From the course: CompTIA Network+ (N10-009) Cert Prep
100BASE-T
From the course: CompTIA Network+ (N10-009) Cert Prep
100BASE-T
- It wasn't that long after 10BASE-T was introduced that people were demanding higher speeds from the networks, and the ethernet people responded with 100 megabit ethernet. Now, people often ask me, they go, "Mike, why do we go from 10 megabit to 100 megabit to gigabit to 10 gigabit? Why is it always times 10?" And the answer is simply this: It is what they can do. It is the amount of speed that is worth it in terms of reinvesting in cabling and network cards and switches and whatever you might have by being 10 times faster. So there are variations. There were things like 20 megabit ethernet, but nobody wanted it, nobody bought it. It wasn't until we went to 100 that people got interested. So it's always times 10, with a few exceptions in there. So in this episode, I want to talk about 100 megabit ethernet. Now, 100 megabit ethernet, as it came out, this really was the big transition. First of all, when 100 megabit ethernet came out, we were still using hubs, and it was really as 100 megabit ethernet came out that certain standards said you can't use hubs anymore. So that was always a big challenge, is that even today, if you're in a situation where you might want to use a hub, you have to actually use 10 megabit everything, 10 megabit cards, the whole shebang, just to get it to work. So hubs really are obsolete. The other thing that took place around this time is we began to see the concept of moving from half-duplex to full-duplex. It's easier to understand half-duplex if you think about the days with CB radio. So you got a CB radio in your car, you can sit there and you can talk all you want there on a rubber duck in the walking chair and all that, and you can do all the talking you want, but you're not going to be able to hear anybody until you stop talking. So that's a perfect example of half-duplex. Now, full-duplex is if you're on the phone and you're talking to a friend of yours and you all start both trying to talk, "No, no, you go." "No, okay, look, I won't say anything, you go ahead," because you can both talk at the same time and it creates a lot of confusion. So full-duplex is when you can both listen and talk at the same time. So it was around the time of 100 megabit ethernet that we began to see full-duplex. Today, starting with 100, moving up to all the gigabit and 10 gig and all that, everybody's full-duplex today. So there were really a number of standards that came out with 10BASE-T. And I want to go ahead and just go through all these just very, very quickly. One of the oldest versions was known as 100BaseT4. Ran at 100 megabits per second. It had 1,024 nodes per hub, it actually used hubs. And from the hub to any node was 100 meters, and it used Cat 3 cabling. What's interesting about 100Base4 is that it was one of the first ethernets to use all four pairs inside of a unshielded twisted pair cable. Second was 100BaseTX. 100BaseTX ran at 100 megabits per second, 1,024 nodes per hub, 100 meters from the hubs to the individual nodes, and it used CAT 5e cable, and it only used two pairs. And yes, 100BaseTX was full-duplex. Now, here's the interesting part. We literally had two competing standards. They both used unshielded twisted pair. They both had hubs and switches, they had network cards, but you couldn't tell 'em apart simply by looking at 'em. You'd have to look at a switch and it would say 100BaseTX or 100BaseT4. The bottom line is that 100BaseT4 disappeared, it's gone. And 100BaseTX is now known as just simply 100BaseT. So if you find yourself a switch and it says 100BaseT on it, it's really 100BaseTX. but everybody just calls it 100BaseT. The other interesting part about 100 megabit ethernet was that we began to see fiber solutions, in particular, something called 100BaseFX. So it would run at 100 megabits per second, again, 1,024 nodes per hub, but you could run a piece of multi-mode fiber. You know, you'd have to have a fiber optic switch and you could run two kilometers. So there were a lot of places where suddenly fiber optic, especially for long distance throws, became extremely attractive as an option. So for the exam, the big thing I want you to keep in mind more than anything else is that make sure you're comfortable with the concept of hubs versus switches. And during the time, 100 megabit is where we really began to see that switch. Also, keep in mind, be comfortable with duplex versus half-duplex. In other episodes, that's going to become very handy. And make sure you're comfortable with the three versions of 100Base ethernet just described, why not? 'Cause it's going to be on the exam.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Introduction to structured cabling4m 3s
-
(Locked)
Terminating structured cabling7m 39s
-
(Locked)
Equipment room7m 5s
-
(Locked)
Alternative distribution panels3m 36s
-
(Locked)
Using a toner and probe2m 31s
-
(Locked)
Testing cable8m 39s
-
(Locked)
Troubleshooting cabling, part 14m 5s
-
(Locked)
Troubleshooting cabling, part 23m 34s
-
(Locked)
Troubleshooting cabling, part 39m 44s
-
-
-
Introduction to IP addressing and binary12m 28s
-
(Locked)
Introduction to ARP3m 32s
-
(Locked)
Subnet masks14m 4s
-
(Locked)
Classful addressing10m 6s
-
(Locked)
Subnetting with CIDR9m 32s
-
(Locked)
More CIDR subnetting practice9m 43s
-
(Locked)
Dynamic and static IP addresses7m 19s
-
(Locked)
Special IP addressing6m 47s
-
(Locked)
IP addressing scenarios14m 33s
-
-
-
Introduction to routers15m 4s
-
(Locked)
Network address translation (NAT)6m 10s
-
(Locked)
Implementing NAT2m 23s
-
(Locked)
Forwarding ports17m 26s
-
(Locked)
Tour of a SOHO router11m 48s
-
(Locked)
SOHO vs. enterprise8m 28s
-
(Locked)
Static routes12m 25s
-
(Locked)
Dynamic routing10m 22s
-
(Locked)
Open shortest path first (OSPF)3m 19s
-
(Locked)
Border gateway protocol (BGP)5m 25s
-
(Locked)
Enhanced interior gateway routing protocol (EIGRP)8m 10s
-
(Locked)
First hop redundancy protocol (FHRP)7m 56s
-
-
-
TCP and UDP7m 9s
-
(Locked)
ICMP and IGMP5m 55s
-
(Locked)
Explaining traffic types4m 44s
-
(Locked)
Handy tools6m 30s
-
(Locked)
Wireshark protocol analyzer10m 25s
-
(Locked)
Introduction to netstat7m 31s
-
(Locked)
File transfer protocol (FTP)9m 56s
-
(Locked)
Email servers and clients9m 7s
-
(Locked)
Securing email5m 34s
-
(Locked)
Telnet and SSH9m 2s
-
(Locked)
Network time protocol (NTP)4m 46s
-
(Locked)
Network service scenarios9m 20s
-
-
-
Making TCP/IP secure4m 12s
-
(Locked)
Identification7m 55s
-
(Locked)
Access control4m 7s
-
(Locked)
RADIUS and TACACS+4m 45s
-
(Locked)
Single sign-on (SSO)7m 25s
-
(Locked)
Symmetric encryption5m 19s
-
(Locked)
Asymmetric encryption3m 7s
-
(Locked)
Digital certificates with public key infrastructure (PKI)13m 33s
-
-
-
(Locked)
Switch management8m 49s
-
(Locked)
Introduction to VLANs10m 7s
-
(Locked)
InterVLAN routing2m 56s
-
(Locked)
Configuring switching technologies7m 25s
-
(Locked)
Trunking7m 39s
-
(Locked)
Cisco commands9m 2s
-
(Locked)
Switch port protection6m 28s
-
(Locked)
Port mirroring3m 19s
-
(Locked)
IDS vs. IPS4m 15s
-
(Locked)
Proxy servers12m 31s
-
(Locked)
Load balancing8m 19s
-
(Locked)
Device placement scenarios12m 37s
-
(Locked)
-
-
(Locked)
Understanding IP tunneling5m 50s
-
(Locked)
WAN technologies5m 29s
-
(Locked)
Content delivery networks (CDNs)1m 22s
-
(Locked)
Quality of service (QoS) and time to live (TTL)4m 42s
-
(Locked)
Understanding satellite networking2m 16s
-
(Locked)
Understanding cellular networking3m 49s
-
(Locked)
Remote desktop connectivity4m 19s
-
(Locked)
Virtual private networks (VPNs)10m 37s
-
(Locked)
Troubleshooting network services9m 28s
-
(Locked)
-
-
(Locked)
Introduction to 802.1111m 25s
-
(Locked)
802.11 standards5m 29s
-
(Locked)
Frequency, guest, and authentication options3m 44s
-
(Locked)
Power over ethernet (PoE)3m 30s
-
(Locked)
Common performance issues6m 17s
-
(Locked)
Troubleshooting interface issues10m 2s
-
(Locked)
Antennas8m 25s
-
(Locked)
Wireless security standards5m 53s
-
(Locked)
Implementing wireless security6m 43s
-
(Locked)
Threats to your wireless network6m 49s
-
(Locked)
Enterprise wireless5m 54s
-
(Locked)
Installing a wireless network14m 31s
-
(Locked)
Wireless scenarios5m 59s
-
(Locked)
More wireless scenarios8m 37s
-
(Locked)
-
-
(Locked)
Internet of Things (IoT) and Industrial Internet of Things (IIoT)8m 42s
-
(Locked)
Industrial control systems (ICS) and SCADA8m 29s
-
(Locked)
What are network operations?3m 10s
-
(Locked)
Encryption key management6m 7s
-
(Locked)
Configuration management5m 52s
-
(Locked)
Documentation7m 6s
-
(Locked)
Documenting the datacenter7m 34s
-
(Locked)
Patching and updating7m 7s
-
(Locked)
Disaster recovery and backups12m 23s
-
(Locked)
-
-
(Locked)
Security concepts5m 52s
-
(Locked)
Defense in depth (DiD)5m 12s
-
(Locked)
Rogue DHCP servers3m 45s
-
(Locked)
Denial of service (DoS) and distributed denial of service (DDoS)9m 48s
-
(Locked)
On-path attacks21m 55s
-
(Locked)
VLAN hopping6m 5s
-
(Locked)
Lifecycle management10m 3s
-
(Locked)
Malware6m 7s
-
(Locked)
Social engineering7m 33s
-
(Locked)
Logical security4m 54s
-
(Locked)
Physical security12m 30s
-
(Locked)