Computer Networking A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring? 80,000 B frame 8 x 105 bit frame 10,000 B frame 8000 B frame 80,000 B frame 8 x 105 bit frame 10,000 B frame 8000 B frame ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient An additional token is added for every 1,000 nodes The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient An additional token is added for every 1,000 nodes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following encapsulates PPP frames in Ethernet frames and uses common PPP features like authentication, encryption, and compression? PPPoE PPPoA PPP Token Ring PPPoE PPPoA PPP Token Ring ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To prevent switching loops in networks with redundant switched paths To create collision domains To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To create collision domains To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To prevent routing loops in networks with redundant paths ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How can you see the address of the DHCP server from which a client received its IP address? By using DHCPINFO By pinging DHCP By using IPCONFIG/ALL None of these By using Advanced Properties of TCP/IP By using DHCPINFO By pinging DHCP By using IPCONFIG/ALL None of these By using Advanced Properties of TCP/IP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Amplitude-shift keying Amplitude modulation Amplitude None of these Aloha Amplitude-shift keying Amplitude modulation Amplitude None of these Aloha ANSWER DOWNLOAD EXAMIANS APP