A. BPU and ACK B. 802.2 and 802.5 C. data/command and token D. NCP and LCP A. Ethernet B. Token Ring C. FDDI D. All of the above. A. They use Manchester encoding. B. They combine both clock and data information into a self-synchronizing stream of signals. C. They are designed to send and receive signals over a segment that consists of 4 wires. D. All of the above are true. A. A frame that will be sent to one node on a network B. When too many broadcasts are sent out over the network C. A section of a network that is bounded by bridges, routers, or switches D. The network areas within which frames that have collided are propagated A. section of a network containing a predetermined number of addressable services B. section of a network that is a logical grouping based on MAC addresses C. section of a network that contains Token Ring topology D. section of a network bounded by routers, switches, or bridges A. They forward all data packets to other segments of the network. B. They can restrict unauthorized access to files by reading the filename from the header. C. They forward packets based on IP addresses. D. They can improve network performance. A. If a destination device detects any errors, then the data packet is discarded and the sender notified. B. The destination device notifies the source only if it receives all of the data. C. The destination only notifies the source if the data was corrupted. D. If the destination must discard the data, then it does not notify the source. A. reservation field and priority field B. relay field and priority field C. remote field and control field D. restriction field and placement field A. passive hub B. bridge C. active hub D. transceiver A. Media Access Control (MAC) B. Physical Layer Protocol (PHY) C. Physical Layer Medium (PMD) D. Station Management (SMT) A. macrosegmentation B. microsegmentation C. port-centric D. none of the above A. They are passive. B. They operate only at the data link layer. C. They base forwarding decisions on Layer 2 addresses. D. They base forwarding decisions on Layer 3 protocol addresses. A. Token-ring is deterministic. B. Token-ring networks have increased collisions. C. Token-ring uses 802.3 and Ethernet uses 802.5. D. Token-ring operates at 10 Mbps and Ethernet at 16 Mbps. A. Token Ring B. Ethernet C. ArcNet D. FDDI A. single-mode B. multi-mode C. intra-mode D. inter-mode A. operate at the same speed B. use a ring topology C. use CSMA/CD D. use of dual rings A. Apple B. IBM C. Xerox D. Cisco A. media interface port B. serial port C. MAC card D. NIC card A. The Ethernet version 2 header is much longer than the header of an 802.3 frame. B. The Ethernet version 2 header is much shorter than the header of an 802.3 frame. C. The two headers are the same length as each other. D. The two headers are completely different from each other. A. hub B. NIC C. switch D. transceiver A. a repeater could be installed to extend the network B. another server could be used to extend the network C. special NICs can be purchased to extend the network D. all of the above |