Data Communications - Medium Access Control Sublayer

25 Questions | Total Attempts: 81

Settings
Please wait...
Data Communication Quizzes & Trivia

This quiz covers the Medium Access Control Sublayer.


Questions and Answers
  • 1. 
    In this method each user is assigned with an equal-portion of the bandwidth.
    • A. 

      Static method

    • B. 

      Dynamic method

  • 2. 
     Stations can detect whether the channel is in use prior to transmitting.
    • A. 

      Collision assumption

    • B. 

      Carrier sense

    • C. 

      Slotted time

    • D. 

      Single channel assumption

  • 3. 
     Radio broadcast on common frequency to transmit.
    • A. 

      Carrier Sense Multiple Access Protocols

    • B. 

      Collision-Free Protocols

    • C. 

      Limited-Contention Protocols

    • D. 

      ALOHA Protocol

  • 4. 
     Users can transmit whenever they have data to send, and if there is a collision, colliding frames will be damaged and will be destroyed.  
    • A. 

      Pure ALOHA

    • B. 

      Slotted ALOHA

    • C. 

      Carrier Sense Multiple Access Protocols

    • D. 

      Collision-Free Protocols

  • 5. 
     The time interval in which frames can overlap.
    • A. 

      Continuous time

    • B. 

      Contention period

    • C. 

      Channel throughput

    • D. 

      Channel load

  • 6. 
     A station stops transmitting its frame immediate after a collision is detected to save time and bandwidth is _______________.
    • A. 

      Carrier Sense Multiple Access with Collision Detection Protocol

    • B. 

      Collision Free Protocol

    • C. 

      Carrier Sense Multiple Access with Collision Avoidance Protocol

    • D. 

      Limited-Contention Protocol

  • 7. 
    Pure Aloha had a maximum throughput of about ______%.
  • 8. 
    Slotted Aloha has increased the maximum throughput to ______%.
  • 9. 
     Contention slot used to make reservation for transmitting by placing a 1 if station wants to transmit is _______________.
    • A. 

      Basic bit map protocol

    • B. 

      Binary countdown protocol

    • C. 

      Limited contention protocol

    • D. 

      Carrier Sense Multiple Access with Collision Detection

  • 10. 
    It reduces delay caused by contention slot period and station wanting to send broadcasts address as bit string starting with high order bit.
    • A. 

      Basic bit map protocol

    • B. 

      Binary countdown protocol

    • C. 

      Limited contention protocol

    • D. 

      Carrier Sense Multiple Access with Collision Detection

  • 11. 
    In this protocol as the load increases, contention becomes increasingly less attractive, because the overload associated with channel arbitration becomes greater.
    • A. 

      Basic Bit Map Protocol

    • B. 

      Binary Countdown Protocol

    • C. 

      Limited Contention Protocol

    • D. 

      Carrier Sense Multiple Access with Collision Avoidance

  • 12. 
     Initially all the nodes are allowed to try to aquire the channel, and if it is able to aquire the channel, it sends its frame. If there is collision then the nodes are divided into two equal groups and only one of these groups compete for slot 1. If one of its member aquires the channel then the next slot is reserved for the other group.
    • A. 

      Wavelength Division Multiple Access Protocols

    • B. 

      Limited-Contention Protocols

    • C. 

      Collision-Free Protocols

    • D. 

      Adaptive Tree Walk Protocol

  • 13. 
     When a central station is in range of two stations but these are out of each other's range and cannot sense each other's transmission, thus, one of the two stations transmitting would collide at the central station but not sensed by the other station from these two. The two stations are _____________.
    • A. 

      Hidden stations

    • B. 

      Exposed stations

    • C. 

      Single frequency station

  • 14. 
     In this protocol, sender stimulates receiver to output short frame that is detected by adjacent stations, preventing them from transmitting.
    • A. 

      Collision Free Protocol

    • B. 

      Limited Contention Protocol

    • C. 

      Carrie Sense Multiple Access with Collision Avoidance

    • D. 

      Carrier Sense Multiple Access with Collision Detection

  • 15. 
      _____________ is a standard communications protocol embedded in software and hardware devices, intended for building a local area network.
    • A. 

      Ethernet

    • B. 

      Internet

    • C. 

      Internet

    • D. 

      Sneaker net

  • 16. 
     Ethernet cabling uses a ______________wiring configuration.
    • A. 

      Optical fiber

    • B. 

      Twisted-pair

    • C. 

      Coaxial

    • D. 

      Open-wire

  • 17. 
     Wiring standard of half duplex, using all 8 category 3 UTP wires (internal phone wire) to hub that forms one collision domain is ______________.
    • A. 

      100Base-T4

    • B. 

      100Base-TX

    • C. 

      100Base-FX

  • 18. 
     Wiring standard of full duplex, only 4 of the category 5 wires to hub used, hub forms one collision domain is ________________.
    • A. 

      100Base-T4

    • B. 

      100Base-TX

    • C. 

      100Base-FX

  • 19. 
    Since frames are too long for collision algorithm, with this wiring standard to switched hub each connection is its own collision domain, allowing all stations to receive and transmit simultaneously
    • A. 

      100Base-T4

    • B. 

      100Base-TX

    • C. 

      100Base-FX

  • 20. 
     It used for the highest priority transmissions enabling stations with this type of information to access the radio link first.
    • A. 

      Short Inter-Frame Space

    • B. 

      Point Coordinated Function Interframe Space

    • C. 

      Distributed Coordination Function Interframe Space

    • D. 

      Extended Interframe Space

  • 21. 
     It connects two or more LANs by forwarding frames received.
    • A. 

      Bridge

    • B. 

      Router

    • C. 

      Hub

    • D. 

      Gateway

  • 22. 
     A tree where every LAN is reachable from a root that the numbers on the connecting LANs represent some metric such as channel cost or bandwidth.
    • A. 

      Spanning tree

    • B. 

      Adaptive tree

    • C. 

      Remote bridge

  • 23. 
    It connects two or more distant LANs using bridges at connection of LAN to a point-to-point line
    • A. 

      Spanning tree

    • B. 

      Adaptive tree

    • C. 

      Remote bridge

  • 24. 
     It extends cabling by connecting segments, amplify and retransmit (physical layer).
    • A. 

      Repeater

    • B. 

      Hub

    • C. 

      Bridge

    • D. 

      Switch

  • 25. 
     It is used to connect stations to a common contention channel when using 10Base-T wiring
    • A. 

      Repeater

    • B. 

      Hub

    • C. 

      Bridge

    • D. 

      Switch