BIS230- Ch 07 Solutions

BIS230- Ch 07 Solutions - Guide to Networking Essentials,...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Guide to Networking Essentials , 5th ed., 14188-37180 Ch. 7 Solutions-1 Chapter 7 Solutions Review Questions 1. Which access control method uses a device to check each potential sender to see whether it wants to transmit data? c. polling 2. Which access control method circulates special transmission packets to control media access? a. token passing 3. Which access control method provides the highest bandwidth to the senders and receivers it connects? e. switching 4. Which of the following channel access methods is used in Ethernet networks? a. CSMA/CD 5. Which of the following is an advantage of polling? (Choose all that apply.) b. equal access to the medium for all computers on the network d. allows priority assignment 6. What are the different implementations of 100 Mbps Ethernet? (Choose all that apply.) a. 100BaseT4 b. 100BaseTX c. 100BaseFX 7. How many rings exist in an FDDI network? b. two 8. Which Ethernet frame type does TCP/IP use? b.  Ethernet  II 9. What is the function of the active monitor in a token ring network? to manage the beaconing process 10. How many hubs can exist between two communicating hosts in an Ethernet hub-based network? four 11. What channel access method does 802.11b use? c. CSMA/CA
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

BIS230- Ch 07 Solutions - Guide to Networking Essentials,...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online