0% found this document useful (0 votes)
457 views4 pages

cs601 Quiz 2

Transmission Control Protocol (TCP) is a transport layer protocol. Multiple access protocols are needed when nodes use multi-point or broadcast links. Ethernet implementations include 10Base-F using fiber-optic cable, 10Base-2 using thin coaxial cable, and 10Base-T using twisted pair cable. Fast Ethernet has a data rate of 100 Mbps.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
457 views4 pages

cs601 Quiz 2

Transmission Control Protocol (TCP) is a transport layer protocol. Multiple access protocols are needed when nodes use multi-point or broadcast links. Ethernet implementations include 10Base-F using fiber-optic cable, 10Base-2 using thin coaxial cable, and 10Base-T using twisted pair cable. Fast Ethernet has a data rate of 100 Mbps.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Transmission control protocol is a…transport………..

layer protocol
In MAC when nodes use multi-point or broadcast link we need a multiple access
protocol
…10Base-F.…….. uses fiber-optic cable
In…FDMA……….each band is reserved for specific station and it belongs to the
station all the time
In pure ALOHA the vulnareble time is …2 times……the frame transmission time
In slotted ALOHA the vulnareble time is …same as…the frame transmission time
….10Base2….uses thin coaxial cable and 10Base5 thick coaxial
…twisted pair cable.…….was used as the medium in 10Base-T
POTS stands for……plain old telephone service…
A personal computer or a workstation on Ethernet network must have…NIC…..card
Fast Ethernet has a data rate of …100…….Mbps
 Standard ethernet 10Mbps
 Gigabit ethernet 1Gbps
 10 Gigabit ethernet 10Gbps
DSL stands for …digital subscriber line…
In the context of ethernet implementation maximum medium length of 10Base-F
was ……2000……….meters
 10base5 500m
 10base2 185m
 10base-T 100m
for CSMA/CD we need a restriction on the frame size
Not a channelization protocol TDMA,FDMA,CDMA,CSMA
When we represent data in CDMA,if station idle then it sends 0
....gigabit ethernet.......transmission technology (based on ethernet) provides a data
rate of 1 billion bits per second
....ALOHA......random access method was initially designed for radio(wireless)LAN
but it can be used on any shared medium now
1persistent method method has the highest chance of collision because two or more
stations may find the line idle and send their frames immediately.
TDMA in each station is allocated a time slot during which it can send data
We have catagorized access methods into……3…..catagories
In…random access…method no station is superior to another and none is assigned
the control over another
In…CSMA…………chance of collison can be reduced
…CSMA.……reuires that the station first listen to medium before sending
…CSMA/CD.……….arguments the CSMA algo to detect collision
in…CSMA/CD…………. station monitors medium after it sends a frame to see if
transmission was successful.
To avoid collisions on wireless networks…CSMA/CA……was invented
In __CSMA/CA_____, collisions are avoided through the use of three strategies: the
interframe space, the contention window, and acknowledgments
In …controlled access………….method,station consult one another
In……controlled access………method station cannot send unless it has been
authorized by other stations
….…3……popular controlled access methods
In the…reservation……………method a station needs to make a reservation before
sending data
In……reservation………..method time is divided into interval .in each interval
reservation frame precedes the data frame
In……polling……………method all data exchanges must be made through primary
device
In……polling……method primary device controls the link,and secondary device
follow its instructions
In the…token passing……….method the stations in network are organized in logical
ring
In…token passing………method each station has predecessor and successor
In…token passing……..method special packet called……token……circulates
through ring
….channelization…………is multiple access method in which available bandwidth of
link is shared in time, frequency, or through code, between different stations.
There are……3……….channelization protocols(time,frequency,code)
In…FDMA………..available bandwidth divided into frequency bands
In…TDMA………..the stations share bandwidth in time
In……pure ALOHA……………each station sends a frame whenever it has frame to
send
In……CDMA……………station use different codes to achieve multiple access
….…CDMA……………is based on coding theory and uses sequences of number
called chips
Maximum throughput for pure ALOHA is……18.4…….percent
Maximum throughput for slotted ALOHA is……36.8…….percent
In……CDMA……………sequences are generated using orthogonal codes such as
Walsh tables
In……slotted ALOHA…..each station is forced to send only at beginning of time
slot
The vulnerable time for CSMA is the __the same as______propagation time.
In the ___p-persistent____method, after the station finds the line idle it sends or
refrain from sending based on the outcome of a random number generator. If the
line is busy, it tries again.
In the __non persistent______method, a station that has a frame to send senses the
line. If the line is idle, it sends immediately. If the line is not idle, it waits a random
amount of time and then senses the line again.
A persistence strategy defines the procedure to follow when a station senses an
occupied medium
Reservation, polling, and token passing are controlled-access methods
FDMA, TDMA, and CDMA are channelization methods.
In the token-passing access method, a station that has control of a frame called a
token can send data.
In CDMA, the bandwidth is not divided into bands, yet data from all inputs are
transmitted simultaneously.
If an Ethernet destination address is 07:01:02:03:04:05, then this is a
__multicast____ address.
If an Ethernet destination address is 08:07:06:05:44:33, then this is a __unicast____
address.
Which of the following could not be an Ethernet unicast destination?
43:7B:6C:DE:10:00
44:AA:C1:23:45:32
46:56:21:1A:DE:F4
48:32:21:21:4D:34
Which of the following could not be an Ethernet multicast destination?
7C:56:21:1A:DE:F4
_ethernet______ is the most widely used local area network protocol.
The IEEE 802.3 Standard defines _1-persistent________ CSMA/CD as the access
method for first-generation 10-Mbps Ethernet.
The __data link_____ layer of Ethernet consists of the LLC sublayer and the MAC
sublayer.
The __MAC___ sublayer is responsible for the operation of the CSMA/CD access
method and framing
Each station on an Ethernet network has a unique __48-bit_____ address
imprinted on its network interface card (NIC).
The minimum frame length for 10-Mbps Ethernet is ___64___bytes.
The maximum frame length for 10-Mbps Ethernet is _1518_______ bytes.
__10Base-T_______ uses four twisted-pair cables that connect each station to a
common hub.
__10Base-F______ uses fiber-optic cable.
Fast Ethernet has a data rate of ___100_____Mbps.
In __fast ethernet_______, autonegotiation allows two devices to negotiate the mode
or data rate of operation.
__100Base-TX________ uses two pairs of twisted-pair cable.
___100Base-FX______ uses two fiber-optic cables.
__100Base-T4_______ uses four pairs of voice-grade, or higher, twisted-pair
cable.
Gigabit Ethernet has a data rate of ___1000_____Mbps.
Gigabit Ethernet access methods include __half and full duplex_____ mode
__1000Base-SX________ uses two optical fibers and a short-wave laser source,
__100Base-LX_______uses two optical fibers and a long-wave laser source.
__1000Base-T________ uses four twisted pairs.
__10GBase-S______ uses short-wave 850-nm multimode fiber.
__10GBase-L_____uses long-wave 1310-nm single mode fiber.
__10GBase-E______ uses 1550-mm single mode fiber.
In Ethernet addressing, if the least significant bit of the first byte is 0, the address is
_unicast________
In Ethernet addressing, if the least significant bit of the first byte is 1, the address is
___multicast______
In Ethernet addressing, if all the bits are 1s, the address is __broadcast______
Standard Ethernet (10-Mbps) uses _manchester______ encoding
100Base-FX uses _4B/5B________ block coding and __NRZ-I______ line coding.
100Base-TX uses __4B/5B_______ block coding and ___MLT-3_____ line coding.
1000Base-SX, 1000Base-LX, and 1000Base-CX use __8B/10B_______ block
coding and ___NRZ_____ line coding.
1000Base-T uses ___4D-PAM5_____ line coding
100Base-T4 uses ___8B6T_____ line coding.
A bridge can raise the bandwidth and separate the collision domains on an
Ethernet LAN.
A switch allows each station on an Ethernet LAN to have the entire capacity of the
network to itself.
Full-duplex mode doubles the capacity of each domain and deletes the need for the
CSMA/CD method.
Possession of TOKEN gives the station right to…send the data……………..
in random access method when two or more than two nodes transmit frame at the
same time then none
Collision in CSMA/CA are avoided through……the interframe space, the
contention window, and acknowledgments……………..
The type of ALOHA which improves efficiency of pure ALOHA slotted ALOHA
Random-access protocol ALOHA
In CSMA/CA …contention window……………is amount of time divided into slots
….IP/UDP……………is/are unreliable protocols
normally the value of the kmax in pure aloha is _15___.
the original ethernet technology with the data rate of 10Mbps is called standard
ethernet
Main drawback of ALOHA random access method potential collision
MAC stands for media access control
In context of ethernet adresses the source address is always a unicast
In ethernet the source address field in the MAC frame is the……previous station
physical………….address
Destination next physical address
SONET stands for synchronous optical network
In telephone network POP stands for……point of presence……
In Carrier Sense Multiple Access (CSMA), if the station senses the medium before
trying to use it then the chance of collision can be reduced
Code Division Multiple Access (CDMA) differs from Time Division Multiple
Access (TDMA) because there is no time sharing
In Carrier Sense Multiple Access (CSMA), the possibility of collision still exist
because of propagation delay
The protocol that is used to transmit data without any schedule time is random
access
Carrier Sense Multiple Access (CSMA) is based on the medium called sense before
transmit
In Carrier Sense Multiple Access/Collision Detection (CSMA/CD), the sending
station must Detect collision
The Carrier Sense Multiple Access (CSMA) method was developed to increase the
performance
If the maximum propagation time in Carrier Sense Multiple Access/Collision
Detection is 25.6 64bytes
A collision of the frames could be the result when a station sends a frame and at the
same time any other station tries to send a frame

You might also like