Computer Networking What is split horizon? It prevents regular update messages from reinstating a route that has gone down. Information about a route should not be sent back in the direction from which the original update came. It splits the traffic when you have a large bus (horizon) physical network. It holds the regular updates from broadcasting to a downed link. It prevents regular update messages from reinstating a route that has gone down. Information about a route should not be sent back in the direction from which the original update came. It splits the traffic when you have a large bus (horizon) physical network. It holds the regular updates from broadcasting to a downed link. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) None of these Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) None of these Statistical multiplexers need buffers while multiplexers do not need buffers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. You can place as many access lists as you want on any interface until you run out of memory. You can apply two access lists to any interface. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? 5 slots None of these 10 slots 7 slots 14 slots 5 slots None of these 10 slots 7 slots 14 slots ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Telecommunications networks come in a wide range of speed and capacity capabilities. Select the best fit for answer: Switching alternating Inter organizational networks Bandwidth alternatives Extranets None of these Switching alternating Inter organizational networks Bandwidth alternatives Extranets None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following communications lines is best suited to interactive processing applications? mixed band channels narrowband channels full-duplex lines simplex lines None of these mixed band channels narrowband channels full-duplex lines simplex lines None of these ANSWER DOWNLOAD EXAMIANS APP