Computer Networks Questions & Answers – Multiple Access Links and Protocols

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Multiple Access Links and Protocols”.

1. Which of the following are the types of basic protocols that are present in multiple access control in data link layer?
a) Random, controlled, channelization
b) Controlled, channelization
c) Random, channelization
d) Random, controlled, contributed
View Answer

Answer: a
Explanation: In random access control protocol, the medium can be shared randomly depending on the state of the medium. In controlled access, stations share the medium depending on authorization. Channelization allows the stations to share the bandwidth of the link.

2. Which aspect of the random-access protocols makes them contention methods?
a) No rules for accessing medium
b) Shared bandwidth
c) Authorized access for medium
d) Scheduling time for medium
View Answer

Answer: a
Explanation: Random access protocol also called as contention methods have no rules or time for stations to place their frames on the medium. For this reason, stations compete among themselves for accessing the medium.

3. Why station need to wait random amount of time for re-transmission of the frame after collision in pure aloha?
a) To prevent other stations
b) To avoid more collisions
c) To detect other collisions
d) To get acknowledgment from the receiver
View Answer

Answer: b
Explanation: Collision includes two more stations, if those stations again re-transmit the frames at a time; it causes collision again. Back-off time is to avoid this collision by making the stations to wait for some random times.
advertisement
advertisement

4. Which strategy is used by the pure aloha to prevent the congestion caused by continuous re-transmitted frames?
a) Aborts the re-transmission after 5 attempts
b) A station is allowed to re-transmit for 2 times
c) Restriction on the attempts for re-transmission
d) Re-transmission has no restriction
View Answer

Answer: c
Explanation: If a station re-transmits a frame more than the times, that is defined by the pure aloha, then pure aloha will abort the process re-transmission of the particular frame. The station needs to try after sometime later to send the frames.

5. What is the vulnerable time of the pure aloha for fixed length of frames (T=frame time)?
a) 2*T
b) 3*T
c) 1/2*T
d) 5*T
View Answer

Answer: a
Explanation: Vulnerable time is time in which, there is a possibility for a collision. T(frame) is the time taken by a frame to be sent to destination. Vulnerable time will be 2 times the fixed length of frames.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. Which of the following controlled access protocol is known as master slave method?
a) Polling
b) Reservation
c) Token passing
d) Scheduling
View Answer

Answer: a
Explanation: Polling is the method for channel allocation where one station acts as a server and remaining stations acts according to the decision of master station. This master station also known as primary device, which uses two functions called poll function and select function to send and receive data within the network.

7. Which of the following type of multiple access protocols uses a scheme called “Authorization from other stations”?
a) Random access protocol
b) Controlled access protocol
c) Channelization
d) Persistent method
View Answer

Answer: b
Explanation: In controlled access protocols, stations send frames only if they get the authorization from the other stations to use the channel. This authorization can be obtained using methods such as reservation, polling, token passing.
advertisement

8. Which of the following persistent method of random-access protocol reduces the collisions and efficiency of the network?
a) 1 – persistent
b) Non persistent
c) Persistent
d) 1 – persistent and non-persistent
View Answer

Answer: b
Explanation: Unlike 1- persistent in non-persistent methods, stations wait for some random time even if it finds the channel idle. This random time reduces the collision at the same time it reduces the efficiency because random times may keep the channel unused even the stations have frames to send.

9. What is the vulnerable time in carrier sense multiple access?
a) T propagation
b) T frame
c) 2*T frame
d) 2*T propagation
View Answer

Answer: a
Explanation: In carrier sense multiple access, the stations sense the medium whether it is idle or not. This information is sent by the station which is using the medium, using propagation of a signal. The propagation delay in the signal causes the collision.
advertisement

10. Slotted aloha has vulnerable time that is half of the vulnerable time of pure aloha.
a) True
b) False
View Answer

Answer: a
Explanation: In slotted aloha, the time is divided into time slots, that are of T(frame) length. The stations are instructed to send the frames at the starting of the time slot. Still there is a chance for collision, if 2 frames are started at the same it. This is why vulnerable time is equal to the time taken by a frame to be sent to the destination.

11. Which of the following is not a channelization protocol?
a) Frequency division multiple access
b) Time division multiple access
c) Code division multiple access
d) Bandwidth division multiple access
View Answer

Answer: d
Explanation: The channelization protocols use frequency, time and code to divide the bandwidth of the channel. Bandwidth is divided into frequency bands in FDMA, same bandwidth is used by the stations in TDMA.

12. What technique is used by the TDMA to accomplish synchronization?
a) Preamble bits
b) Synchronization bytes
c) Guard bits
d) Start points
View Answer

Answer: a
Explanation: Time division multiple access allocates the time slots for station to use the channel. These time slots are synchronized by preamble bits, which acts as guard time between two time slots.

Sanfoundry Global Education & Learning Series – Computer Networks.

To practice all areas of Computer Networks, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.