You are on page 1of 15

Name: Class:

Saturday, December 9, 2023

Test
Please use a pencil to complete the test. Print your name on the Name line above. Read the
instructions for each section carefully. When you have completed the test, place your test
face down on your desk and raise your hand.
1. In the _______ random-access method collision is avoided.
1

CSMA/CD CSMA/CA
ALOHA token-passing
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

2. In the 1-persistent approach, when a station finds an idle line, it _______.


1

sends waits
immediately
0.1 s before sending

waits 1 s before sending waits a time equal to 1 − p seconds


before sending
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

page 1
Test Saturday, December 9, 2023
3. In the p-persistent approach, when a station finds an idle line, it _______.
1

sends immediately waits 1 s before sending


sends with probability 1- p sends with probability p
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

4. The 1-persistent approach can be considered a special case of the p-persistent


1 approach with p equal to _______.

1.0 2.0
0.1 0.5
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

5. In the _______ random-access method, stations do not sense the medium.


1

CSMA/CA ALOHA
CSMA/CD Ethernet
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

page 2
Test Saturday, December 9, 2023
6. Which of the following is an example of a random-access protocol?
1

Polling FDMA
Token passing None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

7. The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA.
1

less than greater than


equal to None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

8. The vulnerable time for CSMA is ___________.


1

Tp 2 x Tp
3 x Tp None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

page 3
Test Saturday, December 9, 2023
9. We need RTS and CTS packets in ____________ protocol.
1

CDMA/CA CDMA/CD
token-passing None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

10. _______ is a controlled-access protocol.


1

FDMA TDMA
CSMA Reservation
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

page 4
Test Saturday, December 9, 2023
11. _______ is (are) a channelization protocol.
1

FDMA TDMA
CDMA All the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

12. Which of the following architecture uses the CSMA/CD access method?
1

ARC net Ethernet


Router STP server
Notes: https://www.sanfoundry.com/computer-networks-questions-answers-campus-
interviews/

13. Pure ALOHA is __________


1

Modulation technique Multiple access technique


Random access technique Spread spectrum technique
Notes: https://www.sanfoundry.com/wireless-mobile-communications-questions-
answers-packet-radio/

page 5
Test Saturday, December 9, 2023
14. For pure ALOHA protocol, the vulnerable period is ___________ the packet duration.
1

Double Equal
Ten times Not equal
Notes: https://www.sanfoundry.com/wireless-mobile-communications-questions-
answers-packet-radio/

15. The vulnerable period of slotted ALOHA is _________ packet duration.


1

Two Ten
One Three
Notes: https://www.sanfoundry.com/wireless-mobile-communications-questions-
answers-packet-radio/

16. CSMA stands for _________


1

Carrier sense multiple access Code sense multiple access


Carrier sense modulation access Carry sense multiple access
Notes: https://www.sanfoundry.com/wireless-mobile-communications-questions-
answers-packet-radio/

17. MAC stands for ________


1

Media Area Control Memory Access Control


Memory Area Control Media Access Control
Notes: https://www.sanfoundry.com/iot-questions-answers-mac-address/

page 6
Test Saturday, December 9, 2023
18. The term CD in CSMA/CD stands for _________
1

Collision Detection Collision Delay


Compact Detection Compact Delay
Notes: https://www.sanfoundry.com/analog-communications-questions-answers-
direct-method/

19. Which of the following is the multiple access protocol for channel access control?
1

CSMA/CD CSMA/CA
Both CSMA/CD & CSMA/CA HDLC
Notes: https://www.sanfoundry.com/computer-networks-questions-answers-data-link-
layer/

20. When two PCs send data over a baseband network cable at the same time, it is called
1 ________

contention collision
excess traffic switching
Notes: https://www.sanfoundry.com/analog-communications-questions-answers-
variation-method/

page 7
Test Saturday, December 9, 2023
21. In the token passing approach of distributed systems, processes are organized in a ring
1 structur ..e........

logically physically
both logically and physically none of the mentioned
Notes: https://www.sanfoundry.com/operating-system-questions-answers-distributed-
synchronization/

Question:6

22. ......... is a controlled-access protocol.


1

FDMA TDMA
CSMA Reservation
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

Question:7

page 8
Test Saturday, December 9, 2023
23. ........is (are) a channelization protocol.
1

FDMA TDMA
CDMA All the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

Question:8

page 9
Test Saturday, December 9, 2023
24. Which of the following is an example of a controlled-access protocol?
1

CDMA FDMA
Token passing None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

Question:11

page 10
Test Saturday, December 9, 2023
25. In FDMA, we use different ......... to achieve channelization.
1

frequency ranges time slots


codes None of the choices are correct.
Notes: file:///C:/Users/Ahmed/Desktop/files%20of%20manoon/DC%20book.pdf

Question:15

26. In TDMA, we use different ........ to achieve channelization.


1

frequency ranges time slots


codes None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html

Question:17

27. In the reservation method of controlled access, how is the time divided for stations to
1 make reservations before sending data?

Time is divided into data frames Time is divided into intervals with
reservation frames
Stations can make reservations at any Time is divided into fixed slots for
time each station

page 11
Test Saturday, December 9, 2023
28. How many reservation minislots are there in the reservation frame if there are N
1 stations in the system?

N N/2
N-1 2N

29. In the polling method, which device is designated as the initiator of a session?
1

Any secondary device The device with the highest priority


The primary device The device with the lowest address

30. What is the primary disatventage of the polling method?


1

High collision rates Limited scalability


Complexity in implementation System failure if the primary station
fails

page 12
Test Saturday, December 9, 2023
31. When does the primary device use the select function in the polling method?
1

To send data frames To solicit transmissions from


secondary devices
To verify data receipt To determine link availability

32. What frame does the primary device create and transmit before sending data in the
1 polling method?

Poll frame Data frame


Select frame Acknowledgment frame

33. How does the primary device determine the readiness of the target secondary device
1 before sending data?

By analyzing the network topology By waiting for an acknowledgment


By using the poll function By checking the link availability

34. If a secondary device responds with a NAK frame in the polling method, what does it
1 indicate?

The secondary device has data to The primary device should stop
send. polling.
The secondary device has nothing to The primary device should transmit
send. data immediately.

page 13
Test Saturday, December 9, 2023
35. When a station in the token-passing method has no more data to send, what does it
1 do with the token?

Holds onto it until the next round Passes it to the next logical station in
the ring
Destroys the token Sends the token to the primary
station

36. What is the purpose of token management in the token-passing method?


1

To increase the speed of token To ensure stations have unlimited


circulation access to the token
To monitor and control the To eliminate the need for a logical
possession of the token ring

page 14
Test Saturday, December 9, 2023
37. How does FDMA prevent station interferences in the allocated frequency bands?
1

By using high-powered transmitters By applying time division


By inserting guard bands between By employing spatial separation
bands

38. Which layer of the OSI model does FDMA operate in?
1

Physical layer Data-link layer


Network layer Transport layer

39. What does the data-link layer in each station instruct the physical layer to do in
1 TDMA?

Use a physical multiplexer Interleave data units


Use the allocated time slot Insert synchronization bits

40. What is inserted at the beginning of each time slot in TDMA for synchronization?
1

Frequency modulation bits Guard times


Data units Synchronization bits (preamble bits)

page 15

You might also like