Serial No.: King Saud University Faculty of Computer Science and Information Summer Semester 1432-1433 H, Quiz 2: Computer Networks (CEN 444 ) GRADE = Student Name: ________________________________Student ID#: ________________ …… 𝟓 Question One: Select the correct answer a, b, or c 1234567891011121314151617181920- Ethernet uses ………………………. Medium Access Control a) CSMA/CD b) (CSMA/CA + ACK) Ethernet uses ………………………. encoding Scheme a) Bipolar b) Manchester In Ethernet Frame Pad is Filled when data field < ........bytes a) 1500 b) 64 c) Token Passing Protocol c) Manchester Differential Ethernet Network uses …………………………………… for error checking a) CRC-16 b) CRC-32 c) 46 c) Parity bit Ethernet ................. Layer is responsible for Data encapsulation and Link Management a) LLC b) MAC c) Physical The ....................algorithm provides the time period after which the sender restart transmitting the same frame. a) CSMA b) BACKOFF c) ALOHA Ethernet Networks are based on ...................... Standards a) IEEE 802.11 b) IEEE 802.5 c) IEEE 802.3 ...................... network connecting devices in a closed loop with successive point-to-point links. a) Internet b) Ethernet c) Token Ring In Token Ring Networks, the next token generated will have a priority equal to the ................. priority a) current b) reserved c) lowest In Token Ring Networks, Receiving host accepts the frame and ............................. a) remove it and send ACK to Sender b) remove it and circulate idle Token c) continues to circulate it In Ethernet Frame, ……………. Field Synchronizes the receiver’s clock with the sender’s clock a) Frame Check Sequence b) Preamble c) Start-of-Frame Delimiter In Token Ring Networks ,...................watches for missing tokens and generates new ones after a timeout period. a)The Sender station b) The monitor station c) The receiver station Token Ring Networks uses ………………………. encoding Scheme a) Manchester Differential b) Manchester c) Bipolar If collision detected in Ethernet Network, ........................................................ a) jam then stop transmission b) jam then continue transmission c) retransmission In Token Ring Networks, If a host wants to send data of priority n, it may grab a token with................... a) priority value n or lower b) priority value greater than n c) maximum priority value Token Ring Network uses …………………………………… for error checking a) CRC-16 b) CRC-32 c) Parity bit Data Field in Ethernet Frame between 1 and .......................... bytes a) 46 b) 64 c) 1500 Backoff algorithm will allow a maximum of ............ retransmission attempts a) 10 b) 15 c) 20 Token Ring Networks are based on ...................... Standards a) IEEE 802.3 b) IEEE 802.5 c) IEEE 802.11 In Ethernet Network, If a collisions detected two times, What could be a waiting time before retransmission a) 2 Slot Time b) 4 Slot Time c) 6 Slot Time