MCQs: Data Link Layer - Error Detection, DLC, and MAC
1. Which of the following is used for error detection?
a) Parity bit
b) Checksum
c) CRC
(Ans) d) All of the above
2. Block coding is used in:
a) Flow control
(Ans) b) Error detection and correction
c) Framing
d) Data compression
3. In CRC, the division is performed using:
a) Long division
b) Integer division
(Ans) c) Modulo-2 division
d) Floating point division
4. Which error detection method uses a generator polynomial?
a) Checksum
b) Parity check
(Ans) c) CRC
d) Hamming code
5. What is the main advantage of cyclic codes?
a) Simple arithmetic
(Ans) b) Easy hardware implementation
c) Works only with ASCII
d) Requires no redundancy
6. Which of the following is a framing method?
a) CRC
(Ans) b) Bit stuffing
c) Hamming Code
d) Acknowledgment
7. Flow control is needed to:
(Ans) a) Prevent buffer overflow at the receiver
b) Detect errors
c) Maintain framing
d) Encrypt data
8. ARQ is a mechanism for:
a) Framing
(Ans) b) Error control
c) Flow control
d) Data compression
9. Which of the following is a connection-oriented protocol?
a) PPP
(Ans) b) HDLC
c) UDP
d) IP
10. Which HDLC frame type is used to send actual data?
a) S-Frame
b) U-Frame
(Ans) c) I-Frame
d) A-Frame
11. What is the function of the supervisory (S) frame in HDLC?
(Ans) a) Provide control information
b) Carry user data
c) Send unnumbered commands
d) Encode messages
12. In character count framing, the first field contains:
a) Header
(Ans) b) Total number of characters in the frame
c) Destination address
d) Parity bit
13. Which MAC technique uses collision detection?
a) ALOHA
b) CSMA
(Ans) c) CSMA/CD
d) Token Ring
14. In pure ALOHA, maximum efficiency is:
a) 36.8%
(Ans) b) 18.4%
c) 50%
d) 100%
15. Controlled access techniques include:
a) CSMA
(Ans) b) Token passing
c) Pure ALOHA
d) Slotted ALOHA
16. Which of the following is a random access method?
a) Polling
b) Token passing
(Ans) c) CSMA/CA
d) Reservation
17. Which method requires a central controller?
a) ALOHA
(Ans) b) Polling
c) CSMA
d) Slotted ALOHA
18. In CSMA/CA, collision is avoided by:
a) Listening after transmission
b) Ignoring collisions
(Ans) c) Using backoff timers and acknowledgments
d) Using parity bits
19. Token Ring follows which type of MAC protocol?
a) Random access
(Ans) b) Controlled access
c) Contention-based
d) Time Division
20. Which MAC protocol is most suitable for wireless networks?
a) CSMA/CD
(Ans) b) CSMA/CA
c) Token passing
d) Polling