The _____sublayer is responsible for the operation of the CSMA/CD access method and framing.
A)
LLC
B)
MII
C)
MAC
D)
none of the above

1 Answer

Answer :

MAC

Related questions

Description : In IEEE 802.11, the access method used in the DCF sublayer is _________. A) ALOHA B) CSMA/CA C) CSMA/CD D) none of the above

Last Answer : CSMA/CA

Description : The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet. A) 1-persistent B) p-persistent C) non-persistent D) none of the above

Last Answer : 1-persistent

Description : In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called a. Preamble b. Postamble c. Jam d. None of the above

Last Answer : c. Jam

Description : Which of the following is the multiple access protocol for channel access control? a. CSMA/CD b. CSMA/CA c. Both CSMA/CD & CSMA/CA d. HDLC

Last Answer : c. Both CSMA/CD & CSMA/CA

Description : Which of the following is the multiple access protocol for channel access control? A. CSMA/CD B. CSMA/CA C. Both CSMA/CD & CSMA/CA D. HDLC

Last Answer : C. Both CSMA/CD & CSMA/CA

Description : The two sublayers of a Data Link layer are a. LLC Logical Link Control Layer b. MAC Medium Access Control Layer c. Both A and B d. Data Layer

Last Answer : c. Both A and B

Description : In_______, collisions are avoidedthrough theuse of three strategies: the interframe space, the contention window,and acknowledgments. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CA

Description : Toavoid collisions on wireless networks, ________was invented. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CA

Description : In ________,a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frameis sentagain. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)

Last Answer : CSMA/CD

Description : __________ augments the CSMA algorithm todetect collision. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b

Last Answer : CSMA/CD

Description : The minimum frame size required for a CSMA/CD based computer network running at 1 Gbps on a 200m cable with a link speed of 2 × 108m/s is a. 125 bytes b. 250 bytes c. 500 bytes d. None of these

Last Answer : b. 250 bytes

Description : Which of the following statements is TRUE about CSMA/CD a. IEEE 802.11 wireless LAN runs CSMA/CD protocol b. Ethernet is not based on CSMA/CD protocol c. CSMA/CD is not suitable for a high propagation delay network like satellite network d. There is no contention in a CSMA/CD network

Last Answer : CSMA/CD is not suitable for a high propagation delay

Description : Consider a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits per second) over a 1 km (kilometre) cable with no repeaters. If the minimum frame size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable? a. 8000 b. 10000 c. 16000 d. 20000

Last Answer : d. 20000

Description : In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. A. CSMA/CA B. CSMA/CD C. either (a) or (b) D. both (a) and (b)

Last Answer : A. CSMA/CA

Description : Explain CSMA/CD and CSMA/CA.

Last Answer : CSMA- resolving the media contention. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Listen for Data Transmission on Cable (Carrier Sense) When Medium is free a) Transmit ... time, and transmit again. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Nov/Dec

Description : What is CSMA/CD?

Last Answer : Carrier Sense Multiple Access with Collision Detection (CSMA/CD) When a station has a frame to transmit: 1) Listen for Data Transmission on Cable (Carrier Sense) 2) When Medium is Quiet (no ... for Collision. b) If collision is heard, stop transmitting, wait random time, and transmit again.

Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.

Last Answer : Aux Port

Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above

Last Answer : LLC

Description : _____defines a protocol data unit (PDU) that is somewhat similar to that of HDLC. A) MAC B) LLC C) LLU D) none of the above

Last Answer : LLC

Description : The _______ layer of Ethernet consistsof the LLC sublayer and the MAC sublayer. A) data link B) physical C) network D) none of the above

Last Answer : data link

Description : Explain the terms topology and access methods used in LANs. Discuss the CSMA/CD and CSMA/CA protocols.

Last Answer : (i) LAN topologies: Network topology is a physical schematic which shows interconnection of the many users. There are four basic topologies as under:  (a) Direct Connection or one to all ... it is free, the station transmits, and waits for an acknowledgment signal that the packet was received

Description : The RTS and CTS frames in CSMA/CA ____ solvethe hidden stationproblem. The RTS and CTS frames in CSMA/CA ____ solve the exposed station problem. A) can; cannot B) cannot; can C) can; can D) cannot; cannot

Last Answer : can; cannot

Description : ________ requires that each station first listento the medium before sending. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : In ______, the chanceof collisioncan be reduced if a station senses the medium beforetrying touse it. A) MA B) CSMA C) FDMA D) CDMA

Last Answer : CSMA

Description : The vulnerable timefor CSMA is the ________propagationtime. A) the sameas B) two times C) three times D) none of the above

Last Answer : the sameas

Description : What is CSMA/CA?

Last Answer : ∙ CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.11 networks. ∙ CSMA/CA acts to prevent collisions before they happen. ∙ In CSMA/CA, as soon as a node receives a packet that is to be sent, it checks to be sure the channel is clear.

Description : In Bluetooth, theL2CAP sublayer, is roughly equivalent to the LLC sublayer inLANs. A) radio B) baseband C) L2CAP D) none of the above

Last Answer : L2CAP

Description : _______ inthe data link layer separates a message from one source toa destination, or from other messages going from other sources to other destinations. A) Digitizing B) Controlling C) Framing D) none of the above

Last Answer : Framing

Description : A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is a. 0111110100 b. 0111110101 c. 0111111101 d. 0111111111

Last Answer : b. 0111110101

Description : The types of data services offered by an LLC (Logical Link Control) layer are a. Connectionless which is fast and unreliable b. Connection Oriented which is slow and reliable c. Both A and B d. None

Last Answer : c. Both A and B

Description : The functions of a Logical Link Layer (LLC) are a. Error control b. Flow control c. Creating and managing the communication link between two devices with the help of the Transport layer. d. All the above

Last Answer : d. All the above

Description : In _______ framing, there is no need for defining the boundaries of frames. A. fixed-size B. variable-size C. standard D. none of the above

Last Answer : A. fixed-size

Description : The functions of a Logical Link Layer (LLC) are ___. A. Error control B. Flow control C. Creating and managing the communication link between two devices with the help of the Transport layer. D. All the above

Last Answer : D. All the above

Description : Transmission system for a multidrop network A. Taken passing B. Polling C. Switching D. CSMA/CD

Last Answer : B. Polling

Description : Ethernet is baseband system using CSMA/CD operating at A. 20 Mbps B. 10 Mbps C. 30 Mbps D. 40 Mbps

Last Answer : B. 10 Mbps

Description : The reason a CSMA/CD network has a minimum length for packets is:

Last Answer : to make sure all other nodes hear a collision in progress

Description : LAN? a) CDMA b) CSMA/CA c) ALOHA d) CSMA/CD

Last Answer : b) CSMA/CA

Description : Which IEEE standard is developed for CSMA/CD a. IEEE 802.1 b. IEEE 802.2 c. IEEE 802.3 d. IEEE 802.4

Last Answer : c. IEEE 802.3

Description : How do I update my Streetpass Mii Plaza exchange booth-mine won't update!!

Last Answer : maybe its time to give up that supid game and go outside get a life come back when you have a real answer

Description : Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a. ALOHA b. CSMA/CA c. CDMA d. none of the mentioned

Last Answer : b. CSMA/CA

Description : Marketers can enhance the consumer's ability to access knowledge structures by 1. Using loud music 2. Using colorful ads 3. Employing verbal framing 4. Repeating brand information 5. None of these

Last Answer : Employing verbal framing

Description : i. Secretary is an elected representative of the shareholders. ii. Secretary is responsible for the decisionmaking and framing policies of a company.

Last Answer : Correct the underlined word and rewrite the following sentence: i. Secretary is an elected ... the decisionmaking and framing policies of a company.

Description : What is MAC ? A computer made by Apple Memory address corruption Mediocre Apple Computer Media Access Control

Last Answer : Media Access Control

Description : Which is the part of Data Link Layer: a. LLC b. MAC c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : Mac question: Best steps for manually erasing user data if I don't have access to an install CD?

Last Answer : So far I’ve manually Secure-deleted the following: all my user docs, my keychains, and anything in application support that would have stored sensitive info (like my Firefox data and Mail directory). What else should I delete?

Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction

Last Answer : Memory protection

Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method

Last Answer : Random access memory

Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above

Last Answer : TDD-TDMA

Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above

Last Answer : polling

Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above

Last Answer : Channelization