|
1 | | In the _______ random-access method collision is avoided. |
| | A) | CSMA/CD |
| | B) | CSMA/CA |
| | C) | ALOHA |
| | D) | token-passing |
|
|
|
2 | | In the 1-persistent approach, when a station finds an idle line, it _______. |
| | A) | sends immediately |
| | B) | waits 0.1 s before sending |
| | C) | waits 1 s before sending |
| | D) | waits a time equal to 1 − p seconds before sending |
|
|
|
3 | | _______ requires one primary station and one or more secondary stations. |
| | A) | Token ring |
| | B) | Reservation |
| | C) | Polling |
| | D) | CSMA |
|
|
|
4 | | In the p-persistent approach, when a station finds an idle line, it _______. |
| | A) | sends immediately |
| | B) | waits 1 s before sending |
| | C) | sends with probability 1 − p |
| | D) | sends with probability p |
|
|
|
5 | | The 1-persistent approach can be considered a special case of the p-persistent approach with p equal to _______. |
| | A) | 1.0 |
| | B) | 2.0 |
| | C) | 0.1 |
| | D) | 0.5 |
|
|
|
6 | | In the reservation access method, if there are 10 stations on a network, then there are _______ reservation minislots in the reservation frame. |
| | A) | 10 |
| | B) | 11 |
| | C) | 5 |
| | D) | 9 |
|
|
|
7 | | _______ is a controlled-access protocol. |
| | A) | FDMA |
| | B) | TDMA |
| | C) | CSMA |
| | D) | Reservation |
|
|
|
8 | | _______ is (are) a channelization protocol. |
| | A) | FDMA |
| | B) | TDMA |
| | C) | CDMA |
| | D) | All the choices are correct |
|
|
|
9 | | In the _______ random-access method, stations do not sense the medium. |
| | A) | CSMA/CA |
| | B) | ALOHA |
| | C) | CSMA/CD |
| | D) | Ethernet |
|
|
|
10 | | Which of the following is an example of a random-access protocol? |
| | A) | Polling |
| | B) | FDMA |
| | C) | Token passing |
| | D) | None of the choices are correct |
|
|
|
11 | | Which of the following is an example of a controlled-access protocol? |
| | A) | CDMA |
| | B) | FDMA |
| | C) | Token passing |
| | D) | None of the choices are correct |
|
|
|
12 | | The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA. |
| | A) | less than |
| | B) | greater than |
| | C) | equal to |
| | D) | None of the choices are correct |
|
|
|
13 | | The vulnerable time for CSMA is ___________. |
| | A) | Tp |
| | B) | 2 x Tp |
| | C) | 3 x Tp |
| | D) | None of the choices are correct |
|
|
|
14 | | We need RTS and CTS packets in ____________ protocol. |
| | A) | CDMA/CA |
| | B) | CDMA/CD |
| | C) | token-passing |
| | D) | None of the choices are correct |
|
|
|
15 | | In FDMA, we use different ___________ to achieve channelization. |
| | A) | frequency ranges |
| | B) | time slots |
| | C) | codes |
| | D) | None of the choices are correct. |
|
|
|
16 | | In CDMA, we use different ___________ to achieve channelization. |
| | A) | frequency ranges |
| | B) | time slots |
| | C) | codes |
| | D) | None of the choices are correct |
|
|
|
17 | | In TDMA, we use different ___________ to achieve channelization. |
| | A) | frequency ranges |
| | B) | time slots |
| | C) | codes |
| | D) | None of the choices are correct |
|
|
|
18 | | Walsh tables are used in _________________. |
| | A) | FDMA |
| | B) | TDMA |
| | C) | CDMA |
| | D) | None of the choices are correct |
|
|