In the _______ method, each station has a predecessorand a successor.
A)
reservation
B)
polling
C)
token passing
D)
none of the above

1 Answer

Answer :

token passing

Related questions

Description : In the _______ method, thestations in a network areorganizedin a logical ring. A) reservation B) polling C) token passing D) none of the above

Last Answer : token passing

Description : In the _______ method, the primary device controls the link; thesecondary devices follow its instructions. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : In the _____ method, time isdivided into intervals. In each interval, a reservation frameprecedes the dataframes sent in that interval. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : In the ______ method, all dataexchanges mustbe made throughthe primarydevice even when theultimate destinationis a secondary device. A) reservation B) polling C) token passing D) none of the above

Last Answer : polling

Description : In the ________ method, a stationneeds to make a reservationbefore sending data. Time is divided into intervals. A) reservation B) polling C) token passing D) none of the above

Last Answer : reservation

Description : In distributed systems, link and site failure is detected by ___________ a) polling b) handshaking c) token passing d) none of the mentioned

Last Answer : handshaking

Description : The Token Ring implementation works on the __ mode. A. Contention B. Reservation C. Round Robin D. None

Last Answer : C. Round Robin

Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above

Last Answer : polling

Description : Transmission system for a multidrop network A. Taken passing B. Polling C. Switching D. CSMA/CD

Last Answer : B. Polling

Description : In IEEE 802.11, when a frame isgoingfrom one station in a BSS toanother without passing through thedistribution system, the address flag is _____ A) 00 B) 01 C) 10 D) 11

Last Answer : 00

Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above

Last Answer : 48-b

Description : Suppose there are n stations in a slotted LAN. Each station attempts to transmit with a probability P in each time slot. The probability that only one station transmits in a given slot is _______. a. nP(1 – P)n – 1 b. nP c. P(1 – P)n – 1 d. n P (1 – P)n – 1

Last Answer : a. nP(1 – P)n – 1

Description : When people of different races line up to vote at a polling station they are exercising their righto to?

Last Answer : Feel Free to Answer

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

Last Answer : session layer

Description : ______ is the most widelyused local area networkprotocol. A) Token Ring B) Token Bus C) Ethernet D) none of the above

Last Answer : Ethernet

Description : The _____ houses the switches in token ring. A. transceiver B. nine-pin connector C. MAU D. NIC E. None of the above

Last Answer : MAU

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable

Last Answer : c. 20 metres of cable.

Description : In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer

Last Answer : a. session layer

Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring

Last Answer : c. Bus

Description : Terminators are used in which topology? a. Bus b. Star c. Ring d. token ring

Last Answer : a. Bus

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : Explain the frame format for token ring and token bus

Last Answer : Access method: Token passing _ Priority and reservation _ Time limits _ Monitor stations

Description : What is the advantage of FDDI over a basic Token Ring?

Last Answer : Fiber distributed Data Interface. A high speed token ring networking technology designed to run over optical fiber. FDDI is able to tolerate a single break in the cable or failure of one station due ... token before it is allowed to transmit. 802.5 and FDDI are examples of token ring networks.

Description : The modes of a MAC to share a transmission medium are ___. A. Round Robin B. Reservation C. Contention D. All the above

Last Answer : A. Round Robin

Description : An officer transferred may not, without urgent necessity or special orders of the Head of the circle, leave the station a) Before the arrival of the permanent successor b) After the arrival of the permanent successor c) After completed his tenure d) None of these

Last Answer : a) Before the arrival of the permanent successor

Description : In _______ methods, the stations consult one another tofind which station has the right to send. A) random access B) controlledaccess C) channelization D) none of the above

Last Answer : controlledaccess

Description : In networks, a small message used to pass between one station to another is known as (1) Token (2) Byte (3) Word (4) Ring

Last Answer : Token

Description : Define a reservation station?

Last Answer : Define a reservation station?

Description : Inthe _________ method, after the station finds the lineidle, it sends its frame immediately. If the line isnot idle, it continuously senses theline until it finds it idle. A) nonpersistent B) 1-persistent C) p-persistent D) none of the above

Last Answer : 1-persistent

Description : In_____, each station transmits its data in itsassignedtime slot. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In_____, each station is allocateda time slotduring which it can send data. Each stationtransmits its data in itsassigned time slot. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : TDMA

Description : In______, each station is allocated a band to send its data. In other words, each band is reservedfor a specific station,and it belongs to the station all the time. A) FDMA B) TDMA C) CDMA D) none of the above

Last Answer : FDMA

Description : ________ requires that each station first listento the medium before sending. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : The Federal Communications Commission (FCC) allows ______ kHz for each FM station. A) 20 B) 100 C) 200 D) none of the above

Last Answer : 100

Description : The Federal Communications Commission (FCC) allows ______kHz for each AM station. A) 5 B) 10 C) 20 D) none of the above

Last Answer : 0

Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)

Last Answer : PCF

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer

Last Answer : A. network layer

Description : The minimax algorithm computes the minimax decision from the current state. It uses a simple recursive computation of the minimax values of each successor state, directly implementing the defining equations. The ... are backed up through the tree as the recursion unwinds. a) True b) False

Last Answer : a) True

Description : In SONET each frame lasts _______ microseconds. A) 20 B) 64 C) 128 D) none of the above

Last Answer : 64

Description : In hexadecimal colon notation, a 128-bit address isdivided into _______ sections, each _____hexadecimal digits in length. A) 8: 2 B) 8: 3 C) 8: 4 D) none of the above

Last Answer : 8: 4

Description : RPB creates a shortest path _______ tree from thesourceto each destination. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : broadcast

Description : In the _______ treeapproach, each router needs tohave oneshortest path tree for each group. A) group-shared B) source-based C) a or b D) none of the above

Last Answer : source-based

Description : The _______ protocol allows the administrator toassign acost, called the metric, to each route. A) OSPF B) RIP C) BGP D) none of the above

Last Answer : OSPF

Description : An application process is assigned a process identifier number (process ID), which is likely to be _______ each time that process is started. A. Similar B. smaller C. different D. larger

Last Answer : C. different

Description : Would you follow this polling by the NYT all the way to Nov. 6?

Last Answer : Nope – I want to do a Rip Van Winkle and fall asleep until November 7 and maybe permanently after that.

Description : How does TN have my home phone number in FL as part of their call list for polling?

Last Answer : You may have used it for something like a bank account or some other business in TN, and it cross referenced in a database.