0% found this document useful (0 votes)
7K views12 pages

CH 12 Multiple Access Multiple Choice Questions and Answers MCQ PDF - Data Communication and Networking

This document contains multiple choice questions about data communication and networking topics such as point-to-point protocol, link control protocol, password authentication protocol, challenge handshake authentication protocol, network control protocol, and internetwork protocol control protocol. The questions are compiled from books by Behrouz A. Forouzan and cover topics like ALOHA, CSMA, FDMA, TDMA, and CDMA. The document provides the questions, answers, and an explanation of key concepts tested in the questions.

Uploaded by

hemanth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7K views12 pages

CH 12 Multiple Access Multiple Choice Questions and Answers MCQ PDF - Data Communication and Networking

This document contains multiple choice questions about data communication and networking topics such as point-to-point protocol, link control protocol, password authentication protocol, challenge handshake authentication protocol, network control protocol, and internetwork protocol control protocol. The questions are compiled from books by Behrouz A. Forouzan and cover topics like ALOHA, CSMA, FDMA, TDMA, and CDMA. The document provides the questions, answers, and an explanation of key concepts tested in the questions.

Uploaded by

hemanth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Downloaded from www.examradar.

com

All the Multiple Choice Question and Answer (MCQs) have been
compiled from the books of Data Communication and Networking
by the well known author behrouz A forouzan.

This Data Communication and Networking – Multiple Access


multiple choice (MCQ) based Questions and Answers PDF cover
the below lists of topic.

1. Point-to-Point Protocol (PPP) Multiple Choice Question and


Answer.
2. Link Control Protocol (LCP) Multiple Choice Question and
Answer.
3. Password Authentication Protocol (PAP) Multiple Choice
Question and Answer.
4. Challenge Handshake Authentication Protocol (CHAP)
Multiple Choice Question and Answer.
5. Network Control Protocol (NCP) Multiple Choice Question
and Answer.
6. Internetwork Protocol Control Protocol (IPCP) Multiple
Choice Question and Answer.

Practice now to sharpen your concept.

1. In ________ each station sends a frame whenever it has a


frame to send.
A. pure ALOHA
B. slotted ALOHA
C. both (a) and (b)
D. neither (a) nor (b)

2. In pure ALOHA, the vulnerable time is ______ the frame


transmission time.
Downloaded from www.examradar.com

A. the same as
B. two times
C. three times
D. none of the above

3. The maximum throughput for pure ALOHA is ________ per


cent.
A. 12.2
B. 18.4
C. 36.8
D. none of the above

4. In __________, each station is forced to send only at the


beginning of the time slot
A. pure ALOHA
B. slotted ALOHA
C. both (a) and (b)
D. neither (a) nor (b)

5. In slotted ALOHA, the vulnerable time is ______ the frame


transmission time.
A. the same as
B. two times
C. three times
D. none of the above

6. The maximum throughput for pure ALOHA is ________ per


cent.
A. 12.2
B. 18.4
C. 36.8
Downloaded from www.examradar.com

D. none of the above

7. The vulnerable time for CSMA is the ________propagation


time.
A. the same as
B. two times
C. three times
D. none of the above

8. In the _________ method, after the station finds the line


idle, it sends its frame immediately. If the line is not idle, it
continuously senses the line until it finds it idle.
A. nonpersistent
B. 1-persistent
C. p-persistent
D. none of the above

9. In the ________method, a station that has a frame to send


senses the line. If the line is idle, it sends immediately. If the
line is not idle, it waits a random amount of time and then
senses the line again.
A. nonpersistent
B. 1-persistent
C. p-persistent
D. none of the above

10. In the _______method, after the station finds the line idle
it sends or refrain from sending based on the outcome of a
random number generator. If the line is busy, it tries again
A. nonpersistent
B. 1-persistent
Downloaded from www.examradar.com

C. p-persistent
D. none of the above

Answer key for MCQ SET- 1


Q-1 Correct Answer :pure ALOHA
Q-2 Correct Answer :two times
Q-3 Correct Answer :18.4
Q-4 Correct Answer :slotted ALOHA
Q-5 Correct Answer :the same as
Q-6 Correct Answer :36.8
Q-7 Correct Answer :the same as
Q-8 Correct Answer :1-persistent
Q-9 Correct Answer :nonpersistent
Q-10 Correct Answer :p-persistent

Multiple Access MCQ Set-2

1. We have categorized access methods into _______


groups.
A. two
B. three
C. four
D. five

2. In ___________ methods, no station is superior to another


station and none is assigned the control over another
A. random access
B. controlled access
Downloaded from www.examradar.com

C. channelization
D. none of the above

3. In ______, the chance of collision can be reduced if a


station senses the medium before trying to use it.
A. MA
B. CSMA
C. FDMA
D. CDMA

4. _______ requires that each station first listen to the


medium before sending.
A. MA
B. CSMA
C. FDMA
D. CDMA

5. __________ augments the CSMA algorithm to detect


collision
A. CSMA/CA
B. CSMA/CD
C. either (a) or (b)
D. both (a) and (b)

6. in ________, a station monitors the medium after it sends a


frame to see if the transmission was successful. If so, the
station is finished. If, however, there is a collision, the frame
is sent again
A. CSMA/CA
B. CSMA/CD
C. either (a) or (b)
Downloaded from www.examradar.com

D. both (a) and (b)

7. To avoid collisions on wireless networks, ________was


invented.
A. CSMA/CA
B. CSMA/CD
C. either (a) or (b)
D. both (a) and (b)

8. In _______, collisions are avoided through the use of three


strategies: the interframe space, the contention window, and
acknowledgments.
A. CSMA/CA
B. CSMA/CD
C. either (a) or (b)
D. both (a) and (b)

9. In _______ methods, the stations consult one another to


find which station has the right to send
A. random access
B. controlled access
C. channelization
D. none of the above

10. In _______ methods, a station cannot send unless it has


been authorized by other stations.
A. random access
B. controlled access
C. channelization
D. none of the above
Downloaded from www.examradar.com

Answer key for MCQ SET- 2


Q-1 Correct Answer :three
Q-2 Correct Answer :random access
Q-3 Correct Answer :CSMA
Q-4 Correct Answer :CSMA
Q-5 Correct Answer :CSMA/CD
Q-6 Correct Answer :CSMA/CD
Q-7 Correct Answer :CSMA/CA
Q-8 Correct Answer :CSMA/CA
Q-9 Correct Answer :controlled access
Q-10 Correct Answer :controlled access

Multiple Access MCQ Set-3

1. We discussed ______ popular controlled-access methods


A. two
B. three
C. four
D. none of the above

2. In the ________ method, a station needs to make a


reservation before sending data. Time is divided into
intervals.
A. reservation
B. polling
C. token passing
D. none of the above
Downloaded from www.examradar.com

3. In the _____ method, time is divided into intervals. In each


interval, a reservation frame precedes the data frames sent in
that interval.
A. reservation
B. polling
C. token passing
D. none of the above

4. In the ______ method, all data exchanges must be made


through the primary device even when the ultimate
destination is a secondary device.
A. reservation
B. polling
C. token passing
D. none of the above

5. In the _______ method, the primary device controls the


link; the secondary devices follow its instructions.
A. reservation
B. polling
C. token passing
D. none of the above

6. In the _______ method, the stations in a network are


organized in a logical ring.
A. reservation
B. polling
C. token passing
D. none of the above
Downloaded from www.examradar.com

7. In the _______ method, each station has a predecessor


and a successor
A. reservation
B. polling
C. token passing
D. none of the above

8. In the _________ method, a special packet called a ______


circulates through the ring.
A. reservation: control frame
B. polling: poll request
C. token passing: token
D. none of the above

9. _______ is a multiple-access method in which the available


bandwidth of a link is shared in time, frequency, or through
code, between different stations
A. Random access
B. Controlled access
C. Channelization
D. none of the above

10. We discussed ________ channelization protocols


A. two
B. three
C. four
D. none of the above

Answer key for MCQ SET- 3


Q-1 Correct Answer :three
Downloaded from www.examradar.com

Q-2 Correct Answer :reservation


Q-3 Correct Answer :reservation
Q-4 Correct Answer :polling
Q-5 Correct Answer :polling
Q-6 Correct Answer :token passing
Q-7 Correct Answer :token passing
Q-8 Correct Answer :token passing: token
Q-9 Correct Answer :Channelization
Q-10 Correct Answer :three

Multiple Access MCQ Set-4

1. In ________, the available bandwidth is divided into


frequency bands.
A. FDMA
B. TDMA
C. CDMA
D. none of the above

2. In ______, each station is allocated a band to send its data.


In other words, each band is reserved for a specific station,
and it belongs to the station all the time.
A. FDMA
B. TDMA
C. CDMA
D. none of the above

3. In _______, the stations share the bandwidth of the


channel in time.
Downloaded from www.examradar.com

A. FDMA
B. TDMA
C. CDMA
D. none of the above

4. In _____, each station is allocated a time slot during which


it can send data. Each station transmits its data in its
assigned time slot.
A. FDMA
B. TDMA
C. CDMA
D. none of the above

5. In _____, each station transmits its data in its assigned


time slot
A. FDMA
B. TDMA
C. CDMA
D. none of the above

6. In ______, the stations use different codes to achieve


multiple access.
A. FDMA
B. TDMA
C. CDMA
D. none of the above

7. _______ is based on coding theory and uses sequences of


numbers called chips
A. FDMA
B. TDMA
Downloaded from www.examradar.com

C. CDMA
D. none of the above

8. In _______, the sequences are generated using orthogonal


codes such the Walsh tables
A. FDMA
B. TDMA
C. CDMA
D. none of the above

Answer key for MCQ SET- 4


Q-1 Correct Answer :FDMA
Q-2 Correct Answer :FDMA
Q-3 Correct Answer :TDMA
Q-4 Correct Answer :TDMA
Q-5 Correct Answer :TDMA
Q-6 Correct Answer :CDMA
Q-7 Correct Answer :CDMA
Q-8 Correct Answer :CDMA
Q-9
Q-10

You might also like