Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How is data transmitted in a Token Ring network?

A. The node calls for a token, appends the data, modifies a
bit in the frame, then sends the token

B. The node waits for the token, gains possession of it,
appends the data, modifies a bit in the frame, then sends
the token

C. The node transmits the data whenever it wants to

D. The active monitor must first grant permission for the
node to transmit data. After it receives permission, it
sends the data



How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data,..

Answer / guest

Answer: B

Data is transmitted in a Token Ring network differently than
Ethernet nodes. The node must wait for the token, gains
possession of it, appends the data, modifies a bit in the
frame, then sends the token.

Is This Answer Correct ?    6 Yes 1 No

Post New Answer

More CCDA Interview Questions

How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices

1 Answers  


You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling

1 Answers  


What are metrics used with IGRP? A. Ticks B. Load C. Hops D. Delay

1 Answers  


Which two statements correctly identify considerations to take into account when deciding on campus QoS Design elements ?

1 Answers   Pari Networks,


What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones

1 Answers  


What is the technique used by a router that can automatically initiate and close a circuit-switched session? A. PLP B. LAPP C. ASN.1 D. DDR

1 Answers  


When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information

2 Answers  


6. Which of these statements best describes VPLS ?

1 Answers   Pari Networks,


What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network

1 Answers  


What PPP frame initiates the network layer protocols to be used during a connection?

1 Answers  


With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False

1 Answers  


Categories