0% found this document useful (0 votes)
196 views3 pages

Chapter 12 Quizzes

This document contains 18 multiple choice questions about different topics in computer networking. Specifically, it covers random access protocols like ALOHA and CSMA, controlled access protocols like token passing, and channelization protocols like FDMA, TDMA, and CDMA. It asks about concepts like collision avoidance, vulnerable time periods, use of RTS and CTS packets, and how each protocol divides up the channel or achieves channelization. The questions are part of a chapter 12 quiz on these computer networking topics.

Uploaded by

Amal Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
196 views3 pages

Chapter 12 Quizzes

This document contains 18 multiple choice questions about different topics in computer networking. Specifically, it covers random access protocols like ALOHA and CSMA, controlled access protocols like token passing, and channelization protocols like FDMA, TDMA, and CDMA. It asks about concepts like collision avoidance, vulnerable time periods, use of RTS and CTS packets, and how each protocol divides up the channel or achieves channelization. The questions are part of a chapter 12 quiz on these computer networking topics.

Uploaded by

Amal Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1 Chapter 12 Quizzes

1 In the _______ random-access method collision is avoided.


A) CSMA/CD
B) CSMA/CA
C) ALOHA
D) token-passing

2 In the 1-persistent approach, when a station finds an idle line, it _______.


A) sends immediately
B) waits 0.1 s before sending
C) waits 1 s before sending
D) waits a time equal to 1 − p seconds before sending

3 _______ requires one primary station and one or more secondary stations.
A) Token ring
B) Reservation
C) Polling
D) CSMA

4 In the p-persistent approach, when a station finds an idle line, it _______.


A) sends immediately
B) waits 1 s before sending
C) sends with probability 1 − p
D) sends with probability p

5 The 1-persistent approach can be considered a special case of the p-persistent


approach with p equal to _______.
A) 1.0
B) 2.0
C) 0.1
D) 0.5

6 In the reservation access method, if there are 10 stations on a network, then there are
_______ reservation mini slots in the reservation frame.
A) 10
B) 11
C) 5
D) 9

CREATED BY SAHAR SALEM


2 Chapter 12 Quizzes

7 _______ is a controlled-access protocol.


A) FDMA
B) TDMA
C) CSMA
D) Reservation

8 _______ is (are) a channelization protocol.


A) FDMA
B) TDMA
C) CDMA
D) All the choices are correct

9 In the _______ random-access method, stations do not sense the medium.


A) CSMA/CA
B) ALOHA
C) CSMA/CD
D) Ethernet

10 Which of the following is an example of a random-access protocol?


A) Polling
B) FDMA
C) Token passing
D) None of the choices are correct

11 Which of the following is an example of a controlled-access protocol?


A) CDMA
B) FDMA
C) Token passing
D) None of the choices are correct

12 The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA.
A) less than
B) greater than
C) equal to
D) None of the choices are correct

CREATED BY SAHAR SALEM


3 Chapter 12 Quizzes

13 The vulnerable time for CSMA is ___________.


A) Tp
B) 2 x Tp
C) 3 x Tp
D) None of the choices are correct

14 We need RTS and CTS packets in ____________ protocol.


A) CDMA/CA
B) CDMA/CD
C) token-passing
D) None of the choices are correct

15 In FDMA, we use different ___________ to achieve channelization.


A) frequency ranges
B) time slots
C) codes
D) None of the choices are correct.

16 In CDMA, we use different ___________ to achieve channelization.


A) frequency ranges
B) time slots
C) codes
D) None of the choices are correct

17 In TDMA, we use different ___________ to achieve channelization.


A) frequency ranges
B) time slots
C) codes
D) None of the choices are correct

18 Walsh tables are used in _________________.


A) FDMA
B) TDMA
C) CDMA
D) None of the choices are correct

CREATED BY SAHAR SALEM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy