Quiz_2_2011_2012_cen444_summer

advertisement
Serial No.:
King Saud University
Faculty of Computer Science and Information
Summer Semester 1432-1433 H, Quiz 2: Computer Networks (CEN 444 )
GRADE =
Student Name: ________________________________Student ID#: ________________
……
𝟓
Question One: Select the correct answer a, b, or c
1234567891011121314151617181920-
Ethernet uses ………………………. Medium Access Control
a) CSMA/CD
b) (CSMA/CA + ACK)
Ethernet uses ………………………. encoding Scheme
a) Bipolar
b) Manchester
In Ethernet Frame Pad is Filled when data field < ........bytes
a) 1500
b) 64
c) Token Passing Protocol
c) Manchester Differential
Ethernet Network uses …………………………………… for error checking
a) CRC-16
b) CRC-32
c) 46
c) Parity bit
Ethernet ................. Layer is responsible for Data encapsulation and Link Management
a) LLC
b) MAC
c) Physical
The ....................algorithm provides the time period after which the sender restart transmitting the same frame.
a) CSMA
b) BACKOFF
c) ALOHA
Ethernet Networks are based on ...................... Standards
a) IEEE 802.11
b) IEEE 802.5
c) IEEE 802.3
...................... network connecting devices in a closed loop with successive point-to-point links.
a) Internet
b) Ethernet
c) Token Ring
In Token Ring Networks, the next token generated will have a priority equal to the ................. priority
a) current
b) reserved
c) lowest
In Token Ring Networks, Receiving host accepts the frame and .............................
a) remove it and send ACK to Sender
b) remove it and circulate idle Token
c) continues to circulate it
In Ethernet Frame, ……………. Field Synchronizes the receiver’s clock with the sender’s clock
a) Frame Check Sequence
b) Preamble
c) Start-of-Frame Delimiter
In Token Ring Networks ,...................watches for missing tokens and generates new ones after a timeout period.
a)The Sender station
b) The monitor station
c) The receiver station
Token Ring Networks uses ………………………. encoding Scheme
a) Manchester Differential
b) Manchester
c) Bipolar
If collision detected in Ethernet Network, ........................................................
a) jam then stop transmission
b) jam then continue transmission
c) retransmission
In Token Ring Networks, If a host wants to send data of priority n, it may grab a token with...................
a) priority value n or lower
b) priority value greater than n
c) maximum priority value
Token Ring Network uses …………………………………… for error checking
a) CRC-16
b) CRC-32
c) Parity bit
Data Field in Ethernet Frame between 1 and .......................... bytes
a) 46
b) 64
c) 1500
Backoff algorithm will allow a maximum of ............ retransmission attempts
a) 10
b) 15
c) 20
Token Ring Networks are based on ...................... Standards
a) IEEE 802.3
b) IEEE 802.5
c) IEEE 802.11
In Ethernet Network, If a collisions detected two times, What could be a waiting time before retransmission
a) 2 Slot Time
b) 4 Slot Time
c) 6 Slot Time
Download