Vous êtes sur la page 1sur 4

ICCT COLLEGES FOUNDATION, INC.

SAN MATEO CAMPUS


Department of Computer Studies
Quiz1 in Data Communication
3rd Trimester/ S.Y. 2017-2018

NAME: ___________________________ SECTION: _________ RATING: _________


DATE: ___________ SCHEDULE: ________________

I. MULTIPLE CHOICE: Encircle the letter of the correct answer (Erasure means wrong)
1. Which one of the following is a data link protocol?
a) ethernet b) point to point protocol c) hdlc d) all of the mentioned
2. Which one of the following task is not done by data link layer?
a) framing b) error control c) flow control d) channel coding
3. Data link layer in IEEE standard is divided into two sub layers of
a) MAC and ACKs b) LAN and MAC c) LLC and NLC d) LLC and MAC
4. Two main functions of data link layer are
a) hardware link control and media access control
b) data link control and protocol access control
c) data link control and media access control
d) both a and c
5. The Data link layer is concerned with?
a) Delivery of Packets
b) Local delivery of frames between devices on the LAN segment
c) Internal delivery of segments
d) None of the above
6. Data transmitted in Data link layer is in
a) Packets b) Frames c) Segments d) Electromagnetic signals
7. It is the OSI-layer that provides a well-defined service interface to the network layer, determining
how the bits of the physical layer are grouped into frames.
a) Data Link b) Physical c) Network d) Session
8. Function of data link layer that when two or more devices are connected to the same link, data
link layer protocols are necessary to determine which device has control over the link at any
given time.
a) Framing b) Error Control c) Flow Control d) Access Control
9. It is where data link layer divides the stream of bits received from the network layer into
manageable data units.
a) Framing b) Error Control c) Flow Control d) Access Control
10. It is one of function of data link layer where it imposes a flow control mechanism to avoid
overwhelming the receiver.
a) Framing b) Error Control c) Flow Control d) Access Control
11. It is one of the function of data link layer where it adds reliability to the physical layer by adding
mechanisms to detect and retransmit damaged or lost frames.
a) Framing b) Error Control c) Flow Control d) Access Control
12. It is data that is transmitted between network points as a unit complete with addressing and
necessary protocol control information.
a) Frame b) packet c) Code d) error
13. Which of the following is the popular controlled-access method?
a) Reservation b) Polling c) Token Passing d) all of the above
14. It is used to allow a large number of mobile users to share the allocated spectrum in the most
efficient manner.
a) Media Access Control c) Logic Link Control
b) Multiple access techniques d) Random Access Control
15. It indicates the beginning and ending of the data to be sent.
a) Address b) flag c) FSC d) Header
II. MORSE TYPE: Write B if both statements are true, write S if both statements are false, write I if the
first statement is true and the second statement is false, and write T if the first statement is false and
the second statement is true. Write your answer in space provided in each number.
1. ___________
a. In controlled access, the stations consult one another to find which station has the right to
send. A station cannot send unless it has been authorized by other stations.
b. If a simultaneous data packet is being transmitted at the same time between a single
channel and connection an error correction may happen.
2. __________
a. The primary device controls the link; the secondary devices follow its instructions.
b. The select function is used whenever the primary device has something to send.
3. __________
a. Data link layer divides the stream of bits received from the network layer into manageable
data units called fragments.
b. Error control is normally achieved through a trailer added to the beginning of the frame.
4. __________
a. The data link layer imposes a flow control mechanism to avoid overwhelming the receiver.
b. Access Control transforms the physical layer, a raw transmission facility, to a reliable link.
5. __________
a. In Flow control, the stations consult one another to find which station has the right to send.
b. The select function is used whenever the primary device has something to send.
6. __________
a. Multi Access Control determines the order in which the token is being passed around
b. Logical Link Control is used to allow a large number of mobile users to share the allocated
spectrum in the most efficient manner.
7. __________
a. There are three popular controlled-access methods
b. Polling has two functions to let the secondary whether it is to send or receive data
8. __________
a. ALOHA means Atmosphere Location of Hazardous Area
b. MAC means Multi Access Control
9. __________
a. Polling works with topologies in which one device is designated as a primary station and the
other devices are secondary stations.
b. All data exchanges must be made through the primary device even when the ultimate
destination is a secondary device.
10. __________
a. All data exchanges must be made through the secondary device even when the ultimate
destination is a primary device.
b. The primary device, therefore, is always the initiator of a session.

III. IDENTIFICATION: Write the correct answer before the number in each statement. Choose the correct
answer in the box below.

1. Data packets breakdowns into fragments.


2. A controlled access method where the station needs to make a reservation before sending data.
3. It works with topologies in which one device is designated as a primary station and the other
devices are secondary stations.
4. It determines the order in which the token is being passed around
5. In this method, the stations in a network are organized in a logical ring.
6. It transforms the physical layer, a raw transmission facility, to a reliable link. It makes the
physical layer appear error-free to the upper layer (network layer).
7. It is used to allow a large number of mobile users to share the allocated spectrum in the most
efficient manner.
8. In this station no station is superior to another station and none is assigned the control over
another.
9. It is used whenever the primary device has something to send.
10. It is used by the primary device to solicit transmissions from the secondary devices.

POLL FUNCTION SELECT NAK ACK


DATA LINK LAYER FRAMING ERROR CONTROL
FLOW CONTROL MULTI-ACCESS TECHNIQUE RANDOM ACCESS
CONTROL
DATA COLLISION RESERVATION POLLING
TOKEN PASSING

IV. Enumeration:

1-3 three popular controlled-access methods

4-8 Functions of data link layer

9-10 2 functions of polling

11-12 Sub layer of Data Link Layer

13-15 Part of framing


Answer Key

1. D
2. D
3. D
4. C
5. B
6. B
7. A
8. D
9. A
10. C
11. C
12. A
13. D
14. B
15. B

1. I
2. B
3. I
4. I
5. T
6. S
7. B
8. S
9. B
10. I

1. Data collision
2. Reservation
3. Polling
4. Logical ring
5. Token passing
6. Data link layer
7. Multi access technique
8. Random access control
9. Select
10. Poll function

Vous aimerez peut-être aussi