Redes - Test Libro - Chapter 12

Ingeniería informatica Redes Tema 12

Pregunta 1

1 In the _______ random-access method collision is avoided.


Pregunta 2

2 In the 1-persistent approach, when a station finds an idle line, it _______.


Pregunta 3

3 _______ requires one primary station and one or more secondary stations.


Pregunta 4

4 In the p-persistent approach, when a station finds an idle line, it _______.


Pregunta 5

5 The 1-persistent approach can be considered a special case of the p-persistent approach with p equal to _______.


Pregunta 6

6 In the reservation access method, if there are 10 stations on a network, then there are _______ reservation minislots in the reservation frame.


Pregunta 7

7 _______ is a controlled-access protocol.


Pregunta 8

8 _______ is (are) a channelization protocol.


Pregunta 9

9 In the _______ random-access method, stations do not sense the medium.


Pregunta 10

10 Which of the following is an example of a random-access protocol?


Pregunta 11

11 Which of the following is an example of a controlled-access protocol?


Pregunta 12

12 The vulnerable time for a pure ALOHA is __________ the one for slotted ALOHA.


Pregunta 13

13 The vulnerable time for CSMA is ___________.


Pregunta 14

14 We need RTS and CTS packets in ____________ protocol.


Pregunta 15

15 In FDMA, we use different ___________ to achieve channelization.


Pregunta 16

16 In CDMA, we use different ___________ to achieve channelization.


Pregunta 17

17 In TDMA, we use different ___________ to achieve channelization.


Pregunta 18

18 Walsh tables are used in _________________.


Revisar Respuestas

Tómese unos minutos en revisar sus respuestas antes de hacerlas definitivas.