Anda di halaman 1dari 5

A Complete Chapter Quiz

Multiple Access

Compilation of all the quizzes (MCQs) for each and every chapters in the book of Data
Communications and Networking 4th Edition by Behrouz A. Forouzan.

1|P age
MCQs in Multiple Access
www.PinoyBIX.com
1.In _______, the stations share the B) nonpersistent
bandwidth of the channel in time. C) 1-persistent
A) FDMA D) none of the above
B) CDMA 7. In the _____ method, time is divided
C) TDMA into intervals. In each interval, a
D) none of the above reservation frame precedes the data
2. In ______, the chance of collision can frames sent in that interval.
be reduced if a station senses the A) token passing
medium before trying to use it. B) reservation
A) CSMA C) polling
B) MA D) none of the above
C) CDMA 8. In the _______ method, each station
D) FDMA has a predecessor and a successor.
3. In the _______ method, the stations in A) token passing
a network are organized in a logical ring. B) polling
A) polling C) reservation
B) token passing D) none of the above
C) reservation 9. The vulnerable time for CSMA is the
D) none of the above ________propagation time.
4. In _______, the sequences are A) three times
generated using orthogonal codes such B) two times
the Walsh tables. C) the same as
A) TDMA D) none of the above
B) CDMA 10. In the _________ method, a special
C) FDMA packet called a ______ circulates
D) none of the above through the ring.
5. __________ augments the CSMA A) polling: poll request
algorithm to detect collision. B) token passing: token
A) CSMA/CD C) reservation: control frame
B) CSMA/CA D) none of the above
C) either (a) or (b) 11. The maximum throughput for pure
D) both (a) and (b) ALOHA is ________ per cent.
6. In the _________ method, after the A) 36.8
station finds the line idle, it sends its B) 18.4
frame immediately. If the line is not idle, C) 12.2
it continuously senses the line until it D) none of the above
finds it idle. 12. In ________, the available bandwidth
A) p-persistent is divided into frequency bands.

2|P age
MCQs in Multiple Access
www.PinoyBIX.com
A) TDMA D) none of the above
B) CDMA 17. To avoid collisions on wireless
C) FDMA networks, ________was invented.
D) none of the above A) CSMA/CD
13. In ___________ methods, no station B) CSMA/CA
is superior to another station and none is C) either (a) or (b)
assigned the control over another. D) both (a) and (b)
A) controlled access 18. In _____, each station is allocated a
B) random access time slot during which it can send data.
C) channelization Each station transmits its data in its
D) none of the above assigned time slot.
14. In the ________method, a station A) TDMA
that has a frame to send senses the line. B) CDMA
If the line is idle, it sends immediately. If C) FDMA
the line is not idle, it waits a random D) none of the above
amount of time and then senses the line 19. In the _______ method, the primary
again. device controls the link; the secondary
A) 1-persistent devices follow its instructions.
B) nonpersistent A) token passing
C) p-persistent B) reservation
D) none of the above C) polling
15. In ______, each station is allocated a D) none of the above
band to send its data. In other words, 20. In _____, each station transmits its
each band is reserved for a specific data in its assigned time slot.
station, and it belongs to the station all A) TDMA
the time. B) CDMA
A) CDMA C) FDMA
B) FDMA D) none of the above
C) TDMA 21. We discussed ________
D) none of the above channelization protocols.
16. In the _______method, after the A) four
station finds the line idle it sends or B) three
refrain from sending based on the C) two
outcome of a random number generator. D) none of the above
If the line is busy, it tries again. 22. In the ______ method, all data
A) p-persistent exchanges must be made through the
B) nonpersistent primary device even when the ultimate
C) 1-persistent destination is a secondary device.

3|P age
MCQs in Multiple Access
www.PinoyBIX.com
A) polling interframe space, the contention window,
B) token passing and acknowledgments.
C) reservation A) CSMA/CD
D) none of the above B) CSMA/CA
23. We discussed ______ popular C) either (a) or (b)
controlled-access methods. D) both (a) and (b)
A) four 29. In the ________ method, a station
B) three needs to make a reservation before
C) two sending data. Time is divided into
D) none of the above intervals.
24. In __________, each station is forced A) token passing
to send only at the beginning of the time B) polling
slot. C) reservation
A) pure ALOHA D) none of the above
B) slotted ALOHA 30. In pure ALOHA, the vulnerable time
C) both (a) and (b) is ______ the frame transmission time.
D) neither (a) nor (b) A) two times
25. In _______ methods, the stations B) three times
consult one another to find which station C) the same as
has the right to send. D) none of the above
A) channelization 31. The maximum throughput for slotted
B) random access ALOHA is ________ per cent.
C) controlled access A) 36.8
D) none of the above B) 18.4
26. In ________ each station sends a C) 12.2
frame whenever it has a frame to send. D) none of the above
A) slotted ALOHA 32. _________ is a multiple-access
B) pure ALOHA method in which the available bandwidth
C) both (a) and (b) of a link is shared in time, frequency, or
D) neither (a) nor (b) through code, between different stations.
27. In ______, the stations use different A) Controlled access
codes to achieve multiple access. B) Channelization
A) CDMA C) Random access
B) TDMA D) none of the above
C) FDMA 33. ________ requires that each station
D) none of the above first listen to the medium before sending.
28. In _______, collisions are avoided A) FDMA
through the use of three strategies: the B) CDMA

4|P age
MCQs in Multiple Access
www.PinoyBIX.com
C) MA
D) CSMA
34. We have categorized access
methods into _______ groups.
A) five
B) three
C) four
D) two
35. In _______ methods, a station cannot
send unless it has been authorized by
other stations.
A) controlled access
B) channelization
C) random access
D) none of the above
36. In slotted ALOHA, the vulnerable time
is ______ the frame transmission time.
A) two times
B) three times
C) the same as
D) none of the above
37. In ________, a station monitors the
medium after it sends a frame to see if
the transmission was successful. If so,
the station is finished. If, however, there
is a collision, the frame is sent again.
A) CSMA/CD
B) CSMA/CA
C) either (a) or (b)
D) both (a) and (b)
38. _______ is based on coding theory
and uses sequences of numbers called
chips.
A) TDMA
B) CDMA
C) FDMA
D) none of the above

5|P age
MCQs in Multiple Access
www.PinoyBIX.com

Anda mungkin juga menyukai