edited by
1,372 views
0 votes
0 votes

Match the following :
$$\begin{array}{} \hline \text{(i)} & \text{Ethernet} & \text{(a)} & \text{Determinsitic} \\ \hline  \text{(ii)} & \text{Token Ring N } & \text{(b)} & \text{Utilize the full wire speed} \\ \hline \text{(iii)} & \text{Cut-through switch} & \text{(c)} & \text{Prevent looping} \\ \hline \text{(iv)} & \text{Spanning tree} & \text{(d)} & \text{Checking Valid address Codes} \\ \hline \end{array}$$

  1. $\text{a-ii, b-iii, c-iv, d-i}$
  2. $\text{a-i, b-iii, c-iv, d-ii}$
  3. $\text{a-ii, b-iv, c-iii, d-i}$
  4. $\text{a-iv, b-iii, c-ii, d-i}$
edited by

2 Answers

0 votes
0 votes

deterministic - Computer Definition

 

imageimage
  1. Predictive. Referring to the ability to objectively predict an outcome or result of a process due to knowledge of a cause and effect relationship.
  2. In telecommunications switching and routing, the programmed predetermination of a path between nodes. See also nodepath, route, and switch.
  3. In local area networks (LANs), a non-contentious medium access control (MAC) convention that allows both the centralized master station, which commonly is in the form of a server, and each slaved station to determine the maximum length of time that passes before a station gains access to the network, perhaps on the basis of programmed access priorities. Deterministic access employs token passing, a protocol in which a token, which consists of a specific bit pattern, indicates the status of the network -- available or unavailable.The token is generated by a centralized master control station and transmitted across the network.The station in possession of the token (the last station to receive the message containing the token) controls the access to the network. That station may either transmit or require other stations to respond. Transmission is in the form of a data packet of a predetermined maximum size, determined by the number of nodes on the ring and the traffic to be supported. After transmitting, the station passes the token to a successor station, in a predetermined sequence. Token passing is complex and overhead-intensive, but the associated high level of network control avoids data collisions.Token Ring is a deterministic LAN protocol. See also LANMAC,master/slavenodenon-deterministictoken passing, and Token Ring.

spannning tree- Spanning tree does not have any cycle (loops)

 I hope I am able to clear doubts

0 votes
0 votes
Answer:

(i) – (d)

(ii) – (a)

(iii) – (b)

(iv) – ©

Explanation:

Ethernet checks whether a address is valid or not.

Token Ring is deterministic as it gives every computer equal access to network.

Cut through switch utilizes full capacity as it starts sending message as soon as first packet is made.

Spanning tree is created in network as it prevents a packet from entering in a loop.

Related questions

0 votes
0 votes
1 answer
1
rishu_darkshadow asked Sep 17, 2017
1,429 views
The unlicensed National Information Infrastructure band operates at the _________ frequency(A) 2.4 GHz(B) 5 GHz(C) 33 MHz(D) 5 MHz
2 votes
2 votes
3 answers
2
0 votes
0 votes
3 answers
3
0 votes
0 votes
1 answer
4