Unit 2 - MCQ
Unit 2 - MCQ
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) bit rate
ii) baud rate
Page 1/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(c) Compare TCP/IP and OSI reference model (any two points). 2M
Page 2/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(d) Name the layer of the OSI model at which the mechanical, electrical , functional and 2M
procedural characteristics are defined. State its function.
Ans: Physical layer of the OSI model at which the mechanical, electrical , functional and Name of
procedural characteristics are defined. layer
1m
Functions of the physical layer are
Any two
1. It defines the physical characteristics and functions of the physical devices and function
interfaces so that transmission can occur. 1M
2. It defines the procedure of encoding of the bits.
3. It states the data transmission rate and the duration of a bit.
4. It defines the topology.
5. It also states the direction of transmission.
Page 3/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
The primary function of IPv6 is to allow for more unique TCP/IP address identifiers to
be created, now that we’ve run out of the 4.3 billion created with IPv4. This is one of the
main reasons why IPv6 is such an important innovation for the Internet of Things (IoT).
Internet-connected products are becoming increasingly popular, and while IPv4
addresses couldn’t meet the demand for IoT products, IPv6 gives IoT products a
platform to operate on for a very long time.
Page 4/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
N. Scheme
a) Draw the block diagram of data communication system and state the function of each 4M
block.
Ans: 1.5M
for
block
diagram
and 1/2
M for
each
Block diagram of data communication system
function
Function of each block.
Page 5/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) Cost
ii) Performance
iii) Backup
iv) Security
Page 6/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
d) Describe hamming code error correction technique with the help of example. 4M
Page 7/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page 8/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page 9/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) State the names of the layers that perform the following functions – 4M
i) Data Encryption
ii) File transfer
iii) Error Correction
iv) Data Encoding
Page 10/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1. Flag Field (1 Byte): The flag field identifies the boundaries of PPP frame i.e. each
frame begins and ends with flag field. This field is 1 byte in length.
2. Address Field (1 Byte): This field contains a value indicating that the packet is
addressed to all recipients. Address field indicates the address of destination. Address
field is 1 byte (8 bits).
When the address field contains all 1’s i.e. 11111111, this indicates that all stations are to
accept the frames (broadcast).
3.Control Field (1 Byte): PPP normally runs in connectionless mode therefore control
field is set to 11000000. This indicates unnumbered frames i.e. frame does not contain
sequence numbers and there is no flow or error control.
4. Protocol Field (2 Bytes): Protocol field defines the information of data field. The
protocol field is 1 or 2 byte long.
5. Data Field: The data field contains the actual data to transmit, plus padding if
necessary. The length of this field is variable.
6. Frame Check Sequence (FCS): The FCS field is 24 byte long and contains CRC code.
It checks length of all fields in frame.
Page 11/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) Switch
ii) Router
Ans: 4M for
correct
diagram
i) Address
ii) Packet Size
Page 12/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
iii) Configuration
iv) IP Security
OR OR
OR OR
Page 13/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(a) State the need of multiplexing and switching. Summarize the situations for the 4M
implementations of TDM, FDM, Circuit Switched Network & Packet Switched Network.
Page 14/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
connectivity as and when required. Once a connection has been made, information can
be sent and received
(1/2M)
TDM is implemented in
each for
Satellite Communication system.
any one
Cellular Radio.
implent
Public Switched Telephone Network or PSTN system.
ation/ap
digital audio mixing system.
plicatio
Pulse Code Modulation (PCM) transmission system. n of
FDM is implemented in TDM,F
Television and Radio Broadcasting. DM,
Satellite Communication system. Circuit
First generation cellular systems switchin
Analog telephone systems g,
Circuit switching is implemented in Packet
Analog telephone network switchin
Optical mesh network g
Public Switched Telephone Network (PSTN)
Any
ISDN is a circuit switched telephone network
other
Packet switching is implemented in
valid
Internet and most local area networks.
applicat
Ethernet and frame relay
ion
Newer mobile phone technologies (e.g., GSM, LTE)
should
Wide Area Network (WAN) protocols be
consider
ed
(b) Explain a one bit sliding window protocol under normal condition and with damaged 4M
Page 15/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: 1. One bit sliding window protocol is used for delivery of data frames.
2. The sender and receiver’s windows size is 1. (2m)
3. One bit sliding window protocol uses Stop and Wait concept.
Diagra
4. Its bidirectional protocol. (full duplex communication)
m
OR
Page 16/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(1M)
Normal Operation : In normal operation the sender sends a frame and waits for Normal
acknowledgement from receiver .The acknowledgement should be received operatio
before the timer for the frame expires. The sequence
of n number
acknowledgement should match the sequence number of next frame to be
transmitted .If it matches the next frame is transmitted otherwise previous frame
is transmitted (1M)
Damaged frame : .When the receiver receives a damaged frame it discards it Damage
which means the frame is lost .The receiver remains silent about the lost frame d frame
.After the timer expires for that frame the sender retransmits the same frame .
(c) Draw structural diagram of fiber optic cable and write its functions. 4M
Page 17/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans:
2M
diagram
(2M)
explaina
tion
Core − The core is innermost part of fibre optic cable . It is made up of glass or
plastic
Function : The core has a higher refractive index w.r.t cladding. This ensures that
light is confined within the core and propagates by total internal reflection.
Page 18/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Function :
1) It prevents light rays from outside to enter the optical fiber.
2) prevents the fibers from physical damage.
3) It adds strength to the fiber.
i) UDP
ii) IP
iii) FTP
iv) SCTP
Page 19/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans:
2M for
Diagra
m
Page 20/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Datagrams can contain the full destination address rather than using some
number.
There is no set up phase required for the datagram circuits. This means that no
resources are consumed.
If any fault or loss occurs on a communication line, the datagrams circuits are
capable of compensating for it.
i) Bus topology
ii) Ring topology
In networking, a topology that allows all network nodes to receive the same message 1M
through the network cable at the same time is called as bus topology. Diagra
m of
In this type of network topology, all the nodes of a network are connected to a common
Bus
transmission medium having two endpoints.
topology
All the data that travels over the network is transmitted through a common
Page 21/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
transmission medium known as the bus or the backbone of the network. and 2M
explanat
Working of Bus Topology:
ion
Fig. shows bus topology. The central cable is the backbone of the network and is known
as Bus (thus the name). Every workstation or node communicates with the other device
through this Bus.
A signal from the source is broadcasted and it travels to all workstations connected to
bus cable. Although the message is broadcasted but only the intended recipient, whose
MAC address or IP address matches, accepts it.
If the MAC/IP address of machine does not match with the intended address, machine
discards the signal. A terminator is added at ends of the central cable, to prevent
bouncing of signals. A barrel connector can be used to extend it.
II.Ring Topology:
Ring topology is a network topology that is set-up in circular fashion. The data and the
signals that pass over the network travel in a single direction. It is called ring topology
because it forms a ring as each computer is connected to another computer, with the last
one connected to the first. Exactly two neighbors for each device.
Each node in this topology contains repeater. A signal passes node to node, until it
reaches its destination. If a node receives a signal intended for another node its repeater
Page 22/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Token is a special three byte frame that travels around the ring network. It can flow
clockwise or anticlockwise. Ring topology is a point to point network.
A number of repeaters are used for Ring topology with large number of nodes, because
if someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to
prevent data loss repeaters are used in the network.
Fig. shows a ring topology. The token travels along the ring until it reaches its
destination. Once, token reaches destination, receiving computer acknowledges receipt
with a return message to the sender. The sender then releases the token for the token for
use by another computer.
1M
Diagra
m of
Ring
topology
and 2M
explanat
ion
Page 23/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b) Draw layered architecture of the OSI model. State the functions of various layers. 6M
Page 24/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
error free from one node to another, over the physical layer.
this layer.
Page 25/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3. It receives messages from the Session layer above it, convert the
network requirements.
Transport layer breaks the message (data) into small units so that they
ends of the messages are not cut prematurely and data loss is
avoided.
Page 26/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1. Presentation Layer takes care that the data is sent in such a way
that the receiver will understand the information (data) and will
translator.
etc.
Ans: Electromagnetic waves having frequencies between 1 and 300 GHz are called 3M for
diagram
Page 27/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
• Electromagnetic radiation beyond the frequency range of radio and television can be
used to transport information. Microwave transmission is usually point-to-point using
directional antennae with a clear path between transmitter and receiver.
Fig. shows typical example of microwave link using dish antenna and satellite.
• A parabolic dish antenna can be used to focus the transmitted power into a narrow
beam to give a high signal to noise ratio, and before the advent of optical fiber, some
long distance telephone transmission systems were heavily dependent on the use of a
series of microwave towers.
Because microwaves travel in a straight line, the curvature of the earth limits the
maximum distance over which microwave towers can transmit, so repeaters are needed
to compensate for this limitation.
Page 28/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Typically the line of sight due to the Earth's curvature is only 50 km to the horizon.
Repeater stations must be placed so the data signal can hop, skip and jump across the
country.
Advantages of Microwave:
2. They can carry high quantities of information due to their high operating frequencies.
Page 29/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Disadvantages of Microwave:
There are two types of microwave data communication systems namely, Terrestrial
Microwave Transmission and Satellite Microwave Transmission.
• Terrestrial microwave systems typically use directional parabolic antennas to send and
receive signals in the lower gigahertz (GHz) range.
• The signals are highly focused and the physical path must be line-of-sight. Relay
towers are used to extend signals. Terrestrial microwave systems are typically used
when using cabling is costprohibitive.
Advantages:
Page 30/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Disadvantages:
1. Attenuation.
• In satellite microwave, the signals are transmitted from a ground station to a satellite
and then after amplifying, from the satellite to some other ground station.
Page 31/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
No. N. Scheme
a) Draw and explain architecture for network using tree topology for an office in 3 – Storey 6M
building.
Ans:
3M
diagram
Page 32/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
In this method after sending the data, the sender stops and waits till an
acknowledgment is received from the receiver. It is a data-link layer protocol
In stop and wait ARQ the frames and acknowledgements are alternately
numbered
A frame 0 is acknowledged using ACK1 and frame 1 with ACK0
The acknowledgement number indicates the next expected frame
3M
Page 33/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Diagra
m
3M
explaina
tion
1) Normal Operation : In normal operation the sender sends a frame and waits for
acknowledgement from receiver .The acknowledgement should be received
before the timer for each frame expires
Page 34/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
c) Explain the addressing scheme in IPv4 and IPv6, when IPv6 protocol is introduced, does 6M
the ARP protocol have to be changed? Explain in details.
Ans:
IP address belonging to class B are assigned to the networks that ranges consider
from medium-sized to large-sized networks. ed
Page 35/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Class C:
IP address belonging to class C are assigned to small-sized networks.
The Network ID is 3 byte long and Host ID is 1 byte long
The most significant bits of the class C are always set to 110 The
remaining 21 bits are used to determine network ID.
Class D:
IP address belonging to class D are reserved for multi-casting.
The most significant bits of class D are always set to 1110.
Class E:
IP addresses belonging to class E are reserved for experimental and
research purposes.
The most significant bits of class E are always set to 1111.
Page 36/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page 37/