A. Random, controlled, channelization
B. Controlled, channelization
C. Random, channelization
D. Random, controlled, contributed
Explanation: In random access control protocol, the medium can be shared randomly depending on the state of the medium. In controlled access, stations share the medium depending on authorization. Channelization allows the stations to share the bandwidth of the link.
A. No rules for accessing medium
B. Shared bandwidth
C. Authorized access for medium
D. Scheduling time for medium
Explanation: Random access protocol also called as contention methods have no rules or time for stations to place their frames on the medium. For this reason, stations compete among themselves for accessing the medium.
A. To prevent other stations
B. To avoid more collisions
C. To detect other collisions
D. To get acknowledgment from the receiver
Explanation: Collision includes two more stations, if those stations again re-transmit the frames at a time; it causes collision again. Back-off time is to avoid this collision by making the stations to wait for some random times.
A. Aborts the re-transmission after 5 attempts
B. A station is allowed to re-transmit for 2 times
C. Restriction on the attempts for re-transmission
D. Re-transmission has no restriction
Explanation: If a station re-transmits a frame more than the times, that is defined by the pure aloha, then pure aloha will abort the process re-transmission of the particular frame. The station needs to try after sometime later to send the frames.
A. 2*t
B. 3*t
C. 1/2*t
D. 5*t
Explanation: Vulnerable time is time in which, there is a possibility for a collision. T(frame) is the time taken by a frame to be sent to destination. Vulnerable time will be 2 times the fixed length of frames.
A. Polling
B. Reservation
C. Token passing
D. Scheduling
Explanation: Polling is the method for channel allocation where one station acts as a server and remaining stations acts according to the decision of master station. This master station also known as primary device, which uses two functions called poll function and select function to send and receive data within the network.
A. Random access protocol
B. Controlled access protocol
C. Channelization
D. Persistent method
Explanation: In controlled access protocols, stations send frames only if they get the authorization from the other stations to use the channel. This authorization can be obtained using methods such as reservation, polling, token passing.
A. 1 ? persistent
B. Non persistent
C. Persistent
D. 1 ? persistent and non-persistent
Explanation: Unlike 1- persistent in non-persistent methods, stations wait for some random time even if it finds the channel idle. This random time reduces the collision at the same time it reduces the efficiency because random times may keep the channel unused even the stations have frames to send.
A. T propagation
B. T frame
C. 2*t frame
D. 2*t propagation
Explanation: In carrier sense multiple access, the stations sense the medium whether it is idle or not. This information is sent by the station which is using the medium, using propagation of a signal. The propagation delay in the signal causes the collision.
A. True
B. False
C.
D.
Explanation: In slotted aloha, the time is divided into time slots, that are of T(frame) length. The stations are instructed to send the frames at the starting of the time slot. Still there is a chance for collision, if 2 frames are started at the same it. This is why vulnerable time is equal to the time taken by a frame to be sent to the destination.