How is data transmitted in a Token Ring network?
A. The node calls for a token, appends the data, modifies a
bit in the frame, then sends the token
B. The node waits for the token, gains possession of it,
appends the data, modifies a bit in the frame, then sends
the token
C. The node transmits the data whenever it wants to
D. The active monitor must first grant permission for the
node to transmit data. After it receives permission, it
sends the data
Answer / guest
Answer: B
Data is transmitted in a Token Ring network differently than
Ethernet nodes. The node must wait for the token, gains
possession of it, appends the data, modifies a bit in the
frame, then sends the token.
| Is This Answer Correct ? | 6 Yes | 1 No |
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
What protocol advertises Netware services to network clients? (Type acronym).
when ever we apply show flash comand on the router it givesthat informatin router#show flash syatem file directory: file length name/status 1 8121000 c2500-js-L.112-18.bin what does it nean plz help i have read it from book but not bale to understand i am looking towards u for the help
5. Which Two Settings must be configured in order to use the GUI to configure Call Admission Control with voice Applications
What are metrics used with IGRP? A. Ticks B. Load C. Hops D. Delay
With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False
How many networks will be advertised using route summarization within an OSPF network if you are given the following networks? 192.108.168.0 192.108.169.0 192.108.170.0 192.108.171.0 192.108.172.0 192.108.173.0 192.108.174.0 192.108.175.0 A. 1 B. 2 C. 3 D. 4 E. 5
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
Which address is updated at each hop in the path in path switching?
What AppleTalk protocol permits AppleTalk workstations to share files across a network?