Professional Documents
Culture Documents
DC ch12
DC ch12
Test
Please use a pencil to complete the test. Print your name on the Name line above. Read the
instructions for each section carefully. When you have completed the test, place your test
face down on your desk and raise your hand.
1. In the _______ random-access method collision is avoided.
1
CSMA/CD CSMA/CA
ALOHA token-passing
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
sends waits
immediately
0.1 s before sending
page 1
Test Saturday, December 9, 2023
3. In the p-persistent approach, when a station finds an idle line, it _______.
1
1.0 2.0
0.1 0.5
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
CSMA/CA ALOHA
CSMA/CD Ethernet
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
page 2
Test Saturday, December 9, 2023
6. Which of the following is an example of a random-access protocol?
1
Polling FDMA
Token passing None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
7. The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA.
1
Tp 2 x Tp
3 x Tp None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
page 3
Test Saturday, December 9, 2023
9. We need RTS and CTS packets in ____________ protocol.
1
CDMA/CA CDMA/CD
token-passing None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
FDMA TDMA
CSMA Reservation
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
page 4
Test Saturday, December 9, 2023
11. _______ is (are) a channelization protocol.
1
FDMA TDMA
CDMA All the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
12. Which of the following architecture uses the CSMA/CD access method?
1
page 5
Test Saturday, December 9, 2023
14. For pure ALOHA protocol, the vulnerable period is ___________ the packet duration.
1
Double Equal
Ten times Not equal
Notes: https://www.sanfoundry.com/wireless-mobile-communications-questions-
answers-packet-radio/
Two Ten
One Three
Notes: https://www.sanfoundry.com/wireless-mobile-communications-questions-
answers-packet-radio/
page 6
Test Saturday, December 9, 2023
18. The term CD in CSMA/CD stands for _________
1
19. Which of the following is the multiple access protocol for channel access control?
1
CSMA/CD CSMA/CA
Both CSMA/CD & CSMA/CA HDLC
Notes: https://www.sanfoundry.com/computer-networks-questions-answers-data-link-
layer/
20. When two PCs send data over a baseband network cable at the same time, it is called
1 ________
contention collision
excess traffic switching
Notes: https://www.sanfoundry.com/analog-communications-questions-answers-
variation-method/
page 7
Test Saturday, December 9, 2023
21. In the token passing approach of distributed systems, processes are organized in a ring
1 structur ..e........
logically physically
both logically and physically none of the mentioned
Notes: https://www.sanfoundry.com/operating-system-questions-answers-distributed-
synchronization/
Question:6
FDMA TDMA
CSMA Reservation
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
Question:7
page 8
Test Saturday, December 9, 2023
23. ........is (are) a channelization protocol.
1
FDMA TDMA
CDMA All the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
Question:8
page 9
Test Saturday, December 9, 2023
24. Which of the following is an example of a controlled-access protocol?
1
CDMA FDMA
Token passing None of the choices are correct
Notes:
https://highered.mheducation.com/sites/0073376221/student_view0/chapter12/quizz
es.html
Question:11
page 10
Test Saturday, December 9, 2023
25. In FDMA, we use different ......... to achieve channelization.
1
Question:15
Question:17
27. In the reservation method of controlled access, how is the time divided for stations to
1 make reservations before sending data?
Time is divided into data frames Time is divided into intervals with
reservation frames
Stations can make reservations at any Time is divided into fixed slots for
time each station
page 11
Test Saturday, December 9, 2023
28. How many reservation minislots are there in the reservation frame if there are N
1 stations in the system?
N N/2
N-1 2N
29. In the polling method, which device is designated as the initiator of a session?
1
page 12
Test Saturday, December 9, 2023
31. When does the primary device use the select function in the polling method?
1
32. What frame does the primary device create and transmit before sending data in the
1 polling method?
33. How does the primary device determine the readiness of the target secondary device
1 before sending data?
34. If a secondary device responds with a NAK frame in the polling method, what does it
1 indicate?
The secondary device has data to The primary device should stop
send. polling.
The secondary device has nothing to The primary device should transmit
send. data immediately.
page 13
Test Saturday, December 9, 2023
35. When a station in the token-passing method has no more data to send, what does it
1 do with the token?
Holds onto it until the next round Passes it to the next logical station in
the ring
Destroys the token Sends the token to the primary
station
page 14
Test Saturday, December 9, 2023
37. How does FDMA prevent station interferences in the allocated frequency bands?
1
38. Which layer of the OSI model does FDMA operate in?
1
39. What does the data-link layer in each station instruct the physical layer to do in
1 TDMA?
40. What is inserted at the beginning of each time slot in TDMA for synchronization?
1
page 15