The Token Ring implementation works on the __ mode.
A. Contention
B. Reservation
C. Round Robin
D. None

1 Answer

Answer :

C. Round Robin

Related questions

Description : The modes of a MAC to share a transmission medium are ___. A. Round Robin B. Reservation C. Contention D. All the above

Last Answer : A. Round Robin

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : In the _____ method, time isdivided into intervals. In each interval, a reservation frameprecedes the dataframes sent in that interval. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : ______ is the most widelyused local area networkprotocol. A) Token Ring B) Token Bus C) Ethernet D) none of the above

Last Answer : Ethernet

Description : The _____ houses the switches in token ring. A. transceiver B. nine-pin connector C. MAU D. NIC E. None of the above

Last Answer : MAU

Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable

Last Answer : c. 20 metres of cable.

Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring

Last Answer : c. Bus

Description : Terminators are used in which topology? a. Bus b. Star c. Ring d. token ring

Last Answer : a. Bus

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : Explain the frame format for token ring and token bus

Last Answer : Access method: Token passing _ Priority and reservation _ Time limits _ Monitor stations

Description : What is the advantage of FDDI over a basic Token Ring?

Last Answer : Fiber distributed Data Interface. A high speed token ring networking technology designed to run over optical fiber. FDDI is able to tolerate a single break in the cable or failure of one station due ... token before it is allowed to transmit. 802.5 and FDDI are examples of token ring networks.

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above

Last Answer : polling

Description : In_______, collisions are avoidedthrough theuse of three strategies: the interframe space, the contention window,and acknowledgments. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CA

Description : Eight stations arecompeting for the use of a sharedchannelusing the'Adaptive tree Walk Protocol'. If the stations 7 and8 are suddenly become ready at once, how many bit slots areneeded toresolve the contention? A. 7 slots B. 5 slots C. 10 slots D. 14 slots

Last Answer : 7 slots

Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time

Description : Which of the following condition is usedto transmit two packets overa medium at the same time? A. Contention B. Collision C. Synchronous D. Asynchronous E. None of the above

Last Answer : Collision

Description : Which of the following statements is TRUE about CSMA/CD a. IEEE 802.11 wireless LAN runs CSMA/CD protocol b. Ethernet is not based on CSMA/CD protocol c. CSMA/CD is not suitable for a high propagation delay network like satellite network d. There is no contention in a CSMA/CD network

Last Answer : CSMA/CD is not suitable for a high propagation delay

Description : In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. A. CSMA/CA B. CSMA/CD C. either (a) or (b) D. both (a) and (b)

Last Answer : A. CSMA/CA

Description : Which statement is true regarding the user exec and privileged exec mode? A. They both require the enable password B. User exec is a subset of the privileged exec C. The '?' only works in Privileged exec D. They are identica

Last Answer : User exec is a subset of the privileged exec

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

Last Answer : session layer

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer

Last Answer : a. session layer

Description : What medium is used by IBM token ring network that operates at either 4 Mbps or 16 Mbps? A. Twisted pair B. Coaxial cable C. Fiber-optic D. Parallel-wire line

Last Answer : A. Twisted pair

Description : To implement a ring network we use the ______technology: a) Stand Ring b) Flash Ring c) Token Ring d) None of These

Last Answer : c) Token Ring

Description : ……………….. is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR

Last Answer : A) FDDI

Description : ........... is a high performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR

Last Answer : A) FDDI

Description : .is a high performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR

Last Answer : A) FDDI

Description : Which of the following is type of LAN? (A) Ethernet (B) Token Ring (C) FDDI (D) All of the above 

Last Answer : (D) All of the above 

Description : In networks, a small message used to pass between one station to another is known as (1) Token (2) Byte (3) Word (4) Ring

Last Answer : Token

Description : What is network topology? List network standards. Explain token ring standard with the help of diagram.

Last Answer : Network topology: A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal ... empty" frame, ready to be taken by a workstation when it has a message to send.

Description : In a multiplexed system,__ lines share thebandwidthof ____ link. A) 1; n B) 1; 1 C) n; 1 D) n; n

Last Answer : n; 1

Description : The types of Unguided transmission channel or media used for LAN are __. A. Twisted Pair Cables B. Coaxial Cables C. Radio Waves D. All the above

Last Answer : C. Radio Waves

Description : Who wants to do a round robin story?

Last Answer : It was extremly crowded in there. Everyone was Christmas shopping. Nooks and books were all being rung up. Then, I looked across the crowded, chaotic space and saw….

Description : Why did Charlotte Doyle tell jaggery about the round robin?

Last Answer : What is the answer ?

Description : A scheduling Algorithm assigns priority proportional to the waiting time of a process. Every process starts with priority zero (lowest priority). The scheduler re-evaluates the process priority for every 'T' time ... (A) Priority scheduling (B) Round Robin Scheduling (C) Shortest Job First (D) FCFS

Last Answer : (B) Round Robin Scheduling

Description : Which of the following scheduling algorithms may cause starvation? a. First-come-first-served b. Round Robin c. Priority d. Shortest process next e. Shortest remaining time first (1) a, c and e (2) c, d and e (3) b, d and e (4) b, c and d

Last Answer : Answer: 2

Description : In operationg system, Round Robin Scheduling means : (1) A kind of scheduling (2) Repetition policy (3) A memory allocation policy (4) A process allocation policy

Last Answer : A kind of scheduling

Description : The Simplest CPU – scheduling algorithm is ______. (1) SJF scheduling algorithm (2) Round robin scheduling algorith (3) Multilevel scheduling algorithm (4) FCFS scheduling algorithm

Last Answer : FCFS scheduling algorithm

Description : Explain Round Robin algorithm with suitable example.

Last Answer : It is preemptive scheduling algorithm. A small unit of time known as a time quantum or time slice is used for pre-emption of a currently running process. Ready queue is implemented as a circular ... has received 1 time quantum, the CPU returns to process P1 for an additional time quantum. 

Description : _______ is an implementation of multicast distance vector routing. It is asource-based routing protocol, based on RIP. A) MOSPF B) DVMRP C) CBT D) none of the above

Last Answer : DVMRP

Description : Consider the given network implementation scenario. For the given classful NID 199.10.20.0/24, the requirement is to create 13 subnets. With given details, find the range of first and last valid IP in 15th subnet. a. ... .20.225 to 199.10.20.238 c. 199.10.20.193 to 199.10.20.206 d. Not of these

Last Answer : a. A Only

Description : Full form of OSI a. open system interconnection b. operating system interface c. optical service implementation d. open service Internet

Last Answer : a. open system interconnection

Description : OSI stands for __________ a) open system interconnection b) operating system interface c) optical service implementation d) open service Internet

Last Answer : a) open system interconnection

Description : A… ................is an implementation of the same protocol in the equivalent layer on aremote system. a. Physical layer b. peer c. protocol stack d. layer

Last Answer : b. peer