What are the three defined implementations of Fast Ethernet?

What will be an ideal response?


Fast Ethernet, which is defined under the IEEE 802.3u standard, has three defined implementations:
• 100Base-TX-Uses two pairs of either Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair (STP); one pair is used for transmit (TX), and the other is used for receive (RX). The maximum segment length is 100 meters; two Class II repeaters and a five-meter patch cable can be used to create a maximum distance of 205 meters between stations for each collision domain.
• 100Base-T4-Uses four pairs of either Category 3, 4, or 5 UTP cable; one pair is used for TX, one pair for RX, and two pairs are used as bidirectional data pairs. The maximum segment length is 100 meters; as with 100Base-TX, two Class II repeaters and a five-meter patch cable can be used to create a maximum distance of 205 meters between stations for each collision domain. Because all four pairs are used, the T4 specification does not support full-duplexing, which is discussed in the next section.
• 100Base-FX-Uses multimode fiber-optic (MMF) cable with one TX and one RX strand per link. The maximum segment length is 412 meters.

Computer Science & Information Technology

You might also like to view...

A(n) ________ disc is an optical disc that was designed to replace the DVD

Fill in the blank(s) with correct word

Computer Science & Information Technology

Trust among companies, customers, partners, and suppliers is the support structure of which of the following?

A. Ebusiness B. Eharmony C. Esoftware D. Epolicies

Computer Science & Information Technology

Medium- and large-sized organizations deal with the impact of technical change on the organization's operation through a(n) ____________________ control process.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Why should escalation requirements be considered as part of an incident response strategy?

A. Because all exploits take advantage of software flaws B. Because some hackers are smarter than others C. Because not all violations represent the same threat to an organization D. Because some countermeasures are more expensive than others

Computer Science & Information Technology