ch04a_updated_hw

ch04a_updated_hw - b) What access control method did early...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Homework Chapter 4a Token-Ring Networks Last Name: ____________________________________________________ First Name: ____________________________________________________ Due Date: __________________________________ Test Your Understanding 1. a) How many rings are used in a ring topology? b) Why are ring topologies reliable? c) What is the disadvantage of ring topologies? 2. a) Why is token passing needed? b) What is the advantage of token passing compared to CSMA/CD? c) What is the disadvantage of token passing compared to CSMA/CD? 3. a) What topology did early Ethernet networks use?
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: b) What access control method did early Ethernet networks use? 4. Why were 802.5 Token-Ring Networks not successful when they came out? 5. a) At what speed did 802.5 Token-Ring Networks operate? b) What Ethernet developments killed 802.5 networks? c) With switching, do you need either CSMA/CD or token passing? 6. What type of wiring was 802.5 networks designed to use? 7. a) Compare 802.5 TRNs and FDDI in terms of speed and ring circumference. b) In local area networks, what role did FDDI take? c) What killed FDDI? Chapter 4a-1...
View Full Document

Ask a homework question - tutors are online