To implement a ring network we use the ______technology:
a) Stand Ring
b) Flash Ring
c) Token Ring
d) None of These

1 Answer

Answer :

c) Token Ring

Related questions

Description : What medium is used by IBM token ring network that operates at either 4 Mbps or 16 Mbps? A. Twisted pair B. Coaxial cable C. Fiber-optic D. Parallel-wire line

Last Answer : A. Twisted pair

Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable

Last Answer : c. 20 metres of cable.

Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring

Last Answer : c. Bus

Description : What is network topology? List network standards. Explain token ring standard with the help of diagram.

Last Answer : Network topology: A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal ... empty" frame, ready to be taken by a workstation when it has a message to send.

Description : .is a high performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR

Last Answer : A) FDDI

Description : In networks, a small message used to pass between one station to another is known as (1) Token (2) Byte (3) Word (4) Ring

Last Answer : Token

Description : ______technology is a set of technologies develpoed by the telephone companies to provide highdata ratetransmission. A) ASL B) DSL C) LDS D) none of the above

Last Answer : DSL

Description : A token or small data packet is ______passed around the network: a) Intimately b) Continuously c) Twicely d) None of These

Last Answer : b) Continuously

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : ______ is the most widelyused local area networkprotocol. A) Token Ring B) Token Bus C) Ethernet D) none of the above

Last Answer : Ethernet

Description : The _____ houses the switches in token ring. A. transceiver B. nine-pin connector C. MAU D. NIC E. None of the above

Last Answer : MAU

Description : Terminators are used in which topology? a. Bus b. Star c. Ring d. token ring

Last Answer : a. Bus

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : The Token Ring implementation works on the __ mode. A. Contention B. Reservation C. Round Robin D. None

Last Answer : C. Round Robin

Description : Explain the frame format for token ring and token bus

Last Answer : Access method: Token passing _ Priority and reservation _ Time limits _ Monitor stations

Description : What is the advantage of FDDI over a basic Token Ring?

Last Answer : Fiber distributed Data Interface. A high speed token ring networking technology designed to run over optical fiber. FDDI is able to tolerate a single break in the cable or failure of one station due ... token before it is allowed to transmit. 802.5 and FDDI are examples of token ring networks.

Description : ……………….. is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR

Last Answer : A) FDDI

Description : ........... is a high performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR

Last Answer : A) FDDI

Description : Which of the following is type of LAN? (A) Ethernet (B) Token Ring (C) FDDI (D) All of the above 

Last Answer : (D) All of the above 

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1) MS DOS 2) Windows 7 3) Windows XP 4) Windows 2003

Last Answer : 4) Windows 2003

Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2

Last Answer : 1) 1 only

Description : Which of the following Operating Systems do you choose to implement a client Server Network 1 MS DOS 2 Windows 7 3 Windows XP 4 Windows 2003

Last Answer : 4 Windows 2003

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

Last Answer : session layer

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer

Last Answer : a. session layer

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : A node X on a 10 Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2 Mbps. Token bucket is initially filled with 16 megabits. The maximum duration taken by X to transmit at full rate of 10 Mbps is ............ secs. (1) 1 (2) 2 (3) 3 (4) 4

Last Answer : (2) 2 

Description : What is a token?

Last Answer : A C program consists of various tokens and a token is either a keyword, an identifier, a constant, a string literal, or a symbol.

Description : Network components are connected to the same cable in the _____ topology. 1) Star 2) Ring 3) Bus 4) Mesh 5) Mixed

Last Answer : Answer :2

Description : In a ring network, every device has exactly ______neighbors for communicating purpose: a) 2 b) 4 c) 6 d) None of These

Last Answer : a) 2

Description : 8............. was the first step in the evolution of Ethernet from a coaxial cable bus to hubmanaged, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above

Last Answer : A) Star LAN

Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B

Last Answer : D) Both of A and B

Description : In a................ topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring

Last Answer : Mesh

Description : . A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network

Last Answer : C) T-switched network

Description : What is the name of the network topology in which there are bi-directional links between each possible node? A) Ring B) Star C) Tree D) Mesh

Last Answer : Mesh

Description : SNMP stand for………… a. Simple network messaging protocol b. Simple network Mailing protocol c. Simple network management protocol d. Simple network Master protocol

Last Answer : d. Simple network Master protocol

Description : SNMP stand for (a) simple network messeging protocol (b) simple network mailing protocol (c) simple network management protocol (d) simple network master protocol

Last Answer : (c) simple network management protocol

Description : Technique to implement virtual memory where memory is divided into units of fixed size memory is _________ A. Paging B. De-fragments C. Segmentation D. None of the above

Last Answer : A. Paging

Description : Which of the following Operatings does not implement multitaskings truly 1) Windows 98 2) Windows NT 3) Windows XP 4) MS DOS

Last Answer : 4) MS DOS

Description : Which of the following Operatings does not implement multitaskings truly 1 Windows 98 2 Windows NT 3 Windows XP 4 MS DOS

Last Answer : 4 MS DOS

Description : What is the best reason to implement a security policy? A. It increases security. B. It makes security harder to enforce. C. It removes the employee’s responsibility to make judgments. D. It decreases security.

Last Answer : C. It removes the employee’s responsibility to make judgments.

Description : What does the markings 9 with a line under it stand for on a ring?

Last Answer : For Any Occasion Ring Candles for All. The number inside the shape is called the millesimal stamp number - this will tell you the actual precious metal content or the purity of the precious metal.

Description : Has anyone actually hired a token?

Last Answer : answer:I worked for a large corporation 35+ years ago. They hired a guy who seemed to know nothing about engineering even though that was his job. He did almost nothing. If you needed ... the company brochures. Sadly, that personal experience turned me off to affirmative action of any kind..

Description : What new token would you add to Monopoly?

Last Answer : answer:I liked the iron. It reminded me of my grandmother. I don’t necessarily care about a cat being added. It’s fine. I’d like to see a computer mouse added, too.

Description : If money is a quantified token of value, what does it mean about society when game players (athletes) and pretenders (actors) are paid more than healers, farmers, and teachers?

Last Answer : Who says money is a quantified token of value?

Description : A thousand colored folds stretch toward the sky, Atop a tender strand, Rising from the land, 'Til killed by maiden's hand, Perhaps a token of love, perhaps to say goodbye. What am I? -Riddles

Last Answer : A flower.

Last Answer : : ERC-20 Token Application To do For Etherium Blockchain Smart Of the contract For Used A Technical The value. Etherium Blockchain Issue To do Mostly Token Yes _ _ ERC -20 followers. 27th _ By ... Etherium Original On the network A total of 215,725 ERC-20 compatible Token Found Goes. ( Wikipedia )

Description : Will I need it soon where they sell it?

Last Answer : Petrol stations, ÚMK, ABA, Česká pošta ... When you refuel, ask at the petrol station - otherwise probably the post office.