How is data transmitted in a Token Ring network?
A. The node calls for a token, appends the data, modifies a
bit in the frame, then sends the token
B. The node waits for the token, gains possession of it,
appends the data, modifies a bit in the frame, then sends
the token
C. The node transmits the data whenever it wants to
D. The active monitor must first grant permission for the
node to transmit data. After it receives permission, it
sends the data
Answer / guest
Answer: B
Data is transmitted in a Token Ring network differently than
Ethernet nodes. The node must wait for the token, gains
possession of it, appends the data, modifies a bit in the
frame, then sends the token.
| Is This Answer Correct ? | 6 Yes | 1 No |
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
What are metrics used with IGRP? A. Ticks B. Load C. Hops D. Delay
Which two statements correctly identify considerations to take into account when deciding on campus QoS Design elements ?
What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones
What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR
When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information
6. Which of these statements best describes VPLS ?
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
What PPP frame initiates the network layer protocols to be used during a connection?
With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False