Question
a.
the same as
b.
two times
c.
three times
d.
none of the above
Posted under Networking
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The vulnerable time for CSMA is the ________propagation time.
Similar Questions
Discover Related MCQs
Q. In the _________ method, after the station finds the line idle, it sends its frame immediately. If the line is not idle, it continuously senses the line until it finds it idle.
View solution
Q. In the ________method, a station that has a frame to send senses the line. If the line is idle, it sends immediately. If the line is not idle, it waits a random amount of time and then senses the line again.
View solution
Q. In the _______method, after the station finds the line idle it sends or refrain from sending based on the outcome of a random number generator. If the line is busy, it tries again.
View solution
Q. We have categorized access methods into _______ groups.
View solution
Q. In ___________ methods, no station is superior to another station and none is assigned the control over another.
View solution
Q. In ______, the chance of collision can be reduced if a station senses the medium before trying to use it.
View solution
Q. __________ augments the CSMA algorithm to detect collision.
View solution
Q. In ________, a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frame is sent again.
View solution
Q. To avoid collisions on wireless networks, ________was invented.
View solution
Q. In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments.
View solution
Q. In _______ methods, the stations consult one another to find which station has the right to send.
View solution
Q. In _______ methods, a station cannot send unless it has been authorized by other stations.
View solution
Q. There are ______ popular controlled-access methods.
View solution
Q. In the ________ method, a station needs to make a reservation before sending data. Time is divided into intervals.
View solution
Q. In the _____ method, time is divided into intervals. In each interval, a reservation frame precedes the data frames sent in that interval.
View solution
Q. In the ______ method, all data exchanges must be made through the primary device even when the ultimate destination is a secondary device.
View solution
Q. In the _______ method, the primary device controls the link; the secondary devices follow its instructions.
View solution
Q. In the _______ method, the stations in a network are organized in a logical ring.
View solution
Q. In the _______ method, each station has a predecessor and a successor.
View solution
Q. In the _________ method, a special packet called a ______ circulates through the ring.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Networking? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!