Computer Networking Error detection at the data link level is achieved by Cyclic Redundancy Code Bit Stuffing Hamming Code Equalization Cyclic Redundancy Code Bit Stuffing Hamming Code Equalization ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is the address of the router? The IP address None of these The subnet mask The TCP address The default gateway The IP address None of these The subnet mask The TCP address The default gateway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard? CSMA/CD Switched repeaters Collision detection Token passing Time sharing CSMA/CD Switched repeaters Collision detection Token passing Time sharing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network with a subnet of 172.16.17.0/22. Which is the valid host address? 172.16.0.1 255.255.240.0 172.16.18.255 255.255.252.0 172.16.20.1 255.255.254.0 172.16.17.1 255.255.255.252 172.16.0.1 255.255.240.0 172.16.18.255 255.255.252.0 172.16.20.1 255.255.254.0 172.16.17.1 255.255.255.252 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 The network becomes less efficient An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 ANSWER DOWNLOAD EXAMIANS APP