Networking Chapter 4 Exam With Complete Solutions
100% Verified
As part of the five-layer network model used in this textbook, the data link layer sits
directly between:
a. the physical and the application layers
b. the network and the application layers
c. the network and transport layers
d. the physical and the application layers
e. the physical and the network layers - ANSWER the physical and the network layers
Which of the following is true with respect to the data link layer?
a. It accepts streams of bits from the application layer.
b. It is responsible for encoding the bit-stream as a series of electronic voltages.
c. It performs error detection.
d. It performs routing functions.
e. It organizes data from the physical layer and passes these coherent messages
directly to the application layer. - ANSWER It performs error detection.
___________ is not a function of a data link protocol.
a. Media access control
b. Message delineation
c. Amplitude shift keying
d. Indicating when a message starts and stops
e. Error control - ANSWER Amplitude shift keying
, Media access control:
a. is not very important in point-to-point with full duplex configuration
b. is not very important in local area networks
c. is not very important in a point-to-point with a half duplex configuration
d. is not very important in a multipoint configuration
e. does not control when computers transmit - ANSWER is not very important in
point-to-point with full duplex configuration
Which of the following is not a controlled access method of media access control?
a. Token passing
b. CSMA/CD
c. polling
d. roll call polling
e. hub polling - ANSWER CSMA/CD
________ is the process of sending a signal to a client that gives its permission to
transmit or asks it to receive.
a. Contention
b. Polling
c. Pooling
d. Carrier sense
e. CRC - ANSWER Polling
Which of the above is true about roll call polling?
a. It can not be modified to increase priority of clients or terminals.
b. It does not require a server or host or special device that performs the polling.
c. It is also called token passing.
d. It is a type of contention approach to media access control.
100% Verified
As part of the five-layer network model used in this textbook, the data link layer sits
directly between:
a. the physical and the application layers
b. the network and the application layers
c. the network and transport layers
d. the physical and the application layers
e. the physical and the network layers - ANSWER the physical and the network layers
Which of the following is true with respect to the data link layer?
a. It accepts streams of bits from the application layer.
b. It is responsible for encoding the bit-stream as a series of electronic voltages.
c. It performs error detection.
d. It performs routing functions.
e. It organizes data from the physical layer and passes these coherent messages
directly to the application layer. - ANSWER It performs error detection.
___________ is not a function of a data link protocol.
a. Media access control
b. Message delineation
c. Amplitude shift keying
d. Indicating when a message starts and stops
e. Error control - ANSWER Amplitude shift keying
, Media access control:
a. is not very important in point-to-point with full duplex configuration
b. is not very important in local area networks
c. is not very important in a point-to-point with a half duplex configuration
d. is not very important in a multipoint configuration
e. does not control when computers transmit - ANSWER is not very important in
point-to-point with full duplex configuration
Which of the following is not a controlled access method of media access control?
a. Token passing
b. CSMA/CD
c. polling
d. roll call polling
e. hub polling - ANSWER CSMA/CD
________ is the process of sending a signal to a client that gives its permission to
transmit or asks it to receive.
a. Contention
b. Polling
c. Pooling
d. Carrier sense
e. CRC - ANSWER Polling
Which of the above is true about roll call polling?
a. It can not be modified to increase priority of clients or terminals.
b. It does not require a server or host or special device that performs the polling.
c. It is also called token passing.
d. It is a type of contention approach to media access control.