Lacrosse uses geometry when shooting and passing. Having the right angle on the stick will help control the ball and the where it goes.
This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber optic backbone and UTP cabling, the rule is simply translated to a 7-6-5 rule.
uses of the perimeter in daily life is for example....................
hh
A flow proof is a proof that uses arrows to show the flow of a logical argument.
token ring uses a physical star and a logical ring ,while FDDI uses a physical star/ring and a logical ring.
Token ring uses star topology . The data token is being passed from one computer to other allowing all the computer to have network access and avoids data collision.
Star
3. Unlike Ethernet, Token Ring uses a ring topology whereby the data is sent from one machine to the next and so on around the ring until it ends up back where it started. It also uses a token passing protocol which means that a machine can only use the network when it has control of the Token, this ensures that there are no collisions because only one machine can use the network at any given time.
Token Ring
Token ring
SONET use RING physical topology and TOKEN logical topology. As simple as that. Logical topology deals with the data transmission. Physical topology deals with how the network is connected physically , BUS, RING, STAR and the like.
ring
Basically, in a Bus topology, any station connected to the network can speak at any time. In a ring topology, the stations must wait to be issued the "token" before they can speak. Ethernet (Bus topology) uses CSMA/CD (Carrier-Sense Multiple Access/Collision Detection) to determine when two or more stations speak at the same time. In Ring topologies such as Token Ring and FDDI, this isn't an issue since the passing of the "token" guarantees that no two stations will speak at the same time.
A token bus is a type of network which uses the token ring protocol. The protocol is implemented over a virtual ring using coaxial cable. A token is passed around the ring, so that only one computer has the right to transmit data. If the chosen computer doesn't have any data to transmit, the token is passed to the next computer.
Enhanced Interior Gateway Protocol It is a Cisco proprietary protocol. It uses bandwidth and delay by default to calculate the best path. It can also use load and delay, but these are usually not used. It is a distance vector routing protocol. It keeps a topology map, but it is only similar to the topology map of link state routing protocols.
A token bus uses a shared bus for communication. Hosts on the bus are ordered in a logical ring, with access to the bus coordinated by passing a token (a special packet) around the ring, indicating permission to transmit. The intent is to get the robustness of a simple bus protocol with the deterministic response time of a token ring. Unfortunately, because the bus is shared, each host on the bus must wait for the token to be completely transmitted before it can pass it on. This is in contrast to a token ring, where the token passes through each host with only a few bits delay. This gives the token bus considerably worse latency than a token ring. The reliability of a token protocol over a (CSMA protocl such as Ethernet ) is undermined by the complex protocols needed to recover the token at exactly one host should it become corrupted.