Site MapHelpFeedbackQuizzes
Quizzes
(See related pages)

1
In the _______ random-access method collision is avoided.
A)CSMA/CD
B)CSMA/CA
C)ALOHA
D)token-passing
2
In the 1-persistent approach, when a station finds an idle line, it _______.
A)sends immediately
B)waits 0.1 s before sending
C)waits 1 s before sending
D)waits a time equal to 1 − p seconds before sending
3
_______ requires one primary station and one or more secondary stations.
A)Token ring
B)Reservation
C)Polling
D)CSMA
4
In the p-persistent approach, when a station finds an idle line, it _______.
A)sends immediately
B)waits 1 s before sending
C)sends with probability 1 − p
D)sends with probability p
5
The 1-persistent approach can be considered a special case of the p-persistent approach with p equal to _______.
A)1.0
B)2.0
C)0.1
D)0.5
6
In the reservation access method, if there are 10 stations on a network, then there are _______ reservation minislots in the reservation frame.
A)10
B)11
C)5
D)9
7
_______ is a controlled-access protocol.
A)FDMA
B)TDMA
C)CSMA
D)Reservation
8
_______ is (are) a channelization protocol.
A)FDMA
B)TDMA
C)CDMA
D)All the choices are correct
9
In the _______ random-access method, stations do not sense the medium.
A)CSMA/CA
B)ALOHA
C)CSMA/CD
D)Ethernet
10
Which of the following is an example of a random-access protocol?
A)Polling
B)FDMA
C)Token passing
D)None of the choices are correct
11
Which of the following is an example of a controlled-access protocol?
A)CDMA
B)FDMA
C)Token passing
D)None of the choices are correct
12
The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA.
A)less than
B)greater than
C)equal to
D)None of the choices are correct
13
The vulnerable time for CSMA is ___________.
A)Tp
B)2 x Tp
C)3 x Tp
D)None of the choices are correct
14
We need RTS and CTS packets in ____________ protocol.
A)CDMA/CA
B)CDMA/CD
C)token-passing
D)None of the choices are correct
15
In FDMA, we use different ___________ to achieve channelization.
A)frequency ranges
B)time slots
C)codes
D)None of the choices are correct.
16
In CDMA, we use different ___________ to achieve channelization.
A)frequency ranges
B)time slots
C)codes
D)None of the choices are correct
17
In TDMA, we use different ___________ to achieve channelization.
A)frequency ranges
B)time slots
C)codes
D)None of the choices are correct
18
Walsh tables are used in _________________.
A)FDMA
B)TDMA
C)CDMA
D)None of the choices are correct







Data Comm. and NetworkingOnline Learning Center

Home > Chapter 12 > Quizzes