Multiple Access Links Protocols — Test 1
Page 1 of 2
Question 1
Which of the following are the types of basic protocols that are present in multiple access control in data link layer?
0
System Administrator 2026
Question 2
Which aspect of the random-access protocols makes them contention methods?
0
System Administrator 2026
Question 3
Why station need to wait random amount of time for re-transmission of the frame after collision in pure aloha?
0
System Administrator 2026
Question 4
Which strategy is used by the pure aloha to prevent the congestion caused by continuous re-transmitted frames?
0
System Administrator 2026
Question 5
What is the vulnerable time of the pure aloha for fixed length of frames (T=frame time)?
0
System Administrator 2026
Question 6
Which of the following controlled access protocol is known as master slave method?
0
System Administrator 2026
Question 7
Which of the following type of multiple access protocols uses a scheme called “Authorization from other stations”?
0
System Administrator 2026
Question 8
Which of the following persistent method of random-access protocol reduces the collisions and efficiency of the network?
0
System Administrator 2026
Question 9
What is the vulnerable time in carrier sense multiple access?
0
System Administrator 2026
Question 10
Slotted aloha has vulnerable time that is half of the vulnerable time of pure aloha.
0
System Administrator 2026