Medium Access Control MCQ Quiz Questions And Answers

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Bievangelista
B
Bievangelista
Community Contributor
Quizzes Created: 8 | Total Attempts: 11,502
Questions: 23 | Attempts: 3,636

SettingsSettingsSettings
Medium Access Control MCQ Quiz Questions And Answers - Quiz

Hello there! Prepare yourself for this short and fun 'Medium Access Control' MCQ quiz that we've designed for you. With this quiz, we plan on testing your knowledge about data communication and medium access control topics. So, if you've studied this topic and think you have good knowledge about it, then you must try out this quiz. Let's see if you can pass this test or not. We wish you good luck, in advance!


Questions and Answers
  • 1. 

    Name the method in which each user is assigned with an equal-portion of the bandwidth.

    • A.

      Static method

    • B.

      Dynamic method

    • C.

      Non static method

    • D.

      None of the above

    Correct Answer
    A. Static method
    Explanation
    The correct answer is "static method." In a static method, each user is assigned an equal portion of the bandwidth. This means that the bandwidth is divided equally among all users, ensuring that each user receives the same amount of bandwidth. This method is commonly used in situations where fairness and equal distribution of resources are important.

    Rate this question:

  • 2. 

    Which stations can detect whether the channel is in use prior to transmitting?

    • A.

      Collision assumption

    • B.

      Carrier sense

    • C.

      Slotted time

    • D.

      Single channel assumption

    Correct Answer
    B. Carrier sense
    Explanation
    Carrier sense is the correct answer because it refers to the ability of a station to detect whether the channel is in use before transmitting. This is an important feature in network communication to avoid collisions and ensure efficient transmission. By sensing the carrier or the presence of signals on the channel, the station can determine if it is clear to transmit data or if it needs to wait for the channel to become available.

    Rate this question:

  • 3. 

     Radio broadcast on a common frequency to transmit uses _________ protocol. 

    • A.

      Carrier Sense Multiple Access Protocols

    • B.

      Collision-Free Protocols

    • C.

      Limited-Contention Protocols

    • D.

      ALOHA Protocol

    Correct Answer
    D. ALOHA Protocol
    Explanation
    The correct answer is ALOHA Protocol. The ALOHA Protocol is a random access protocol used for transmitting data over a common frequency in radio broadcasts. It allows multiple users to transmit data without any coordination or central control. The protocol works by allowing each user to transmit whenever they have data to send, and if there is a collision (two or more users transmitting at the same time), a random backoff time is used before retransmitting. This helps to minimize collisions and maximize the efficiency of the transmission.

    Rate this question:

  • 4. 

    ___________is a medium access control protocol used for transmitting data via a shared network channel. 

    • A.

      ALOHA

    • B.

      Carrier Sense Multiple Access Protocols

    • C.

      Collision-Free Protocols

    • D.

      None of the above 

    Correct Answer
    A. ALOHA
    Explanation
    ALOHA is a medium access control protocol used for transmitting data via a shared network channel. It was developed at the University of Hawaii and is known for its simplicity. In ALOHA, each station can transmit data whenever it has data to send, without checking if the channel is busy or not. However, collisions may occur if two or more stations transmit at the same time, resulting in data loss. ALOHA is a random access protocol, meaning that stations contend for the channel and collisions are resolved through retransmissions.

    Rate this question:

  • 5. 

     The time interval in which frames can overlap is called _________. 

    • A.

      Continuous time

    • B.

      Contention period

    • C.

      Channel throughput

    • D.

      Channel load

    Correct Answer
    B. Contention period
    Explanation
    The correct answer is "contention period". In networking, contention period refers to the time interval in which frames can overlap. During this period, multiple devices or nodes on a network may attempt to transmit data simultaneously, leading to collisions and contention for the shared channel. This can result in decreased network performance and increased latency.

    Rate this question:

  • 6. 

    A station stops transmitting its frame immediate after a collision is detected to save time and bandwidth is _______________.

    • A.

      Carrier Sense Multiple Access with Collision Detection Protocol

    • B.

      Collision Free Protocol

    • C.

      Carrier Sense Multiple Access with Collision Avoidance Protocol

    • D.

      Limited-Contention Protocol

    Correct Answer
    A. Carrier Sense Multiple Access with Collision Detection Protocol
    Explanation
    The correct answer is Carrier Sense Multiple Access with Collision Detection Protocol. This protocol is used in networks to detect collisions that occur when multiple devices transmit data simultaneously. When a collision is detected, the station stops transmitting its frame immediately to prevent further collisions and save time and bandwidth. This helps to ensure that the network operates efficiently and minimizes data loss due to collisions.

    Rate this question:

  • 7. 

     Contention slot used to make reservation for transmitting by placing a 1 if station wants to transmit is _______________.

    • A.

      Basic bit map protocol

    • B.

      Binary countdown protocol

    • C.

      Limited contention protocol

    • D.

      Carrier Sense Multiple Access with Collision Detection

    Correct Answer
    A. Basic bit map protocol
    Explanation
    The correct answer is basic bit map protocol. In this protocol, contention slots are used by stations to make reservations for transmitting. Each station indicates its desire to transmit by placing a 1 in the corresponding slot. The bit map is then used to determine which stations have successfully reserved a slot and can transmit without collision.

    Rate this question:

  • 8. 

    It reduces delay caused by contention slot period and station wanting to send broadcasts address as bit string starting with high order bit.

    • A.

      Basic bit map protocol

    • B.

      Binary countdown protocol

    • C.

      Limited contention protocol

    • D.

      Carrier Sense Multiple Access with Collision Detection

    Correct Answer
    B. Binary countdown protocol
    Explanation
    The binary countdown protocol reduces delay caused by contention slot period and station wanting to send broadcasts address as a bit string starting with high order bit. This means that stations wanting to send a broadcast address will have their requests prioritized, resulting in reduced delay.

    Rate this question:

  • 9. 

    In this protocol as the load increases, contention becomes increasingly less attractive, because the overload associated with channel arbitration becomes greater.

    • A.

      Binary Countdown Protocol

    • B.

      Limited Contention Protocol

    • C.

      Carrier Sense Multiple Access with Collision Avoidance

    • D.

      Basic Bit Map Protocol

    Correct Answer
    B. Limited Contention Protocol
    Explanation
    The Limited Contention Protocol is the correct answer because as the load increases, contention becomes less attractive. This means that in situations where there is a high level of traffic or congestion on the network, the Limited Contention Protocol would be a better choice as it minimizes the overload associated with channel arbitration. This protocol allows for a more efficient and fair distribution of network resources, reducing the chances of collisions and improving overall network performance.

    Rate this question:

  • 10. 

     Initially all the nodes are allowed to try to aquire the channel, and if it is able to aquire the channel, it sends its frame. If there is collision then the nodes are divided into two equal groups and only one of these groups compete for slot 1. If one of its member aquires the channel then the next slot is reserved for the other group.

    • A.

      Wavelength Division Multiple Access Protocols

    • B.

      Limited-Contention Protocols

    • C.

      Collision-Free Protocols

    • D.

      Adaptive Tree Walk Protocol

    Correct Answer
    D. Adaptive Tree Walk Protocol
  • 11. 

    When a central station is in range of two stations but these are out of each other's range and cannot sense each other's transmission, thus, one of the two stations transmitting would collide at the central station but not sensed by the other station from these two. The two stations are _____________.

    • A.

      Hidden stations

    • B.

      Exposed stations

    • C.

      Single frequency station

    • D.

      None of the above

    Correct Answer
    A. Hidden stations
    Explanation
    In this scenario, the two stations are referred to as hidden stations. This is because they are out of each other's range and cannot sense each other's transmission. As a result, when both stations transmit simultaneously, a collision occurs at the central station, but the other station is unaware of this collision. Therefore, the correct answer is hidden stations.

    Rate this question:

  • 12. 

     In this protocol, sender stimulates receiver to output short frame that is detected by adjacent stations, preventing them from transmitting.

    • A.

      Collision Free Protocol

    • B.

      Limited Contention Protocol

    • C.

      Carrie Sense Multiple Access with Collision Avoidance

    • D.

      Carrier Sense Multiple Access with Collision Detection

    Correct Answer
    C. Carrie Sense Multiple Access with Collision Avoidance
    Explanation
    In this protocol, the sender uses a carrier sense mechanism to detect if the medium is busy before transmitting data. It also stimulates the receiver to send a short frame, which is detected by adjacent stations. This prevents collisions and ensures that only one station transmits at a time, avoiding data loss and improving efficiency. This protocol is known as Carrier Sense Multiple Access with Collision Avoidance.

    Rate this question:

  • 13. 

      _____________ is a standard communications protocol embedded in software and hardware devices, intended for building a local area network.

    • A.

      Ethernet

    • B.

      Internet

    • C.

      Internet

    • D.

      Sneaker net

    Correct Answer
    A. Ethernet
    Explanation
    Ethernet is a standard communications protocol that is commonly used for building local area networks. It is embedded in both software and hardware devices, allowing them to communicate with each other over a network. Ethernet provides a reliable and efficient way for devices to transmit and receive data, making it a popular choice for connecting computers, printers, and other devices within a local area network.

    Rate this question:

  • 14. 

     Ethernet cabling uses a ______________wiring configuration.

    • A.

      Optical fiber

    • B.

      Twisted-pair

    • C.

      Coaxial

    • D.

      Open-wire

    Correct Answer
    B. Twisted-pair
    Explanation
    Ethernet cabling uses a twisted-pair wiring configuration. Twisted-pair refers to a type of cable in which two conductors are twisted together to reduce electromagnetic interference. This type of wiring is commonly used in Ethernet networks to transmit data signals. Optical fiber, coaxial, and open-wire are other types of cabling used for different purposes, but twisted-pair is specifically used for Ethernet connections.

    Rate this question:

  • 15. 

     Wiring standard of half duplex, using all 8 category 3 UTP wires (internal phone wire) to hub that forms one collision domain is ______________.

    • A.

      100Base-T4

    • B.

      100Base-TX

    • C.

      100Base-FX

    • D.

      100Base-MX

    Correct Answer
    A. 100Base-T4
    Explanation
    The correct answer is 100Base-T4. This wiring standard allows for half duplex communication and uses all 8 category 3 UTP wires to connect to a hub, forming a single collision domain.

    Rate this question:

  • 16. 

     Wiring standard of full duplex, only 4 of the category 5 wires to hub used, hub forms one collision domain is ________________.

    • A.

      100Base-T4

    • B.

      100Base-TX

    • C.

      100Base-FX

    • D.

      100Base-FZ

    Correct Answer
    B. 100Base-TX
    Explanation
    The correct answer is 100Base-TX. This is because 100Base-TX is a wiring standard that supports full duplex communication, where both devices can transmit and receive data simultaneously. In this standard, only 4 of the category 5 wires are used to connect to the hub, and the hub forms one collision domain, meaning that collisions can occur within the hub.

    Rate this question:

  • 17. 

    Since frames are too long for collision algorithm, with this wiring standard to switched hub each connection is its own collision domain, allowing all stations to receive and transmit simultaneously

    • A.

      100Base-T4

    • B.

      100Base-TX

    • C.

      100Base-FX

    • D.

      100Base-FZ

    Correct Answer
    C. 100Base-FX
    Explanation
    The correct answer is 100Base-FX. This is because 100Base-FX is a type of Ethernet standard that uses fiber optic cables for transmission. Unlike the other options mentioned (100Base-T4, 100Base-TX, and 100Base-FZ), 100Base-FX allows for full-duplex communication, meaning that stations can transmit and receive data simultaneously. This is possible because each connection in 100Base-FX operates in its own collision domain, eliminating the need for collision detection and allowing for more efficient communication.

    Rate this question:

  • 18. 

     It used for the highest priority transmissions enabling stations with this type of information to access the radio link first.

    • A.

      Short Inter-Frame Space

    • B.

      Point Coordinated Function Interframe Space

    • C.

      Distributed Coordination Function Interframe Space

    • D.

      Extended Interframe Space

    Correct Answer
    A. Short Inter-Frame Space
    Explanation
    Short Inter-Frame Space is used for the highest priority transmissions, allowing stations with this type of information to access the radio link first. This means that when a station needs to transmit high priority data, it can use the Short Inter-Frame Space to quickly gain access to the channel and transmit its information without waiting for other lower priority transmissions to complete. This helps ensure that critical information is transmitted in a timely manner, making Short Inter-Frame Space an important feature in wireless communication protocols.

    Rate this question:

  • 19. 

     It connects two or more LANs by forwarding frames received.

    • A.

      Bridge

    • B.

      Router

    • C.

      Hub

    • D.

      Gateway

    Correct Answer
    A. Bridge
    Explanation
    A bridge is a networking device that connects two or more LANs by forwarding frames received. It operates at the data link layer of the OSI model and uses MAC addresses to determine the destination of the frames. Unlike a hub, a bridge is able to filter and forward frames only to the intended destination, improving network efficiency. A router, on the other hand, operates at the network layer and is used to connect different networks together. A gateway is a device or software that acts as an entrance or exit point between two networks, often used to connect a local network to the internet.

    Rate this question:

  • 20. 

     A tree where every LAN is reachable from a root that the numbers on the connecting LANs represent some metric such as channel cost or bandwidth is called ______. 

    • A.

      Spanning tree

    • B.

      Adaptive tree

    • C.

      Remote bridge

    • D.

      None of the above 

    Correct Answer
    A. Spanning tree
    Explanation
    A spanning tree is a tree in which every LAN is reachable from a root. The numbers on the connecting LANs in a spanning tree represent some metric such as channel cost or bandwidth. This ensures that the tree is able to efficiently route traffic and maintain connectivity between all LANs in the network. An adaptive tree refers to a different concept, while a remote bridge is not specifically related to this scenario. Therefore, the correct answer is a spanning tree.

    Rate this question:

  • 21. 

    It connects two or more distant LANs using bridges at the connection of the LAN to a point-to-point line. 

    • A.

      Spanning tree

    • B.

      Adaptive tree

    • C.

      Remote bridge

    • D.

      None of the above 

    Correct Answer
    C. Remote bridge
    Explanation
    A remote bridge is a device that connects two or more distant LANs using bridges at the connection of the LAN to a point-to-point line. This allows for the extension of a local area network over a wide area network, enabling communication between geographically separated networks. The remote bridge acts as a bridge between the LANs, forwarding data packets between them.

    Rate this question:

  • 22. 

     It extends cabling by connecting segments, amplify and retransmit (physical layer).

    • A.

      Repeater

    • B.

      Hub

    • C.

      Bridge

    • D.

      Switch

    Correct Answer
    A. Repeater
    Explanation
    A repeater is a device that extends the reach of a network by connecting segments of cabling and amplifying and retransmitting signals at the physical layer. It is used to overcome the limitations of signal degradation and distance in wired networks. Unlike hubs, bridges, and switches, repeaters do not have any intelligence to filter or forward data at the higher layers of the network. Instead, they simply regenerate and boost the signal, allowing it to travel further along the network.

    Rate this question:

  • 23. 

     It is used to connect stations to a common contention channel when using 10Base-T wiring

    • A.

      Repeater

    • B.

      Hub

    • C.

      Bridge

    • D.

      Switch

    Correct Answer
    B. Hub
    Explanation
    A hub is used to connect stations to a common contention channel when using 10Base-T wiring. A hub operates at the physical layer of the network, simply receiving incoming data and broadcasting it to all connected devices. It does not perform any filtering or routing functions, making it a simple and cost-effective choice for small networks. However, this lack of intelligence also means that all devices connected to a hub share the same bandwidth, leading to potential congestion and slower performance.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 26, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 25, 2009
    Quiz Created by
    Bievangelista
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.