is much easier to locate and purchase, as well as configure and troubleshoot. It is pretty much the standard these days.
LVL 48

Assisted Solution

Jay_Jay70 earned 200 total points
ID: 16570641
Hi endo52,

token ring is fairly old and mostly obsolete these days, all you need to look at is ethernet

LVL 48

Expert Comment

ID: 16570673

n good morning Rob
LVL 78

Expert Comment

by:Rob Williams
ID: 16570905
Thanks  endo52.

n good night James <G>

Featured Post

Granular recovery for Microsoft Exchange

With Veeam Explorer for Microsoft Exchange you can choose the Exchange Servers and restore points you’re interested in, and Veeam Explorer will present the contents of those mailbox stores for browsing, searching and exporting.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
In this article I will be showing you how to subnet the easiest way possible for IPv4 (Internet Protocol version 4). This article does not cover IPv6. Keep in mind that subnetting requires lots of practice and time.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question