Page 840 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 840
connect to the organization’s network.
A device owned by an individual can be referenced using
any of these terms: portable device, mobile device, personal mobile
device (PMD), personal electronic device or portable electronic
device (PED), and personally owned device (POD).
For more information on managing the security of mobile devices,
please see Chapter 9, “Security Vulnerabilities, Threats, and
Countermeasures,” specifically the section “Assess and Mitigate
Vulnerabilities in Mobile Systems.”
LAN Technologies
There are three main types of LAN technologies: Ethernet, Token
Ring, and FDDI. A handful of other LAN technologies are available,
but they are not as widely used. Only the main three are addressed on
the CISSP exam. Most of the differences between LAN technologies
exist at and below the Data Link layer.
Ethernet
Ethernet is a shared-media LAN technology (also known as a
broadcast technology). That means it allows numerous devices to
communicate over the same medium but requires that the devices take
turns communicating and performing collision detection and
avoidance. Ethernet employs broadcast and collision domains. A
broadcast domain is a physical grouping of systems in which all the
systems in the group receive a broadcast sent by a single system in the
group. A broadcast is a message transmitted to a specific address that
indicates that all systems are the intended recipients.
A collision domain consists of groupings of systems within which a
data collision occurs if two systems transmit simultaneously. A data
collision takes place when two transmitted messages attempt to use
the network medium at the same time. It causes one or both of the
messages to be corrupted.

