Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above
Last Answer : token passing: token
Description : In the _______ method, each station has a predecessorand a successor. A) reservation B) polling C) token passing D) none of the above
Last Answer : token passing
Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above
Last Answer : polling
Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above
Description : In the _____ method, time isdivided into intervals. In each interval, a reservation frameprecedes the dataframes sent in that interval. A) reservation B) polling C) token passing D) none of the above
Last Answer : reservation
Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above
Description : The Token Ring implementation works on the __ mode. A. Contention B. Reservation C. Round Robin D. None
Last Answer : C. Round Robin
Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : D. 1. true, 2. true, 3. false
Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned
Last Answer : handshaking
Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable
Last Answer : c. 20 metres of cable.
Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring
Last Answer : c. Bus
Description : ______ is the most widelyused local area networkprotocol. A) Token Ring B) Token Bus C) Ethernet D) none of the above
Last Answer : Ethernet
Description : The _____ houses the switches in token ring. A. transceiver B. nine-pin connector C. MAU D. NIC E. None of the above
Last Answer : MAU
Description : Terminators are used in which topology? a. Bus b. Star c. Ring d. token ring
Last Answer : a. Bus
Description : Explain the frame format for token ring and token bus
Last Answer : Access method: Token passing _ Priority and reservation _ Time limits _ Monitor stations
Description : What is the advantage of FDDI over a basic Token Ring?
Last Answer : Fiber distributed Data Interface. A high speed token ring networking technology designed to run over optical fiber. FDDI is able to tolerate a single break in the cable or failure of one station due ... token before it is allowed to transmit. 802.5 and FDDI are examples of token ring networks.
Description : Transmission system for a multidrop network A. Taken passing B. Polling C. Switching D. CSMA/CD
Last Answer : B. Polling
Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above
Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above
Last Answer : session layer
Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer
Last Answer : C) Session Layer
Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer
Last Answer : a. session layer
Description : What medium is used by IBM token ring network that operates at either 4 Mbps or 16 Mbps? A. Twisted pair B. Coaxial cable C. Fiber-optic D. Parallel-wire line
Last Answer : A. Twisted pair
Description : To implement a ring network we use the ______technology: a) Stand Ring b) Flash Ring c) Token Ring d) None of These
Last Answer : c) Token Ring
Description : What is network topology? List network standards. Explain token ring standard with the help of diagram.
Last Answer : Network topology: A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal ... empty" frame, ready to be taken by a workstation when it has a message to send.
Description : The _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. A. ARP B. RARP C. both a and b D. none of the above
Last Answer : B. RARP
Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)
Last Answer : PCF
Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : thedestination IP address in the datagram header
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : A ________is a local address. Its jurisdiction is overa local network. A) physical B) logical C) a and b D) noneof the above
Last Answer : physical
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. error control sublayer
Last Answer : b. media access control sublayer
Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer
Last Answer : a. logical link control sublayer
Description : The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer
Last Answer : a. data link layer
Description : Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer
Last Answer : B. media access control sublayer
Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer
Last Answer : A. logical link control sublayer
Description : Physical or logical arrangement of network is __________ a) Topology b) Routing c) Networking d) Control
Last Answer : a) Topology
Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer
Last Answer : a. network layer
Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer
Last Answer : A. network layer
Description : The modes of a MAC to share a transmission medium are ___. A. Round Robin B. Reservation C. Contention D. All the above
Last Answer : A. Round Robin
Description : ……………….. is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR
Last Answer : A) FDDI
Description : ........... is a high performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR
Description : .is a high performance fiber optic token ring LAN running at 100 Mbps over distances up to 1000 stations connected. A) FDDI B) FDDT C) FDDR D) FOTR
Description : Which of the following is type of LAN? (A) Ethernet (B) Token Ring (C) FDDI (D) All of the above
Last Answer : (D) All of the above
Description : In networks, a small message used to pass between one station to another is known as (1) Token (2) Byte (3) Word (4) Ring
Last Answer : Token
Description : A ring SONET network can be _________. A) unidirectional B) bidirectional. C) either (a) or (b) D) neither (a) nor (b)
Last Answer : bidirectional.
Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove
Last Answer : ring
Description : Which network topology is consideredpassive? A. Cross B. Ring C. Star D. Mesh E. Bus
Last Answer : Bus
Description : A central computer surrounded by one or more satellite computers is called a A. bus network B. ring network C. star network D. All of theabove E. None of the above
Last Answer : star network
Description : FDDI isa A. ring network B. star network C. mesh network D. bus based network E. None of the above
Last Answer : ring network
Description : A distributed network configurationin which all data/information pass througha central computer is A. bus network B. star network C. ring network D. Point-to-point network E. None of the above