Home > Articles

LAN Technologies

  • Print
  • + Share This

Chapter Summary

Slow Ethernet technology, despite its speed limit of 10Mbps, is still the most widely installed, most stable, and most viable option for migratory growth among the current standards in LAN technology. Its resilience and capability to maintain a sense of homogeneity among networks justifies its ongoing use.

At the same time, the development and increasing popularity of faster standards, such as Fast and Gigabit Ethernet, ensures the continued dominance of Ethernet as the preferred LAN installation. Even though such emergent architectures as 16Mbps Token-Ring and 100Mbps FDDI face obstacles related to their cost and relation to the dominant standards, they still offer viable alternatives as LAN solutions.

Questions and Answers

  1. What are the differences between the channel access methods of Ethernet and of Token-Ring?

    A. Ethernet uses a method called contention in which devices must contend for the right to transmit. Any device can attempt to send data at any time, but this results in collisions, so devices must wait until the channel is idle to successfully transmit. In contrast, Token-Ring uses the token-passing method whereby a device must wait for a token to become available before it has the right to transmit.

  2. Identify the following specifications: 802.2, 802.3, and 802.5.

    A. The 802.2 specification represents the implementation of the LLC sublayer of the Data Link layer. It handles framing, flow control, and errors, as well as the Network layer interface.

    The 802.3 specification represents the Physical layer as well as the MAC sublayer of the Data Link layer. In addition, it uses CSMA/CD to handle access and speed over a variety of different physical media using 10 and 100Mbps Ethernet.

    802.5 specifies the parameters for the use of the Physical layer and the MAC sublayer of the Data Link layer while using token passing and shielded twisted-pair cabling for Token-Ring.

  3. What are the differences between half-duplex and full-duplex?

    A. The differences between half-duplex and full-duplex are as simple as the following: With half-duplex, nodes must take turns transmitting, while with full-duplex, both nodes can transmit and receive simultaneously.

  4. What are the similarities and differences between 10BaseX and 100BaseX?

    A. The main similarities of 10BaseX and 100BaseX are frame types, frame sizes, and channel access method. The differences are encoding schemes, transfer rates, timing, and hardware.

  5. What are the distance limitations with 10Base2, 10Base5, and 10BaseT?

    A. The distance limitation for 10Base2 is 185 meters per segment. The distance limitation for 10Base5 is for segments of up to 500 meters. The practical distance limitation for 10BaseT is 100 meters.

Practice Test

  1. Review and identify Figure 3.22 using Cisco's naming convention.

    Figure 3.22

    1. SAP (Service Access Protocol)
    2. ARPA Frame
    3. Novell-Ether
    4. SNAP


    Answer C is correct because Novell-Ether is the correct naming convention.
    Answers A, B, and D are simply incorrect.

  2. Review and identify Figure 3.23 using Cisco's naming convention.

    Figure 3.23

    1. SAP
    2. 802.3 RAW
    3. thernet_II
    4. Ethernet_SNAP


    Answer A is correct because SAP is the correct naming convention.
    Answers B, C, and D are simply incorrect.

  3. Review and identify Figure 3.24 using Cisco's naming convention.

    Figure 3.24

    1. Ethernet_SNAP
    2. 802.3 RAW
    3. 802.2
    4. ARPA


    Answer D is correct because ARPA is the correct naming convention.
    Answers A, B, and C are simply incorrect.

  4. Review and identify Figure 3.25 using Cisco's naming convention.
    1. Ethernet_II
    2. Novell-Ether
    3. SNAP
    4. SAP


    Answer C is correct because SNAP is the correct naming convention.
    Answers A, B, and D are simply incorrect.

    Figure 3.25

  5. What is the difference between the 100BaseFX and the 100BaseTX specification?

    1. 100BaseFX is not compatible with 802.3 but 100BaseTX is.
    2. 100BaseTX requires either Category 3 or 4 cable, and 100BaseFX uses fiber-optic cable.
    3. 100BaseFX runs over fiber-optic cable, whereas 100BaseTX runs over Category 5 cabling.
    4. 100BaseFX runs over Fiber-Optic cable, whereas 100BaseTX runs over Category 3 or 4 cable.


    Answer C is correct because the difference between the 100BaseFX and 100BaseTX specifications is that 100BaseFX runs over fiber-optic cable, whereas 100BaseTX runs over Category 5 cabling.
    Answers A, B, and D are incorrect because they do not reflect the differences between the two specifications.

  6. What is the definition of full-duplex transmission?

    1. Full-duplex allows full transmission in one direction at a time.
    2. Full-duplex allows transmission and reception at the same time.
    3. Full-duplex allows one device to fully transmit while another receives.
    4. Full-duplex allows one device to fully receive while another transmits.


    Answer B is correct because full-duplex allows transmission and reception at the same time.
    Answers A, C, and D are incorrect definitions of full-duplex.

  7. What is the definition of half-duplex transmission?

    1. Half-duplex allows transmission in one direction at a time, similar to a narrow one-way bridge.
    2. Half-duplex allows transmission and reception at the same time.
    3. Half-duplex allows one device to fully transmit in both directions at the same time.
    4. Half-duplex transmits on one machine while allowing reception in another machine.


    Answer A is correct because half-duplex allows transmission in one direction at a time.
    Answers B, C, and D are incorrect definitions of half-duplex.

  8. Which IEEE specification defines token passing as opposed to token bus?

    1. 802.4
    2. 802.5
    3. 802.3
    4. 802.2


    Answer A is incorrect because 802.4 defines token bus. Answer B is correct because 802.5 is the IEEE specification that defines token passing. Answer C is incorrect because 802.3 defines Ethernet's general operation, components, and distance limitations. Answer D is incorrect because 802.2 defines the implementation of the LLC sublayer of the Data Link layer.

  9. What is the most commonly used ring speed for Token-Ring?

    1. 4Mbps
    2. 10Mbps
    3. 100Mbps
    4. 16Mbps


    Answer D is correct because the most commonly used ring speed for Token-Ring is 16Mbps.
    Answers A, B, and C are simply incorrect.

  10. What term describes the method by which FDDI recovers from a failure?

    1. Reverse direction
    2. Ring management
    3. Return to zero code
    4. Ring wrap


    Answer D is correct because ring wrap is the term that describes the method by which FDDI recovers from failure.
    Answers A, B, and C are incorrect because they do not describe this method.

  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.