Description : In IEEE 802.11, the access method used in the DCF sublayer is _________. A) ALOHA B) CSMA/CA C) CSMA/CD D) none of the above
Last Answer : CSMA/CA
Description : The IEEE 802.3 Standard defines _________ CSMA/CD as the access method for first-generation 10-Mbps Ethernet. A) 1-persistent B) p-persistent C) non-persistent D) none of the above
Last Answer : 1-persistent
Description : In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called a. Preamble b. Postamble c. Jam d. None of the above
Last Answer : c. Jam
Description : Which of the following is the multiple access protocol for channel access control? a. CSMA/CD b. CSMA/CA c. Both CSMA/CD & CSMA/CA d. HDLC
Last Answer : c. Both CSMA/CD & CSMA/CA
Description : Which of the following is the multiple access protocol for channel access control? A. CSMA/CD B. CSMA/CA C. Both CSMA/CD & CSMA/CA D. HDLC
Last Answer : C. Both CSMA/CD & CSMA/CA
Description : The two sublayers of a Data Link layer are a. LLC Logical Link Control Layer b. MAC Medium Access Control Layer c. Both A and B d. Data Layer
Last Answer : c. Both A and B
Description : In_______, collisions are avoidedthrough theuse of three strategies: the interframe space, the contention window,and acknowledgments. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)
Description : Toavoid collisions on wireless networks, ________was invented. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)
Description : In ________,a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frameis sentagain. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)
Last Answer : CSMA/CD
Description : __________ augments the CSMA algorithm todetect collision. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b
Description : The minimum frame size required for a CSMA/CD based computer network running at 1 Gbps on a 200m cable with a link speed of 2 × 108m/s is a. 125 bytes b. 250 bytes c. 500 bytes d. None of these
Last Answer : b. 250 bytes
Description : Which of the following statements is TRUE about CSMA/CD a. IEEE 802.11 wireless LAN runs CSMA/CD protocol b. Ethernet is not based on CSMA/CD protocol c. CSMA/CD is not suitable for a high propagation delay network like satellite network d. There is no contention in a CSMA/CD network
Last Answer : CSMA/CD is not suitable for a high propagation delay
Description : Consider a CSMA/CD network that transmits data at a rate of 100 Mbps (108 bits per second) over a 1 km (kilometre) cable with no repeaters. If the minimum frame size required for this network is 1250 bytes, what is the signal speed (km/sec) in the cable? a. 8000 b. 10000 c. 16000 d. 20000
Last Answer : d. 20000
Description : In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. A. CSMA/CA B. CSMA/CD C. either (a) or (b) D. both (a) and (b)
Last Answer : A. CSMA/CA
Description : Explain CSMA/CD and CSMA/CA.
Last Answer : CSMA- resolving the media contention. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Listen for Data Transmission on Cable (Carrier Sense) When Medium is free a) Transmit ... time, and transmit again. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Nov/Dec
Description : What is CSMA/CD?
Last Answer : Carrier Sense Multiple Access with Collision Detection (CSMA/CD) When a station has a frame to transmit: 1) Listen for Data Transmission on Cable (Carrier Sense) 2) When Medium is Quiet (no ... for Collision. b) If collision is heard, stop transmitting, wait random time, and transmit again.
Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.
Last Answer : Aux Port
Description : The purpose of the _______is to provide flow and error control for the upper-layer protocols that actually demand theseservices A) MAC B) LLC C) LLU D) none of the above
Last Answer : LLC
Description : _____defines a protocol data unit (PDU) that is somewhat similar to that of HDLC. A) MAC B) LLC C) LLU D) none of the above
Description : The _______ layer of Ethernet consistsof the LLC sublayer and the MAC sublayer. A) data link B) physical C) network D) none of the above
Last Answer : data link
Description : Explain the terms topology and access methods used in LANs. Discuss the CSMA/CD and CSMA/CA protocols.
Last Answer : (i) LAN topologies: Network topology is a physical schematic which shows interconnection of the many users. There are four basic topologies as under: (a) Direct Connection or one to all ... it is free, the station transmits, and waits for an acknowledgment signal that the packet was received
Description : The RTS and CTS frames in CSMA/CA ____ solvethe hidden stationproblem. The RTS and CTS frames in CSMA/CA ____ solve the exposed station problem. A) can; cannot B) cannot; can C) can; can D) cannot; cannot
Last Answer : can; cannot
Description : ________ requires that each station first listento the medium before sending. A) MA B) CSMA C) FDMA D) CDMA
Last Answer : CSMA
Description : In ______, the chanceof collisioncan be reduced if a station senses the medium beforetrying touse it. A) MA B) CSMA C) FDMA D) CDMA
Description : The vulnerable timefor CSMA is the ________propagationtime. A) the sameas B) two times C) three times D) none of the above
Last Answer : the sameas
Description : What is CSMA/CA?
Last Answer : ∙ CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is a protocol for carrier transmission in 802.11 networks. ∙ CSMA/CA acts to prevent collisions before they happen. ∙ In CSMA/CA, as soon as a node receives a packet that is to be sent, it checks to be sure the channel is clear.
Description : In Bluetooth, theL2CAP sublayer, is roughly equivalent to the LLC sublayer inLANs. A) radio B) baseband C) L2CAP D) none of the above
Last Answer : L2CAP
Description : _______ inthe data link layer separates a message from one source toa destination, or from other messages going from other sources to other destinations. A) Digitizing B) Controlling C) Framing D) none of the above
Last Answer : Framing
Description : A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is a. 0111110100 b. 0111110101 c. 0111111101 d. 0111111111
Last Answer : b. 0111110101
Description : The types of data services offered by an LLC (Logical Link Control) layer are a. Connectionless which is fast and unreliable b. Connection Oriented which is slow and reliable c. Both A and B d. None
Description : The functions of a Logical Link Layer (LLC) are a. Error control b. Flow control c. Creating and managing the communication link between two devices with the help of the Transport layer. d. All the above
Last Answer : d. All the above
Description : In _______ framing, there is no need for defining the boundaries of frames. A. fixed-size B. variable-size C. standard D. none of the above
Last Answer : A. fixed-size
Description : The functions of a Logical Link Layer (LLC) are ___. A. Error control B. Flow control C. Creating and managing the communication link between two devices with the help of the Transport layer. D. All the above
Last Answer : D. All the above
Description : Transmission system for a multidrop network A. Taken passing B. Polling C. Switching D. CSMA/CD
Last Answer : B. Polling
Description : Ethernet is baseband system using CSMA/CD operating at A. 20 Mbps B. 10 Mbps C. 30 Mbps D. 40 Mbps
Last Answer : B. 10 Mbps
Description : The reason a CSMA/CD network has a minimum length for packets is:
Last Answer : to make sure all other nodes hear a collision in progress
Description : LAN? a) CDMA b) CSMA/CA c) ALOHA d) CSMA/CD
Last Answer : b) CSMA/CA
Description : Which IEEE standard is developed for CSMA/CD a. IEEE 802.1 b. IEEE 802.2 c. IEEE 802.3 d. IEEE 802.4
Last Answer : c. IEEE 802.3
Description : How do I update my Streetpass Mii Plaza exchange booth-mine won't update!!
Last Answer : maybe its time to give up that supid game and go outside get a life come back when you have a real answer
Description : Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a. ALOHA b. CSMA/CA c. CDMA d. none of the mentioned
Last Answer : b. CSMA/CA
Description : Marketers can enhance the consumer's ability to access knowledge structures by 1. Using loud music 2. Using colorful ads 3. Employing verbal framing 4. Repeating brand information 5. None of these
Last Answer : Employing verbal framing
Description : i. Secretary is an elected representative of the shareholders. ii. Secretary is responsible for the decisionmaking and framing policies of a company.
Last Answer : Correct the underlined word and rewrite the following sentence: i. Secretary is an elected ... the decisionmaking and framing policies of a company.
Description : What is MAC ? A computer made by Apple Memory address corruption Mediocre Apple Computer Media Access Control
Last Answer : Media Access Control
Description : Which is the part of Data Link Layer: a. LLC b. MAC c. Both a and b d. None of these
Last Answer : c. Both a and b
Description : Mac question: Best steps for manually erasing user data if I don't have access to an install CD?
Last Answer : So far I’ve manually Secure-deleted the following: all my user docs, my keychains, and anything in application support that would have stored sensitive info (like my Firefox data and Mail directory). What else should I delete?
Description : Any method for controlling access to or use of memory is known a. Memory map b. Memory protection c. Memory management d. Memory instruction
Last Answer : Memory protection
Description : Which of the following is a way to access secondary memory? a. Random access memory b. Action method c. Transfer method d. Density method
Last Answer : Random access memory
Description : The access method in Bluetooth is________. A) FDMA B) TDD-TDMA C) CDMA D) none of the above
Last Answer : TDD-TDMA
Description : In IEEE 802.11, the access method used in the PCF sublayer is ______. A) contention B) controlled C) polling D) none of the above
Last Answer : polling
Description : ________is a multiple-access method in which the available bandwidthof a link is shared in time, frequency, or through code, between different stations. A) Random access B) Controlledaccess C) Channelization D) none of the above
Last Answer : Channelization