Unit 3 - Practice Quiz

CSE306 50 Questions
0 Correct 0 Wrong 50 Left
0/50

1 Which of the following is the primary responsibility of the Data Link Layer?

A. End-to-end delivery of packets
B. Routing of packets
C. Process-to-process delivery
D. Node-to-node delivery of frames

2 In the context of framing, what is the purpose of Bit Stuffing?

A. To pad the frame to a minimum length
B. To increase the data transfer rate
C. To detect errors in the frame
D. To distinguish frame delimiters from data by adding extra bits

3 Which sublayer of the Data Link Layer is responsible for controlling access to the shared transmission medium?

A. Logical Link Control (LLC)
B. Physical Layer Control (PLC)
C. Network Control Protocol (NCP)
D. Media Access Control (MAC)

4 In a Stop-and-Wait ARQ system, if is the propagation delay and is the transmission time, what is the link utilization efficiency?

A.
B. where
C. where
D. where

5 What is the Hamming distance between the codewords 10101 and 11110?

A. 5
B. 4
C. 2
D. 3

6 To correct errors in a data stream, the minimum Hamming distance required in the coding scheme is:

A.
B.
C.
D.

7 In Cyclic Redundancy Check (CRC), if the generator polynomial is , what is the divisor in binary form?

A. 1011
B. 1001
C. 1110
D. 1101

8 When using a checksum for error detection, the sender calculates the sum of data segments using:

A. Floating point arithmetic
B. 1's complement arithmetic
C. Modulo-2 arithmetic
D. 2's complement arithmetic

9 Which of the following best describes Piggybacking?

A. Sending multiple frames at once
B. Attaching an acknowledgment to a data frame going in the reverse direction
C. Retransmitting a frame immediately after a timeout
D. Using a token to control access

10 In the Go-Back-N ARQ protocol, if bits are used for the sequence number, the sender window size must satisfy:

A.
B.
C.
D.

11 In Selective Repeat ARQ, if the sequence number space is size , what is the maximum size of the sender window?

A.
B.
C.
D.

12 What is the standard length of a MAC address?

A. 32 bits
B. 64 bits
C. 128 bits
D. 48 bits

13 A Layer 2 Switch makes forwarding decisions based on:

A. Source MAC address
B. Destination MAC address
C. Destination IP address
D. Source IP address

14 Which of the following is the Broadcast MAC address?

A. 127.0.0.1
B. AA:BB:CC:DD:EE:FF
C. FF:FF:FF:FF:FF:FF
D. 00:00:00:00:00:00

15 In Pure ALOHA, the vulnerable time (the time interval during which a collision can occur) is:

A. Indeterminate
B.
C. (Frame transmission time)
D.

16 What is the maximum theoretical efficiency (throughput) of Pure ALOHA?

A. 18.4%
B. 36.8%
C. 50%
D. 100%

17 What is the maximum theoretical efficiency of Slotted ALOHA?

A. 18.4%
B. 36.8%
C. 50%
D. 80%

18 In CSMA/CD, what does the station do immediately after detecting a collision?

A. It stops transmitting and waits for a random time
B. It switches to Slotted ALOHA mode
C. It continues transmitting to ensure all nodes detect the collision (Jamming Signal)
D. It drops the packet permanently

19 Which CSMA persistence method transmits immediately if the channel is idle, but transmits with probability ?

A. 0-persistent
B. Non-persistent
C. 1-persistent
D. p-persistent

20 The Binary Exponential Backoff algorithm is used in Ethernet to:

A. Assign IP addresses
B. Determine the window size for flow control
C. Calculate the CRC
D. Determine the waiting time after a collision

21 For CSMA/CD to work correctly, the minimum frame size must be:

A.
B. Equal to the header size
C.
D.

22 Why is CSMA/CD not typically used in Wireless LANs (802.11)?

A. Wireless signals travel faster
B. Wireless has no bandwidth limit
C. CSMA/CD is too fast for wireless
D. The Hidden Station problem makes collision detection difficult

23 Which protocol is used in Wireless LANs instead of CSMA/CD?

A. Slotted ALOHA
B. Token Ring
C. CSMA/CA (Collision Avoidance)
D. Pure ALOHA

24 Which of the following is a Controlled Access protocol?

A. CSMA/CD
B. Token Passing
C. Ethernet
D. ALOHA

25 In the Token Ring topology, what happens when a station holds the token?

A. It must forward the token immediately
B. It enters sleep mode
C. It can transmit data frames
D. It listens for collisions

26 The IEEE standard for Ethernet is:

A. 802.5
B. 802.15
C. 802.11
D. 802.3

27 What line coding scheme is used in Standard Ethernet (10BaseT)?

A. Manchester Encoding
B. AMI
C. Differential Manchester
D. NRZ-L

28 An Ethernet frame begins with a Preamble. What is its pattern?

A. Sequence of flag bytes
B. Alternating 1s and 0s
C. All 0s
D. All 1s

29 Which field in the Ethernet frame follows the Preamble and signals the beginning of the frame?

A. Source MAC
B. CRC
C. SFD (Start Frame Delimiter)
D. Length

30 What is the minimum frame length of a standard Ethernet frame?

A. 128 bytes
B. 32 bytes
C. 64 bytes
D. 46 bytes

31 If the data payload in an Ethernet frame is less than 46 bytes, what happens?

A. The CRC is omitted
B. The frame is sent as a 'runt' frame
C. The frame is discarded
D. Padding is added to make it 46 bytes

32 The CRC in an Ethernet frame is located in the:

A. Header
B. Type field
C. Frame Check Sequence (FCS) field at the end
D. Preamble

33 In 100Base-TX Ethernet, the '100' stands for:

A. 100 meters maximum length
B. 100 Mbps transmission speed
C. 100 nodes maximum
D. 100 MHz frequency

34 Which component splits a collision domain into multiple smaller collision domains?

A. Hub
B. Switch
C. Repeater
D. Cable

35 What is p-persistent CSMA?

A. Station transmits immediately if idle
B. Station transmits with probability if idle, waits with probability
C. Station never transmits
D. Station transmits with probability 1 if idle

36 Which Hamming code parity configuration (Even/Odd) ensures that the total number of 1s in the code is even?

A. Odd Parity
B. Zero Parity
C. CRC Parity
D. Even Parity

37 Calculate the Hamming code redundancy bits () required for a 7-bit data word (). (Using )

A. 2
B. 3
C. 4
D. 5

38 What is a Burst Error?

A. A single bit flip
B. Error caused by router congestion
C. Two or more bits in the data unit have changed
D. Error in the header only

39 The divisor in a CRC generator is always:

A. One bit more than the degree of the generator polynomial
B. One bit less than the generator polynomial degree
C. The same size as the data
D. Always 16 bits

40 In a switch, the Address Learning process involves:

A. Manually typing IP addresses
B. Sending a broadcast to ask for names
C. Reading the source MAC of incoming frames and mapping it to the port
D. Reading the destination MAC and storing it in the table

41 Which mechanism is used for Flow Control in the Data Link Layer?

A. Manchester Encoding
B. Hamming Code
C. CRC
D. Sliding Window Protocol

42 What is the result of in Modulo-2 arithmetic?

A. 1111
B. 0101
C. 0011
D. 0100

43 In Polling (Controlled Access), who controls the link access?

A. The station with the highest IP
B. The station with the token
C. The Primary Station
D. Any station

44 Gigabit Ethernet (1000Base-T) supports a data rate of:

A. 10 Gbps
B. 100 Mbps
C. 10 Mbps
D. 1000 Mbps

45 What is the purpose of the Inter-Frame Gap in Ethernet?

A. To increase the data rate
B. To stuff bits
C. To allow the receiver to process the previous frame and prepare for the next
D. To detect collisions

46 Which of the following is NOT a Random Access Protocol?

A. CSMA/CA
B. ALOHA
C. CSMA/CD
D. Reservation

47 In Byte Stuffing, if the flag byte appears in the data, what is inserted before it?

A. A parity bit
B. A zero bit
C. Another flag byte
D. An Escape (ESC) byte

48 The Maximum Transmission Unit (MTU) for standard Ethernet is typically:

A. 1500 bytes
B. 64 bytes
C. 1518 bytes
D. 4096 bytes

49 In 2D Parity check, errors can be detected:

A. Only if there is a single bit error
B. In both rows and columns
C. Only in rows
D. Only in columns

50 What happens if a switch receives a frame with a destination MAC address that is not in its forwarding table?

A. It sends an ARP request
B. It sends it back to the sender
C. It floods the frame out of all ports except the receiving one
D. It drops the frame