Computer Networking A terminal multiplexer has six 1200 bps terminals and 'n' 300bps terminals connected to it. The outgoing line is 9600bps. What is the maximum value of n? 4 28 16 8 4 28 16 8 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient An additional token is added for every 1,000 nodes The network becomes less efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes more efficient An additional token is added for every 1,000 nodes ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transfer of data from a CPU to peripheral devices of a computer is achieved through None of these buffer memory computer ports modems interfaces None of these buffer memory computer ports modems interfaces ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The packets switching concept was first proposed None of these in the late 1950s for Defense Ministry of US in the early 1960s for military communication systems, mainly to handle speech All of these in the late 1980s for the Defense Ministry of US. None of these in the late 1950s for Defense Ministry of US in the early 1960s for military communication systems, mainly to handle speech All of these in the late 1980s for the Defense Ministry of US. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to create a backup configuration? wr mem config mem copy running backup copy running-config startup-config wr mem config mem copy running backup copy running-config startup-config ANSWER DOWNLOAD EXAMIANS APP