System Administrator 2026
Which of the following are the types of basic protocols that are present in multiple access control in data link layer?
  • A. Random, controlled, channelization
  • B. Controlled, channelization
  • C. Random, channelization
  • D. Random, controlled, contributed
Which aspect of the random-access protocols makes them contention methods?
  • A. No rules for accessing medium
  • B. Shared bandwidth
  • C. Authorized access for medium
  • D. Scheduling time for medium
Why station need to wait random amount of time for re-transmission of the frame after collision in pure aloha?
  • A. To prevent other stations
  • B. To avoid more collisions
  • C. To detect other collisions
  • D. To get acknowledgment from the receiver
Which strategy is used by the pure aloha to prevent the congestion caused by continuous re-transmitted frames?
  • A. Aborts the re-transmission after 5 attempts
  • B. A station is allowed to re-transmit for 2 times
  • C. Restriction on the attempts for re-transmission
  • D. Re-transmission has no restriction
Which of the following controlled access protocol is known as master slave method?
  • A. Polling
  • B. Reservation
  • C. Token passing
  • D. Scheduling
Which of the following type of multiple access protocols uses a scheme called “Authorization from other stations”?
  • A. Random access protocol
  • B. Controlled access protocol
  • C. Channelization
  • D. Persistent method
Which of the following persistent method of random-access protocol reduces the collisions and efficiency of the network?
  • A. 1 €? persistent
  • B. Non persistent
  • C. Persistent
  • D. 1 €? persistent and non-persistent
What is the vulnerable time in carrier sense multiple access?
  • A. T propagation
  • B. T frame
  • C. 2*t frame
  • D. 2*t propagation