0% found this document useful (0 votes)
81 views417 pages

DCN Model Answer

The document provides guidelines for examiners on assessing student answers in a technical examination, emphasizing keyword recognition over verbatim responses. It includes model answers for various questions related to computer networks, covering definitions, comparisons, and applications of networking concepts. Additionally, it outlines the structure of the exam, including types of questions and marks allocation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views417 pages

DCN Model Answer

The document provides guidelines for examiners on assessing student answers in a technical examination, emphasizing keyword recognition over verbatim responses. It includes model answers for various questions related to computer networks, covering definitions, comparisons, and applications of networking concepts. Additionally, it outlines the structure of the exam, including types of questions and marks allocation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 417

MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION

(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page1/ 27

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values may
vary and there may be some difference in the candidate‟s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer based
on candidate‟s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.

Q.1.
(A) Attempt any SIX : 12

(a) Define Server. Give the name of any two types of Server.
(Definition -1 mark, any two types -1 mark)

Definition of server: The central computer which is more powerful than the clients & which
allows the clients to access its software & database is called as the server.
Types of server:
1. File server
2. Print Sever
3. Application server
4. Message server
5. Database server

(b) Define LAN. Write any two disadvantages of LAN.


(Definition 1 mark, any 2 disadvantage -1 mark)
Definition of LAN: LAN is a network which is designed to operate over a small physical
area such as an office, factory or a group of buildings.
Disadvantages:
1. Power - a good LAN is required to be on all the times.
2. Security - each computer and device become another point of entry for undesirables.
3. Investment in Higher Costs due to server systems.
4. Frustration if having a problem setting up.
5. A lot of times a network shares one Internet connection - if all computers running at once,
can reduce speed for each.
6. Area covered is limited.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page2/ 27

(c) Write in brief any two roles of network control devices in computer network.
(1 role – 1 mark, any 2 two roles)
Two roles of network control devices in computer:
Role of repeater: Generates the original signal. Operates in the physical layer.
Role of Bridges: Bridges utilize the address protocol. They can exercise the traffic management.
They are most active in the data link layer.
Role of routers: Routers provide connections between two separate but compatible networks. It
works in the network layer.
Role of Gateways: Gateways provide translation services between incompatible networks and
works in all layers.

(d) List any two disadvantages of bus topology.


( 1 disadvantage- 1mark, any two disadvantages)
Disadvantages of bus topology.
1. Heavy network traffic slows down the bus speed .In bus topology only one computer can
transmit & other have to wait till their turn comes & there is no co-ordination between
computers for reservation of transmitting time slot.
2. The BNC connector used for expansion of the bus attenuates the signal considerably.
3. A cable break or loose BNC connectors will cause reflections & bring down the whole
network causing all network activity to stop.

(e) Define Wi-Max. (definition 2 marks)


Define: Wi- Max is worldwide interoperability for Microwave Access. It is a wireless
communication standard which can provide data rates up to 1 Gbps.

(f) Give any two disadvantages of unshielded twisted pair cable.


(1 disadvantage- 1mark, any two disadvantages)
Disadvantages of unshielded twisted pair cable.
1. Highly prone to crosstalk.
2. Unable to provide secured transmission of data.

(g) Define protocol. Give the name of any two protocols.


( Definition -1 mark, any two examples- 1 mark)
Define protocol: There are certain rules that must be followed to ensure proper
communication & a set of such rules is known as protocol.
Example: UDP, TCP/IP, SMTP, HTTP, SSL, FTP etc

(h) List different classes of IP Address.


( ½ mark for each class, Any four classes)
Different classes of IP address.
Class A
Class B
Class C
Class D
Class E
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page3/ 27

(B) Attempt any TWO : 8

(a) Compare Server based network and peer-to-peer network. (Any four points)
(Each difference 1 mark, any four points)
Compare Server based network & Peer to Peer network
Server based network Peer to Peer
1. It is much like company uses centralized 1. It is much like company uses decentralized
management. management.
2.In this server has more power & client has 2.In this each machine has same power
less power.
3. It is hardware intensive. 3. Uses less expensive computer hardware.
4. Complex to setup & require professional 4. Easy to setup & administrator.
administrator.
5.Very secure 5.Less secure
6.Network O.S required 6.Network O.S not required
7.It support large Network 7.It support small Network
8.Better performance 8.Might hurt user's performance

(b) Give any four selection criteria for selecting network topology.
( 1- mark for each criteria, any four criteria)
Selection criteria for selecting network topology.

1. Size of the network & number of devices or nodes being connected.


2. Ease of configuration & installing.
3. The ease of adding new device in an existing network.
4. The ease of fault indication & reflection.
5. Number of physical links required to be used for connecting the devices.
6. Need of network connecting devices such as repeaters, switches, hubs etc.
7. Costs involved.
8. Need of security.
9. Need of network administration.

(c) Discuss hybrid topology with suitable diagram.


(Explanation -2 marks, Diagram- 2 marks)
Discuss hybrid topology with suitable dig.
Hybrid topology is one that uses two or more basic topologies together Fig.1 depicts this. In
this case, the bus, star & ring topologies are used to create this hybrid topology. There are
multiple ways in which this can be created. The hybrid topology which is to be used for a
particular application depends on the requirements of that application. In practice, many
networks are quite complex but they can be reduced to some form of hybrid topology.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page4/ 27

Q.2 Attempt any FOUR: 16

a) Enlist eight applications of computer network.


( ½ marks for each application, any eight applications )

Applications of Compute Network


1) Banking
2) Video conferencing
3) Marketing
4) School
5) Radio
6) Television
7) E-mail
8) Companies
OR

1. Sharing the resources such as printers among all the users.


2. Sharing of expensive software & hardware.
3. Communication from one computer to other.
4. Exchange of data & information amongst the users, via the network.
5. Sharing of information over the geographically wide areas.
6. For connecting the computers between various buildings of an organisation.
7. For educational purposes.
8. Maintenance is limited to the servers & clients.

b) Compare LAN, MAN and WAN. (Any four points)


(1 mark for each point, any four comparison points)

.
LAN MAN WAN
1. Area – Network within 1.Area-Network within 1.Area – Network spans a
a single building or over an entire city. large geographical area after
campus of up to a few Up to 10km a country or continent 100
kilometres in size. km …1000km country
10 … 1 Km ….continent
campus.
2. LAN network has very 2.MAN network has 2.WAN speed varies based on
high speed mainly due tolower speed compared to geographical location of the
proximity of computer LAN. servers. WAN connects
and network devices. several LANs
3. Bandwidth is low. 3. Bandwidth is 3 Bandwidth is high.
moderate.
4. Transmission media – 4.Transmission media- 4 Transmission media –
coaxial cable. cables, PSTN, optical PSTN or Satellite links.
fibre cables, wireless
5. Data rate is high. 5. Data rate is moderate. 5. Data rate is low.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page5/ 27

c) Draw and explain Co-axial cable.


(Diagram 1 mark,explaination 1 mark,any 2 advantages & disadvantages 1 mark each)

Coaxial cable (also called as coax) has an inner central copper conductor surrounded by an
insulating sheath, which in turn is enclosed in the metal mesh. This outer conductor (shield)
acts not only as a second conductor for completing the circuit but also acts as shield against
noise. This whole arrangement is enclosed in protective plastic cover as shown in fig.
Co-axial cables are divided into various categories depending upon the thickness & size of
the shields, insulators and the outer coating & other considerations. They are commonly used
by cable companies to carry cable transmissions. The various coaxial cable standards are RG-
8, RG-9,RG-11,RG-58 and RG-59.
Advantages of coaxial cable are:-
1.it carries signals of higher frequency ranges than twisted pair cable.
2.lower attenuation than twisted pair cable.
3. supports higher bandwidth.

Disadvantages of coaxial cable are:-


1.Cost of coaxial cable is more than twisted pair cable.
2.Less flexible .
3. More difficult to install in a building where a number of twists and turns are required.
4. limited to size of network.

d) State the factors to be considered for selecting transmission media. (Eight points)
( 1/2 marks for any eight factors)

Eight factors to be considered:


1. Type of medium.
2. No of conductors/connectors.
3. Flexibility.
4. Durability.
5. Bandwidth.
6. Reliability of connection
7. Required speed
8. Distance
9. Ease of installation and maintenance access
10. Technical expertise required to install and utilize
11. Resistance to internal EMI , cross talk of parallel wires
12. Resistance to external EMI outside the cable.
13. Attenuation characteristics
14. Cost
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page6/ 27

e) Discuss any four network features.(1 mark for each feature, any four features)
Discuss any four network features.
1) File sharing: File sharing is the primary feature of network. Due to use of networks, the
sharing of files becomes easier. File sharing requires a shared directory or disk drive to which
many users can access over the network. When many users are accessing the same file on the
network, more than one person can make changes to a file at the same time. They might both
making conflicting changes simultaneously.
2) Printer sharing: Printer sharing is beneficial to many users as they can share costly & higher
quality printers. Printer sharing can be done in several different ways on network. The most
common way is to use printer queues on server. The printer queue holds print job until any
currently running print jobs are finished & then automatically send the waiting jobs to the
printer i.e. printer connected to server. Another way to share printer on a network is that each
workstations accesses the printer directly.
3) Application services: You can also share application on a network. For example you can
have a shared copy of Microsoft office or some other application & keep it on the network
server.
Another application services you can have on the network is shared installation i.e. contents
of CD-ROM copy to the server, then run the installation the installing application mush faster
& more convenient.
4) E- mail services :E-mail is extremely valuable & important feature for communication within
organization or outside the people in world. E-mail service can be used by user in two
different ways : 1. File based 2.Client
File based e-mail system requires gateway server for connecting or handling the e-mail
interface between the two systems using gateway software that is part of the file-based e-mail
system.
A client-server e-mail system is one where an e-mail server containing the messages &
handles all incoming & outgoing mail. It is more secure & powerful than file based e-mail
system.
5) Remote access: Using this feature user can access their file & e-mail, when they are travelling
or working on remote location. It enables users to access to centralized application, stored
private or shared files on LAN.
6) Internet & Intranet: Internet: It is public network. This consists of thousands of individual
networks & millions of computers located around the world. Internets have many different
types of services available such as e-mail, the web & Usenet newsgroups.
Intranet: It is private network or it is company‟s own network. Company use this feature for
internal use. For example: company establish its own web server, for placing documents such
as employee handbooks, purchases form or other information that company publishes for
internal use. It also has internet services such as FTP servers or Usenet servers.
7) Network security: Internal & External

f) Explain infrared communication. List any two disadvantages of infrared


communication.(explanation -2 marks, Two disadvantages -2 marks)
Infrared communication (IR) is an example of wireless communication. However, it is
limited to very simple applications & suffers from several disadvantages, mainly very small
bandwidth & distances that it can support. Infrared communication works in the micrometer
range, which is 1 to 430 THZ. The term infrared comes from the fact that red color has the
longest wavelength amongst the colors in visible light. However, the wavelength of infrared
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page7/ 27

is longer than that of red color, and hence the frequency of infrared communications is
smaller than that of red color. Hence, we have the term „below red color‟ or „Infrared‟.
Infrared communication is used by military for surveillance, for vision in the darkness
at night, tracking objects, etc. We use infrared communication whenever we use our remote
controls to operate television sets, DVD players, etc. Weather forecasting & astronomy also
make use of infrared communication.
Disadvantage:
i. The major disadvantage is that the sun generates radiation in the infrared band. This
can cause a lot of interference with IR communication.
ii. Infrared signals cannot penetrate walls
iii. Large areas require multiple emitter panels, which will increase the cost of the
system.

Q.3. Attempt any FOUR: 16


a) Explain PAN with suitable diagram. Differentiate between PAN and CAN. (Two
points only)
(diagram- 1 mark,Explanation-1 mark, differentiation-any 2 points-1 mark each)

A personal area network(PAN) is a network organized around an individual person. A PAN


can also be used for communication among personal devices themselves(interpersonal
communication).PAN network can be constructed using cables or it can be wireless. A
personal area network (PAN) is the interconnection of information technology devices within
the range of an individual person, typically within a range of 10 meters. For example, a
person traveling with a laptop, a personal digital assistant (PDA), and a portable printer could
interconnect them without having to plug anything in, using some form of wireless
technology. Typically, this kind of personal area network could also be interconnected
without wires to the Internet or other networks.

PAN CAN
1. PAN is definitively the smallest 1. This is a network spanning multiple
type of network you can currently LANs within a limited geographical
use and the name comes from area.
Personal Area Network
2. PAN is the interconnected 2.It can connect different buildings in its
network of technologic devices campus such as various departments,
within the reach of an individual library etc.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page8/ 27

person.

3. Range of maximum 10 meters. 3. The range of CAN is 1KM to 5KM


4. PAN is mainly used for personal 4. CAN is mainly used for corporate
communication. campuses.

b) Discuss the role of the HUB. Differentiate between Active Hub and Passive Hub.
(Role-2 marks, difference any 2 points -1 mark each)

HUB: Hub is a connecting device; it is also known as multiport repeater.


It is normally used for connecting stations in a physical star topology
All networks require a central location to bring media segments together.
These central locations are called hubs. A hub organizes the cables and relays signals to the
other media segments. There are three main types of hubs:
1) Passive
2) Active
3) Intelligent

Active Hub Passive Hub


1. They are like passive hubs but have 1. A passive hub simply combines the signals
electronic components for regeneration and of a network segments.
amplification of signals.
2. by using active hubs the distance between 2. A passive hub reduces the cabling distance
devices can be increased. by half because it does not boost the signals.
3. The main drawback of active hubs is that 3. Passive hubs do not amplify noise.
they amplify noise along with the signals.
4. They are much expensive than passive hubs. 4. They are not much expensive.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page9/ 27

c) Why layered architecture is used in OSI reference model? Discuss.


(Explanation-3 marks, diagram 1 mark)

The OSI reference model is as shown in the figure.There are seven layers in the model.
Physical layer, Data link layer, Network layer, Transport layer, Session layer, Presentation
layer, Application layer. Each layer performs unique and specific task and it offers services to
the layer above it. Each computer on a network uses a series of protocols to perform the
functions assigned to each layer. At the top of the stack is the application layer and at the
bottom is the physical medium which actually connects the computers to form a network. The
figure shows the OSI model with two hosts A and B, communicating with each other
Interface: an interface defines the operations and services offered by lower layer to the upper
layer. This is an interface between each pair of adjacent layers as shown in the figure.
Peer: the entities comprising the corresponding layers on different machines are called as
peers. The communication actually takes place between the peers using the protocols.
Exchange of information: at the physical layer the communication is direct that is, machine A
sends a stream of bits to machine B. at higher layers each layer in the sending machines adds
its own information to the message it receives from the layer just above it and passes the
whole package to the layer just below it. The information added by each layer is in the form
of headers or trailers. At layer 1 the entire package is converted to a form that can be
transferred to the receiving machine.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page10/ 27

d) Explain encapsulation with example. (Diagram 1 mark, explanation 1 mark, example 2


mark)

Each layer in the layered architecture provides service to the layers which are directly above
and below it. The outgoing information will travel down through the layers to the lowest
layer. While moving down on the source machine, it acquires all the control information
which is required to reach the destination machine. The control information is in the form of
headers and footers which surrounds the data received from the layer above. This process of
adding headersand footers to the data is called as data encapsulation. The headers and footers
contain control information in the individual fields. it is used to make message packet reach
the destination. The headers and footers form the envelope which carries the message to the
desired destination.

Eg:

DATA ENCAPSULATION IN SENDING MACHINE

LAYER 5 M

LAYER 4
H4 M

LAYER 3 H3 H4 M1 H3 M2

LAYER 2 H2 H3 H4 M1 T2 H2 H3 M2 T2
LAYER 1

MESSAGE+ HEADER+TAILER

H4 = LAYER 4 HEADER
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page11/ 27

H3 = LAYER 3 HEADER
H2 = LAYER 2 HEADER
T2 = LAYER 2 TAILER

REVERSE PROCESS AT THE DESTINATION MACHINE

LAYER 5 M

LAYER 4
H4 M

LAYER 3 H3 H4 M1 H3 M2

LAYER 2 H2 H3 H4 M1 T2 H2 H3 M2 T2
LAYER 1

MESSAGE+ HEADER+TAILER

H4 = LAYER 4 HEADER
H3 = LAYER 3 HEADER
H2 = LAYER 2 HEADER,T2 = LAYER 2 TAILER

The figure shows the example of five layer stack for data encapsulation. The fifth layer of sending machine
wants to send a message M to the fifth layer of destination machine. The message M is produced by layer 5
of machine 1 and given to layer 4 for transmission. Layer 4 adds header H4 in front of the message and pass
it to layer 3. Layer 3 breaks up the incoming message into small units as M1 and M2 and pass these packets
to layer 2. Layer 2 adds the header as well as footer to each packet obtained from layer 3 and pass it to layer
1 for physical transmission.

e) Write the name of layers that perform the following functions in OSI :

I. Data Encryption
II. Error Correction
III. File Transfer
IV. Data Encoding

(1 mark each)
1. Data Encryption-Presentation Layer
2. Error Correction-Data link layer and Transport layer
3. File Transfer-Application layer
4. Data Encoding-Presentation layer
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page12/ 27

f) Explain the services provided by transport layer in TCP/IP model.


(Any four functions 1 mark each)

Responsibility of process to process delivery of message


Ensure that whole message arrives in order.
1. Service point addressing: -several programs run at a time on computer. Delivery is not
only from one computer to another but also from specific process on computer to
specific process on another computer. For this transport layer uses port addresses.
Transport layer delivers entire message to the correct process on the computer.
2. Segmentation and reassemble: -Each segment of a message contains a sequence
number which is used to reassemble the message correctly upon arriving at
destination and to identify and replace packets that are lost in transmission.
3. Connection control:-Logical connection is created between source and destination for
the duration of complete message transfer.
4. Flow control:-Flow control is performed end to end.
5. Error control:-Error control is performed process to process. It ensures that entire
message arrives at receivers transport layer without error(damage or loss or
duplication). Error correction is done by retransmission.

Q.4. Attempt any FOUR: 16


a) Explain following protocols:
I. PPP
II. SLIP

(2 marks for PPP explanation,2 marks for SLIP explanation)


(i)PPP:-PPP means point to point protocol. It is a much more developed protocol than
SLIP(which is why it is replacing it).It transfers additional data, better suited to data
transmission over the Internet(the addition of data in a frame is mainly due to the increase in
bandwidth).
PPP is a collection of three protocols:
A datagram encapsulation protocol
LCP i.e. Link control Protocol, enabling testing and communication configuration.
A collection of NCPs i.e. Network Control Protocols allowing integration control of PPP
within the protocols of the upper layers.
Data encapsulated in a PPP frame is called a packet. These packets are generally datagrams,
but can also be different. so one field of the frame is reserved for the type of protocol to
which the packet belongs. The PPP frame looks like:
Data to be Transmitted Padding Data

The padding data is used to adapt the length of the frame for certain protocols.

(ii)SLIP:-SLIP means Serial Line Internet Protocol.SLIP is the result of the integration of
modem protocols prior to suite of TCP/IP protocols.
It is a simple internet link protocol conducting neither address nor error control. Data
transmission with SLIP is very simple. this protocol sends a frame composed only of data to
be sent followed by an end of transmission character(the END character, the ASCII code of
which is 192).A SLIP frame looks like:
Data to be Transmitted END
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page13/ 27

b) Compare IPv4 and IPv6. (Any four points)


(any 4 points,1 mark each)
IPv4 IPv6
1. Source and destination addresses are 32 1. Source and destination addresses are
bits (4 bytes) in length. 128 bits(16 bytes) in length.
2. Uses broadcast addresses to send traffic 2. There are no IPv6 broadcast addresses.
to all nodes on a subnet. Instead, multicast scoped addresses are
used.
3. Fragmentation is supported at 3. Fragmentation is not supported at
originating hosts and intermediate routers. routers. It is only supported at the
originating host.
4. IP header include a checksum. 4. .IP header does not include a checksum.
5. IP header includes options. 5. All optional data is moved to IPv6
extension headers.
6. IPsec support is optional 6. IPsec support is required in a full IPv6
implementation.
7. No identification of payload for QoS 7. Payload identification for QoS handling
handling by routers is present within the by routers is included in the IPv6 header
IPv4 header. using the Flow Label field.
8. Address must be configured either 8. Addresses can be automatically
manually or through DHCP. assigned using stateless address auto
configuration, assigned using DHCPv6, or
manually configured.
9. Uses host address(A) resource records 9. Uses host address (AAAA) resource
in the domain name system to map host records in the domain name system to
names to IPv4 addresses. map host names to IPv6 addresses

c) Draw and explain fiber optic cable.(2 marks for diagram, 2 marks for explanation)

As shown in the figure, at the center is the glass core through which the light propagates. In
multimode fibers, the core is typically 50 microns in diameter. In single mode fibers, the core
is 8 to 10 microns. The core is surrounded by a glass cladding with a lower index of
refraction than the core, to keep all the light in the core. A thin plastic jacket is used to
protect the cladding. Fibers are grouped in bundles, protected by an outer sheath.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page14/ 27

Fibers can be connected in three different ways. First they can terminate in connectors and be
plugged into fiber sockets. Connectors lose about 10 to 20 percent of the light, but they make
it easy to reconfigure systems.
Second they can be spliced mechanically. Mechanical splices just lay the two carefully – cut
ends next to each other in a special sleeve and clamp them in place. Alignment can be
improved by passing light through the junction and then making small adjustments to
maximize the signal.
Third, two pieces of fiber can be fused to form a solid connection. A fusion splice is almost
as good as a single drawn fiber.

d) Explain sub-netting and super-netting with example.

(Sub-netting 2 marks, super-netting 2 marks)


Sub-netting:subnet mask is a net mask with the only real difference being that breaking a
larger network into smaller parts and each smaller section will use different sets of address
numbers. The subnet mask is 32 bit value that usually express in dotted decimal notation used
by IP address. This is the combination of net-ID and host-ID.
Example:
Consider the subnet mask as 255.255.0.0.
convert the 255.255.0.0 subnet mask to binary.
255.255.0.0 =
11111111 11111111 00000000 00000000
(in binary)
add 1s right after the last 1 on the right (in the middle of the mask, between the 1s and 0s)
I add five 1s to make it look like this:
11111111 11111111 11111000 00000000
Using the subnet's formula, this would give us 25 = 32 networks
Super-netting:
To create a supernetwork, the procedure is to be reversed.Th networks are combined by
creating space for a larger number of hosts. To accomplish this, we start with the default
subnet mask of 255.255.255.0 and use some of the bits reserved for the Netid to identify the
Hostid. The following exampleshows we would create a new supernetwork by combining
four separate subnetworks.

Example: If a packet arrives at the router with the destination address


192.168.64.48, the supernet mask 255.255.252.0 is applied to the
destination address.
11000000.10101000.01000000.00110000 (destination IP address)

AND
11111111.11111111.11111100.00000000 (supernet mask)

Returns
11000000.10101000.01000000.00000000
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page15/ 27

e) Explain horizontal and vertical communication. (2 M each)


Horizontal communication

Fig: Horizontal Communication in OSI Model.


1) The horizontal communication is the logical connection between the layers, there is no
direct communication between them.
2) Information included in each protocol header by the transmitting system is a message that
will be carried to the same protocol in the destination system .
3) For two computers to communicate over a n/w, the protocol used at each layer of the OSI
model in the transmitting system must be duplicated at the receiving system.
4) The packet travels up through the protocol stack and each successive header is stripped of
by the appropriate protocol & processed.
5) When the packet arrived at its destination, the process by which the headers are applied at
the source is repeated in server.
Vertical communication:
1) In addition to communicating horizontally with the same protocol in the other system, the
header information also enables each layer to communicate with the layer above & below
it.
2) Eg. The n/w layer will communicate with the data link layer & transport layer.

3) This interlayer communication is called communication vertical.


4) When a system receives a packet & passes it up through various layers the data link layer
protocol header includes a field which specifies the name of n/w layer protocol to be used
to process the packet.
5) The n/w layer protocol header will specify the name of transport layer protocol to be used
to process the packet.
6) Due to vertical communication, it becomes protocol at each layer simultaneously.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page16/ 27

Fig:Vertical communication

f) Enlist the components of computer network. Describe any one in brief.


(1 mark for list, 3 marks for description, any other component can be considered)
The components of computer network are:
Hub
Router
Modem
Bridge
Switches
Network Interface Card
Cables and connectors
Crimping tool
LAN tester

Explanation:
1) HUB: Hub is a connecting device, it is also known as multiport repeater.
It is normally used for connecting stations in a physical star topology
All networks require a central location to bring media segments together.
These central locations are called hubs. A hub organizes the cables and relays signals to the
other media segments. There are three main types of hubs:
1) Passive
2) Active
3) Intelligent
Passive Hubs: A passive hubs simply combines the signals of a network segments. There is
no signal processing or regeneration. Apassive hub reduces the cabling distance by half
because it does not boost the signals and in fact absorbs some of the signal. With the passive
hub each computer receives the signal sent from all the other computers connected to the hub.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page17/ 27

Active hubs: They are like passive hubs but have electronic components for regeneration and
amplification of signals. by using active hubs the distance between devices can be increased.
The main drawback of active hubs is that the amplify noise along with the signals. They are
also much expensive than passive hubs.
Intelligent hubs: in addition to signal regeneration, intelligent hubs perform some network
management and intelligent path selection. One advantage to this is that all transmission
media segment can be connected permanently because each segment will be used only when
a signal is sent to a device using that segment.

Node 1 Node 2

HUB

Node 3 Node 4

2) ROUTER: Router is a device that connects 2 or more networks. It consist of hardware and
software .hardware includes the physical interfaces to the various networks in the
internetwork. Software in a router is OS and routing protocols management software.
1) Router use logical and physical addressing to connect two or more logically separate
networks.
2) They accomplish this connection by organizing the large network into logical network
called subnets.
3) Each of the subnet is given a logical address. This allows the network to be separate but
still access to each other and exchange data.
4) Data is grouped into packets. Each packet has physical device address and logical network
address.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page18/ 27

3) MODEM: Modem works as modulator as well as demodulator. Modem converts analog


signal to digital signal and vice versa. In case of networking data has to be transferred from
one location to another location. At present to transfer such data whatever the
infrastructure(PSTN) is available .it is of analog technology but computer sends digital data
to transfer this data to another location it is needed to convert into analog format so that it can
be transferred by using currently available infrastructure.
Signal corrupted by noise

Transmitted data Analog signal Received data

Modem Modem
(DCE) (DCE)

Telephone DTE
DTE

Q.5. Attempt any FOUR : 16


a) Compare OSI reference model and TCP/IP network Mode.
(any 4 points 1 mark for each)
OSI reference model TCP/IP network model
1)It has 7 layers 1)It has 4 layers
2)Transport layer guarantees delivery of 2)Transport layer does not guarantees
packets delivery of packets
3)Horizontal approach 3)Vertical approach
4)Separate presentation layer 4)No session layer, characteristics are
provided by transport layer
5)Separate session layer 5)No presentation layer, characteristics
are provided by application layer
6)Network layer provides both 6)Network layer provides only
connectionless and connection oriented connection less services
services
7)It defines the services, interfaces and 7)It does not clearly distinguishes
protocols very clearly and makes a clear between service interface and protocols
distinction between them
8)The protocol are better hidden and can 8)It is not easy to replace the protocols
be easily replaced as the technology
changes
9)OSI truly is a general model 9)TCP/IP cannot be used for any other
application
10)It has a problem of protocol filtering 10)The model does not fit any protocol
into a model stack.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page19/ 27

b) In star topology which device is preferable as a star device between switch and hub?
Justify.

(2 marks for explanation, 2 marks for diagram)


Switch in star Topology:
Switch is used as a central device to connect different nodes in star topology.
Switch is an intelligent device. When switch receives a data packet it reads destination
address stored in the packet it reads destination address stored in the packet and send it to
only that node whose destination address matches with the address contained in the data
packet.
Diagram:

c) Explain different modes of fibre optic cable.(For each mode 2 marks)


Current technology supports two modes for propagating light along optical channels.
1. Multimode.
2. Single mode.

Multimode can be implemented in two form:


1. Step index.
2. Graded index.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page20/ 27

Multimode :
Multiple beams from a light source move through the core in different paths.
How these beams move within the cable depends on the structure of the core as shown in the
fig.
In multimode step-index fiber, the density of the core remains constant from the center to the
edges.
A beam of light moves through this constant density in a straight line until it reaches the
interface of the core and the cladding.
At the interface, there is an abrupt change due to a lower density, this alters the angle of the
beam‟s motion.
The term step index refers to the suddenness of this change, which contributes to the
distortion of the signal as it passes through the fiber.
A multimode graded index fiber decreases this distortion of the signal through the cable.
In this, density is highest at the center of the core and decreases gradually to its lowest at the
edge.
Following fig shows the impact of this variable density on the propagation of light beams.

Single mode:
The single mode fiber is manufactured with a much smaller diameter than that of multimode
fiber and with substantially lower density.
The decrease in density results in a critical angle that is close enough to 900 to make the
propagation of beams almost horizontal.
In this case propagation is almost identical and delays are negligible.
All the beams arrive at the destination together and can be recombined with little distortion to
the signal.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page21/ 27

d) State the situations under which gateways are necessary in the network.
(Necessary2Marks. example2Marks)
Gateway operates at all 7 layers of the OSI model. It is a device, which connects two
different dissimilar n/w which have same function of communication. Situation where
gateways are necessary for different n/w like Ethernet, Token Ring, and FDDI etc. It can
communicate if they are using same protocol for communication like TCP/IP 08 Apple talk if
they are using different protocol from a gateway cash forward packet across different n/w s
that may also use different protocol.
Eg: if n/w A is a Token Ring network using TCP/IP & network B is a Novell Network, a
gateway can relay frames between two.
This means that a gateway has not only had, but also between different protocols. In certain
situations the only changes required are to the frame header. In other cases, the gateway must
take case of different frame sizes, data rates, format, acknowledgement schemes, and priority
schemes tec.

e) Explain connectionless and connection oriented protocol. Give the example for each
type.
(Explanation 1 mark each, any one example 1 mark for each type)
Connection less protocol:
These protocols do not establish a connection between devices. It is manually achieved by
transmitting information in one direction, from source to destination without checking to see
if the destination is still there or if it is prepared to receive the information.

Connection-oriented protocol:
It means that when devices communication they perform hand sharing to set up on end to end
connection. Usually one device begins by sending a request to open a connection, and the
other responds.
Connectionless protocols:
1) IP
2) ICMP
3) UDP
1. IP
IP is internet Protocol.
It is unreliable protocol because it does not provide any error control and flow control.
Packets in IP are called “Datagram”
2. ICMP
It is internet control message protocol.
It reports error and sends control messages.
Error reporting messages include – destination unreachable, source quench , time exceed,
parameter problem , redirection etc.
Query message includes –echo request and reply, time stamp request and reply, router
solicitation and advertisement. etc

3.UDP
UDP is user datagram protocol.
It is connectionless protocol because data is sent without establishing a connection between
sender and receiver before sending the data.
UDP is unreliable because data is delivered without acknowledgement.
UDP does not perform Auto retransmission.
UDP does not use flow control.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page22/ 27

UDP has high transmission speed.

Connection oriented protocol: 1) TCP 2) SLIP 3) PPP 4) SMTP

1) TCP
TCP is transmission control protocol.
It is connection oriented protocol because connection must be establish prior to transmission
of data.
TCP is reliable protocol because data is delivered with acknowledgement.
TCP perform Auto Retransmission if the data is lost.
TCP use flow control.
TCP has low speed of transmission.

2. SLIP
SLIP is serial line internet protocol
SLIP does not perform error detection and correction.
SLIP does not provide any authentication.
SLIP is not approved internet standard.
SLIP supports only Internet protocol (IP)
SLIP supports static IP address assignment
3. PPP
PPP is point to point protocol.
PPP perform error detection
PPP provides authentication and security.
PPP is approved internet standard.
PPP supports IP and other protocols.
PPP supports Dynamic IP address assignment

4. SMTP
SMTP is simple mail transfer protocol.
It is connection oriented text based protocol in which sender communicates with receiver
using a command and supplying data over reliable TCP connection.
SMTP is standard application layer protocol for delivery of email over TCP/IP network.
SMTP establish a TCP connection between Sender And port number 25 of receiver

f) Explain following:
I. Telnet
II. FTP
(2 Marks for each)
1. Telnet:
TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual
terminal services proposed by ISO.
TELNET enables establishment of connection to a remote system in such a way that a local
terminal appears to be terminal at remote system.
TELNET is general purpose client server application program.

2. FTP.
FTP is a stranded mechanism provided by the Internet for copying a file from one host to the
other.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page23/ 27

Some of the problem in transferring files from one system to the other are as follows:
 Two systems may use different file name conventions.
 Two systems may represent text data in different types.
 The directory structure of the two systems may be different.
FTP provides a simple solution to all these problems.
FTP established two connections between the client and server. One is for data transfer and
the other is for the control information.
The fact that FTP separates control and data makes it very efficient.
The control connection uses simple rules of communication. Only one line of command or a
line of response is transferred at a time.
But the data connection uses more complex rules due to the variety of data types being
transferred.
FTP uses port 21 for the control connection and port 20 for the data connection.

Q.6. Attempt any FOUR : 16


a) Explain the function of each layer of OSI reference model with neat diagram.
(2 marks for diagram, 6 marks for functions of layers)

OSI model (open system interconnection) model was developed by ISO (international
standard organization)
Function of OSI model:
i. It provides way to understand how internetwork operates.
ii. It gives guideline for creating network standard.
OSI model has 7 layers as shown in the figure.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer

OSI model has following 7 layers as Physical layer, data link layer, Network layer, Transport
layer, session layer, presentation layer, application layer.

1. Physical layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It deals with mechanical and electrical specifications of interface and transmission
medium. For transmission it defines procedures and functions that devices and transmission
medium has to perform
Physical characteristics of interfaces and media.
Representation of bits: Data rate(transmission rate).
Synchronization of bits.
Line configuration: Point to point or multipoint configuration should be used.

2. Data link layer: It is responsible for transmitting group of bits between the adjacent nodes.
The group of bits is called as frame. The network layer passes a data unit to the data link
layer. Header and trailer is added to the data unit by data link layer. This data unit is passed to
the physical layer. Data link layer is responsible for moving frames from one node to the
next.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page24/ 27

Functions of data link layer are:


1) Framing
2) Physical addressing
3) Flow control
4) Error control
5) Media access control
6) Node to node delivery

3. Network layer: It is responsible for routing the packets within the subnet i.e. from
source to destination. It is responsible for source e to destination delivery of individual
packets across multiple networks. It ensures that packet is delivered from point of origin to
destination.
Functions of network layer:
1) logical addressing
2) Routing.
3) Congestion control
4) Accounting and billing
5) Address transformation
6) Source host to destination host error free delivery of packet.

4. Transport layer: Responsibility of process to process delivery of message Ensure that whole
message arrives in order.
Functions of Transport layer:
1) Service point addressing
2) Segmentation and reassembly
3) Connection control
4) Flow control: Flow control is performed end to end 5) Error control

5. Session layer: Establishes, maintains, and synchronizes the interaction among


communication systems It is responsible for dialog control and synchronization.
Functionsof Session layer:
1) Dialog control
2) Synchronization, session and sub session
3) Session closure

6. Presentation layer: It is concerned with syntax, semantics of information exchanged


between the two systems.
Functions of Presentation layer:
Translation: presentation layer is responsible for converting various formats into required
format of the recipient
Encryption: Data encryption and decryption is done by presentation layer for security.
Compression and Decompression: data to be transform compressed while sending and
decompress while receiving for reducing time of transmission.

7. Application layer: It enables user to access the network. It provides user interfaces and
support for services like email, remote file access.
Functions of Application layer:
Network virtual terminal
file transfer access and management
mail services and directory services
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page25/ 27

b) Give the name of protocols used by different layers of TCP/IP. Discuss the function of
ARP and RARP.
(4 marks for protocols, 2 marks of ARP, 2 marks of RARP)

TCP/IP Model contains following layer.


1) Host-to-Network Layer -
It defines characteristics of transmission media.
It also concern with delivery of data when two systems are attached to same network
SLIP
PPP

2) Internet Layer –
This layer permits host to inject packets into network and packet travels independently to
destination.
This layer defines packet format and protocol called IP (internet Protocol)
ARP
RARP
IP

3) Transport Layer -
It has TCP and UDP.
TCP (transmission control protocol) –it is Reliable & connection oriented protocol.
UDP (User Datagram Protocol)- it is Unreliable & connectionless protocol.

4) Application Layer -
It includes virtual Terminal (TELNET), file transfer Protocol (FTP), simple Mail Transfer
Protocol (SMTP) and other protocols like HTTP, WWW, DNS.

ARP:(Address resolution protocol)


Networking H/W demands that a datagram contain the physical address of the intended
recipient.
If problem Address Resolution protocol (ARP) was developed.
ARP takes the IP address of a host as input & gives its corresponding physical address as the
output.
As if doesn‟t know who must be having address if sends the broadcast message to all the
computer on the network.
The computer whose IP address matches the broadcast IP address sends a reply and along
with if, its physical address to the broadcasting computer.
All other computers lignose the broadcast message as IP address is different Now, when it is
responding whose IP address gets match is aware of the sender.
So it doesn‟t require sending broadcast message.
As it knows sender hardware as well as IP address that the reason it uncast the reply so that
senders only receive it.

RARP: (Reverse Address Resolution protocol)


ARP is used for solving the problem of finding out which Ethernet address corresponding to
a given IP address.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page26/ 27

But sometimes we have to solve a reverse problem. That means we have to obtain the IP
address corresponding to the given Ethernet address.
Such a problem can occur when booting a diskless workstation.
The problem of obtaining the IP address when an Ethernet address is given, can be solved by
using RARP(Reverse Address Resolution protocol)
The newly booted workstation is allowed to broadcast its Ethernet address. The RARP server
looks at this request. Then it looks up the Ethernet address in its configuration files and sends
back the corresponding IP address.
Using RARP is actually better than embedding an IP address in the memory image because it
allows the same image to be used on all machines.
If the IP address were buried inside the image, each workstation would need its own image.
The disadvantage of RARP is that it uses a destination address of all ls(limited broadcasting)
to reach the RARP server.
But such broadcasts are not forwarded by routers, so a RARP server is needed on each
network.

c) Explain Satellite communication with neat diagram


(Diagram 2 marks, explanation 4 marks, frequency band 1 mark, application 1 mark )
SATELLITE COMMUNICATION:
In satellite communication, signal transferring between the sender and receiver is done with
the help of satellite. In this process, the signal which is basically a beam of modulated
microwaves is sent towards the satellite called UPLINK (6 Ghz). Then the satellite amplifies
the signal and sent it back to the receiver‟s antenna present on the earth‟s surface called as
DOWNLINK (4Ghz), as shown in the diagram given

As the entire signal transferring is happening in space. Thus this type of communication is known as
space communication. The satellite does the functions of an antenna and the repeater together. If the
earth along with its ground stations is revolving and the satellite is stationery, the sending and
receiving earth stations and the satellite can be out of sync over time.
Therefore Geosynchronous satellites are used which move at same RPM as that of the earth in the
same direction.
So the relative position of the ground station with respect to the satellite never changes.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page27/ 27

However 3 satellites are needed to cover earth‟s surface entirely.

Frequency band used in satellite communication:

Band Downlink Uplink


C 3.7 to 4.2 Ghz 5.925 to 6.425Ghz
Ku 11.7 to 12.2 Ghz 14 to 14.5 Ghz
Ka 17.7 to 21 Ghz 27.5 to 31 Ghz

Application of satellite:
Satellite television
digital cinema
satellite radio
satellite internet access
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess
the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills).
4) While assessing figures, examiner may give credit for principal components indicated in the figure.
The figures drawn by candidate and model answer may vary. The examiner may give credit for any
equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgment on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.

1. a) Attempt any SIX of the following: Marks 12


i) List any two applications of computer network.
(Listing of any 2 applications- 1 Mark each)
Ans: Applications of Computer Network
1) Banking
2) Video conferencing
3) Marketing
4) School
5) Radio
6) Television
7) E-mail

ii) List any four types of computer network by considering geography.


(Listing of any 4 networks - ½ Mark each)
Ans: LAN - Local Area Network
MAN - Metropolitan Area Network
WAN - Wide Area Network
CAN - Campus Area Network
HAN - Home Area Network
PAN - Personal Area Network

Page 1 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

iii) Give two advantages of mesh topology.


(Any 2 advantages - 1 Mark each)

Ans: Advantages of Mesh topology:

Dedicated Links: Dedicated links guarantees that each connection can carry its own data load,
thus eliminating the traffic problems that can occur when links must be shared by multiple
devices
It is robust. If one link becomes unusable, it does not incapacitate the entire system
It is Secure. When every message travels along a dedicated line, only the intended recipient
sees it. Physical boundaries prevent other users from gaining access to messages
Point to Point Connection: Point-to-point links make fault identification and fault isolation
easy

iv) Give the names of various N/W connecting devices (Any two).
(Listing of any 2 control devices -1 Mark each)
Ans: N/W connecting device:
Repeater
Hub
Switch
Bridge
Router
Gateway
Modem

v) List any two advantages of optical fiber cable.


(Any two advantages- 1 Mark each)
Ans: Advantages of optical fiber cable:
1) Higher bandwidth
2) Less signal attenuation
3) Immunity to electromagnetic interference
4) Resistance to corrosive materials

Page 2 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
5) Light weight
6) Greater immunity to tapping
7) Easily available

vi) Draw the sketch of co-axial cable (cross-sectional view)


(Diagram-1 Mark, Labeling- 1 Mark)
Ans:

vii) Define „Protocol‟ with reference to computer network. What is the function of IP?
(Definition of protocol - 1 Mark, Function of IP - 1 Mark)
Ans: Protocol: - Protocol is set of rules and conventions. Sender and receiver in data communication
must agree on common set of rules before they can communicate with each other.
Protocol defines.
a) Syntax (what is to be communicated)
b) Semantics (how is it to be communicated
c) Timing (When it should be communicated)

Function of IP:
a. Addressing
b. Routing
c. Data encapsulation
d. Fragmentation & reassembly

Page 3 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
viii) List any two components which works at physical layer of OSI model.
(Listing of any 2 components – 1 Mark each)

Ans: Repeater
1) Hub
2) Network Interface card (NIC)
3) Cables
4) Connectors

b) Attempt ant TWO of the following: Marks 08


i) Describe four advantages of computer network.
(Any 4 advantages – 1 Mark each)
Ans: Advantages of computer network:
1. Access to remote information: -Access to remote information comes in many forms. It can be
surfing the World Wide Web for information or just for fun. Information available includes the
arts, business, cooking, government, health, history, hobbies, recreation, science, sports, travel,
and many others.
2. Resource Sharing: Programs, data equipment are made available to every node on the
network.
Example: Printer sharing, LAN
3. Saving Money: Reducing equipment cost by sharing data resources, software’s etc.
4. High Reliability: All files are copied on no of computers, if one of the computer becomes
unavailable then the file can be read from other available system
5. Providing powerful communication Medium: Using network it is easy for two or more
people, who live far apart can write report together.
6. Person-to-person communication: Email, chats is already widely used by millions of people
to routinely share audio, video and text documents.
7. Interactive entertainment: Real-time streaming is possible because of network
8. Electronic commerce: E-commerce is trading in products or services conducted via computer
networks such as the Internet. Electronic commerce draws on technologies such as mobile
commerce, electronic funds transfer, supply chain management, Internet marketing, online
transaction processing, electronic data interchange.

Page 4 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

ii) Compare Bus topology and Ring topology (four points).


(Any 4 points – 1 Mark each)
Ans:

Factors BUS RING


1. Configuration Moderate Difficult

2. Type It is passive Topology It is Active Topology

3. Troubleshooting Difficult More Difficult

4. Media Failure Entire N/W collapse Entire network collapse

5. Failure of Node Partially affected Entire N/W Collapse

6. Addition of a Bit difficult as entire N/W Very difficult as entire


node has to shut down and then N/W has to shutdown and
a node can be added then node can be added
and entire N/W has to
reconfigure
7. Cables and T- Connector, BNC T-Connector, BNC
connectors used Connector, Terminator, connector, Co-axial Cable
Co-axial cable OR
Fiber optic connector and
fiber optic cable
8. LAN Card used Ethernet Ethernet OR Fiber Optic
Card
9. Reliability Lower Moderate

Page 5 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
iii) Suppose you are going to implement a computer network in a small business mall. Which
topology will you use? Why?
(Determining the topology -2 Marks, Justification - 2 Marks)

Ans: Which topology will you use? Why?

STAR Topology

In star topology, each computer or node is connected to a central hub. This is more reliable than a
classical ring topology because a node failing will not bring down entire network. A bus topology
arguably is more reliable but it has poor performance.

Advantages:

1. Highly reliable
2. Adding new node is very easy
3. Failure of any node does not affect the network
4. Troubleshooting is very easy

Page 6 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

2. Attempt any FOUR of the following: Marks 16


a) Name the types of server used in server-based network.
Describe the working of such a network.
(Listing of servers - 2 Marks, Brief Explanation- 2 Marks)
Ans: Types:
1. Application Server
2. Message Server
3. Database Server
4. Web server

DESCRIPTION:

Application Servers: The application server often serves to connect database servers with the
end-user, thus acting as a kind of "middleware" that releases stored information requested by said
user. The server is usually responsible for properly decoding and recoding data and providing
security over connections.

Message Servers: These servers provide instant, real-time communication between users,
regardless of where a user may be. Message servers allow a wide variety of communication
methods, from simple forms such as text to more complex forms such as video, audio and
graphics.

Database Servers: These servers manage the database that is stored in that server using the SQL
database management system. A client request is sent in the form of an SQL query to the server.
That server in turn searches through the database for the requested information and sends the
results to the client.

Page 7 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Web Servers: Web servers provide access to the Internet through the HyperText Transfer
Protocol (HTTP). Files in a web server use HyperText Markup Language (HTML) to display
content on web browsers. A web server usually receives requests from a web browser and sends
back the requested HTML file and related graphic files.

b) Explain any four benefits of computer network.


(Any 4 benefits – 1 Mark each)
Ans: Benefits of computer network:
1. File sharing: -files can be centrally stored and used by multiple users. Shared directory or disk
drive is used. If many users access same file on network and make changes at same time and
conflict occurs. Network operating system performs file sharing and provides security to share
files.
2. Printer sharing: Printer connected in a network can be shared in many ways. Use printer
queues on server. Here printer is connected to server. Each work station can access printer
directly. Printer can be connected to server. Connect a printer to a computer in a network and
run special print server software. Use built in print server. Use dedicated print server. By
printer sharing reduces no. of printers needed. Share costly and high quality printers.
3. Application services: Share application on a network. When applications are centralized,
amount of memory required on disk of work station is reduced. It is easier to administer an
application. It is more secure and reliable. It is faster and convenient.
4. E-mail services. Two types of email systems are available:
1) File based system: Files are stored in shared location on server. Server provides access to
file. Gate way server connects from file based email system to internet.
2) Client server e-mail system: E-mail server contains message and handles e-mail
interconnections. E-mail client functions (also consider other e-mail functions): read mail,
send, compose, forward, delete.
E-mail protocols: SMTP, POP etc.

5. Remote access: Set up remote access service on network operating system. Setup VPN (virtual
private network) on internet terminal services (TELNET). User can access files from remote
location. User can access centralized application or share files on LAN.

Page 8 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

c) Describe various factors to be considered while selecting transmission media.


(Any 4 factors - 1 Mark each)
Ans:
1. Cost & Ease of installation: Costing is an important factor, when we select a media. Because
absolute cost and ease of installation data are difficult to provide without referring to specific
implementations, one can make relative judgments by comparing each medium to the others.
2. Type of cable: Coaxial cable, Twisted Pair Cable, Fiber Optic Cable
3. No of conductors/connectors: RJ-45, BNC, LC & ST
4. Noise: It leads to distortion of a signal. Noise immunity of transmission media is considered at
the time of selecting particular network.
5. Bandwidth: Higher bandwidth transmission media support higher data rate.
6. Radiation: It is leakage of signal from media caused by undesirable characteristics of media.
7. Durability: Life span of media
8. Interference: interference occurs when undesirable electromagnetic waves affect the signal.
Interference can be caused by many factors, including

• Electromagnetic Interference (EMI)

• Radio wave interference (RFI)

9. Attenuation: Attenuation refers to the tendency of electromagnetic waves to weaken or


become distorted during transmission. It is loss of energy as the signals propagates outwards.
Attenuation increases with distance, as a wave passes through a medium, some of its energy is
absorbed or scattered by the medium’s physical properties.
d) Describe two application of
i) twisted pair cable
ii) co-axial cable
(Any 2 applications of each – 1 Mark each)
Ans: i) Twisted pair cable
1. Telephone lines.
2. Local area Network
3. DSL Lines

Page 9 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

ii) Co-axial cable


1. Television Systems
2. Connecting VCRs to television
3. Ethernet LANs

e) What are the various components of computer network.


Describe any one.
(Listing of Components - 2 Marks, Explanation (any one) - 2 Marks)
Ans: Components of Computer networks:
1. Computers (two or more)
2. Network Operating System software.
3. Network Interface card (on each Computer)
4. Cables that connects the computers to each other (coaxial cable, Fiber optic cable or twisted
pair cable)
5. Network devices such as routers, gateways, switch, hub, bridges, connectors.
Description:
1. Computers: Set of Computers with latest configuration.
Example: Intel Processor core i3/i5/i7 or latest with motherboard cheapest 41/61 with 4 USB,
1 Serial port, 4GB RAM DDR III, 500 GB Hard disk.
2. Network Operating System refers to software that implements an operating system of some
kind that is oriented to computer networking. For example, one that runs on a server and
enables the server to manage data, users, groups, security, applications, and other networking
functions
Example: Windows Server 2003/08/12, UNIX SERVER.
3. NIC (Network interface card / network adapter): It physically makes the connection,
works as interface between computer and network cable.
Functions of NIC:
1.Provide physical link or connectivity between computer and the network physical medium.
2.Prepare data from computer for network cable.
3.Send data to another node in network.
4.Control flow of data between computer and physical medium

Page 10 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

4. Cables:
1. Co-axial Cable: It is made of two conductors that share a common axis. The center of the
cable is stiff solid copper wire or stranded wire encased in insulating plastic foam. The foam is
surrounded by the second conductor, a wire mesh tube which serves as a shield from EMI. A
tough insulating plastic tube forms the cover of the cable

2. Twisted Pair Cable: They are formed by twisting of two insulated copper wires. One or
more twisted pairs are combined within a common jacket. Twisting the copper wires reduces
Crosstalk.
Types:
i) Unshielded Twisted Pair Cable (UTP)
ii) Shielded Twisted Pair Cable (STP)

3. Fiber optic cable: It is made of a light-conducting glass or plastic core surrounded by more
glass called cladding, and tough outer sheath. The center core provides the light path or wave
guide while the cladding is composed of varying layers of reflective glass.

5. Network Connecting Devices:


1. Repeaters: A repeater works at the physical layer of the OSI Reference Model to regenerate
the network's signals and resend them out on other segments.
2. Router: It is a device that attaches two or more network & forward packets according to
information found in routing table
3. Hub: It is a device used in Star Topology that connects the computers in a LAN. Hubs are
Passive, Active or Hybrid. It is a Multicast device

6. Connectors: To connect cables between two computers

Example: RJ-45, BNC

Page 11 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
f) Compare guided and unguided media used in computer network.
(Any 4 points – 1 Mark each)
Ans:

GUIDED MEDIA UNGUIDED MEDIA


Also called as bounded or wired Also called as unbounded or wireless
media media
Point to point connection i.e. signal Used for radio broadcasting in all
travelling is directed directions i.e. signal travelling is
undirected
Transport signal in electric current or Transport signal in the form of
light/ beam electromagnetic waves
Unidirection, not broadcast Broadcast

Installation is costly and time Installation needs less time and money
consuming
Wired media leads to discrete network Wireless media leads to continuous
topologies network topologies
Attenuation depends exponentially on Attenuation is proportional to square of
the distance the distance
Example: Twisted Pair cable, Coaxial Example: Radio, Infrared light,
cable, Fiber optic cable Microwave

3. Attempt any FOUR of the following: Marks 16


a) Describe the concept of peer-to-peer network. Where it is used?
(Peer to peer concept explanation-2 Marks, Diagram - 1 Marks, Use - 1 Mark)
Ans: Peer to peer (P2P) is an alternative network model to that provided by traditional client-server
architecture. P2P networks use a decentralised model in which each machine, referred to as a
peer, functions as a client with its own layer of server functionality. A peer plays the role of a
client and a server at the same time. That is, the peer can initiate requests to other peers, and at the
same time respond to incoming requests from other peers on the network. It differs from the
traditional client-server model where a client can only send requests to a server and then wait for
the server’s response.

Page 12 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

1. Peer to Peer networks do not have a central control system. There are no servers in peer
networks.

2. In this type of network users simply share disk space and resources, such as printers and
faxes.

3. Peer networks are organised into workgroups. Workgroup have very little security. There is
no central login process.

4. If the user has logged into one peer on the network he can use any resources on the network
that are not controlled by a specific password.

5. Access to individual resource can be controlled if the user who shared the resources requires a
password to access it.

6. Since there is on central security, the user will have to know individual password for each
secured shared resources he wishes to access.

The peer to peer networks are suitable/used for the following working conditions.

1. If security is not important.

2. If the number of users is less than 10.

3. If all the users are situated in the same area.

4. If the possibility of future expansion is less.

Page 13 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

b) Describe with neat sketch “Hybrid topology” Give its applications.


(Hybrid topology explanation-2 Marks, Diagram -1 Mark, Use - 1 Mark)
Ans: A combination of two or more different topologies makes for a hybrid topology. When different
topologies are connected to one another, they do not display characteristics of any one specific
topology.

WORKING OF Hybrid Topology


The Hybrid topology scheme combines multiple topologies into one large topology. The hybrid
network is common in large wide area networks. Because each topology has its own strengths and
weaknesses, several different types can be combined for maximum effectiveness.

ADVANTAGES of Hybrid Topology

1) Reliable : Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the functioning of rest of the
network.
2) Scalable: Its easy to increase the size of network by adding new components, without
disturbing existing architecture.

Page 14 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

3) Flexible: Hybrid Network can be designed according to the requirements of the


organization and by optimizing the available resources. Special care can be given to nodes

where traffic is high as well as where chances of fault are high.


4) Effective: Hybrid topology is the combination of two or more topologies, so we can design
it in such a way that strengths of constituent topologies are maximized while there weaknesses
are neutralized.

DISADVANTAGES of Hybrid Topology

1) Complexity of Design: One of the biggest drawback of hybrid topology is its design. Its
not easy to design this type of architecture and its a tough job for designers. Configuration and
installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These
hubs are different from usual hubs as they need to be intelligent enough to work with different
architectures and should be function even if a part of network is down.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a
lot of cables, cooling systems, sophisticate network devices, etc.

Applications: widely used in WAN.

c) What is meant by subnet? How to use subnet masking to create two subnets?
(Explanation of subnet -2 Marks, Subnet masking explanation with any suitable example - 2
Marks)

Ans: A subnet is a logical grouping of connected network devices. Nodes on a subnet tend to be
located in close physical proximity to each other on a LAN.

Network designers employ subnets as a way to partition networks into logical segments for
greater ease of administration. When subnets are properly implemented, both the performance and
security of networks can be improved.

Page 15 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
In Internet Protocol (IP) networking, devices on a subnet share contiguous ranges of IP address
numbers. A mask (known as the subnet mask or network mask) defines the boundaries of an IP
subnet. The correspondence between subnet masks and IP address ranges follows defined
mathematical formulas. IT professionals use subnet calculators to map between masks and
addresses.

Subnet masking for 2 subnet:

To calculate the number of subnets or nodes, use the formula (2n-2) where n = number of bits in
either field, and 2n represents 2 raised to the nth power. Multiplying the number of subnets by the
number of nodes available per subnet gives you the total number of nodes available for your class
and subnet mask. Also, note that although subnet masks with non-contiguous mask bits are
allowed, they are not recommended.

Example:

10001100.10110011.11011100.11001000 140.179.220.200 IP Address


11111111.11111111.11000000.00000000 255.255.192.000 Subnet Mask
--------------------------------------------------------
10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address

Hence

Subnet Address
number
1 140.179.64.0
2 140.179.128.0

d) Describe horizontal and vertical communication.


(Horizontal Comm.-2 Marks, Vertical Comm.- 2 Marks )
Ans: Horizontal communications

The horizontal communication between the different layers is logical; there is no direct
communication between them. Information included in each protocol header by the
transmitting system is message that will be carried to the same protocol in the destination
system.

Page 16 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
For two computers to communicate over a network, the protocols used at each layer of the
OSI model in the transmitting system must be duplicated at the receiving system.
The packet travels up through the protocol stack and each successive header is stripped off by
the appropriate protocol and processed.
When the packet arrives as it destination, the process by which the headers are applied at the
source is respected in reverse.
The protocol operating at the various layers communicate horizontally with their counterparts
in the other system, as shown in below fig.

Fig: Horizontal communications

Vertical Communications
In addition to communicating horizontally with the same protocol in the other system, the
header information also enables each layer to communicate with the layer above and below it.
The headers applied by the different protocols implemented the specific functions carried out by
those protocols.
For Example: When a system receives a packets and passes it up through the protocol stack, the
data link layer protocol header includes afield that identifies which network-layer protocol the
system should use to process the packet.
Network –layer protocol header in tern specifies one of the transport-layer protocols and the
transport-layer protocol identifies the application for which the data is ultimately destined.

Page 17 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Vertical communication makes it possible for a computer to support multiple protocols at each
of the layers simultaneously.

Fig: Vertical communications

e) Describe the importance/role of presentation layer in OSI model.


(Any 4 importance/functions of presentation layer – 1 Mark each)

Ans: Role of presentation layer in OSI model the presentation layer makes it sure that the information
is delivered in such a form that the receiving system will understand and use it.

The form and syntax (language) of the two communicating systems can be different e.g. one
system is using the ASCII code for file transfer and the other one user IBM’s EBCDIC.
Under such condition the presentation layer provider the “translation” from ASCII to EBCDIC
and vice versa.

Page 18 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

The presentation layer performs the following function:


1. It translates data between the formats the network requires and the format the computer
expects.
2. It does the protocol conversion
3. For security and privacy purpose it carries out encryption at the transmitter and decryption at
the receiver.
4. It carries out data compression to reduce the bandwidth of the data to be transmitted.
5. Unlike the session layer, which provides many different functions, the presentation layer has
only one function.
6. It basically functions as a pass through device. It receiver primitives from the application layer
and issues duplicate primitives to the session layer below it using the Presentation Service Access
point (PSAP) and Session Service Access point (SSAP)

f) Explain the working of “File Transfer Protocol” with a neat diagram.


(Working - 3 Marks, Diagram 1 Mark)
Ans: FTP is a stranded mechanism provided by the Internet for copying a file from one host to the
other.

1. Some of the problem in transferring files from one system to the other are as follows:

Two systems may use different file name conventions.

Two systems may represent text data in different types.

The directory structure of the two systems may be different.

2. FTP provides a simple solution to all these problems.

3. The basic model of FTP is shown

4. FTP established two connections between the client and server. One is for data transfer and
the other is for the control information.

5. The fact that FTP separates control and data makes it very efficient.

6. The control connection uses simple rules of communication. Only one line of command or a
line of response is transferred at a time.

Page 19 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
7. But the data connection uses more complex rules due to the variety of data types being
transferred.

8. FTP uses port 21 for the control connection and port 20 for the data connection.

9. As shown in the figure client has three components namely:

i. User interface

ii. Control process and

iii. Data transfer process.

10. The Server has two components: the control process and data transfer process.

11. The control connection is maintained during the entire interactive FTP session. The data
connection is first opened, file is transferred and data connection is closed. This is closed.
This is done for transferring each file.

Fig. Basic Model Of FTP

Control connection:

This connection is created in the same way as the other application programs
described earlier.

Control connection remains alive during the entire process.

The IP uses minimize delay type services because this is an interactive connection
between a user and server.

Data Connection:

Page 20 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Data connection uses the port 20 at the site. This connection is opened when data
to be transferred is ready and it is closed when transfer of data is over.

The service types used by IP is maximize throughput.

4. Attempt any FOUR of the following: Marks 16


a) Describe TCP used in computer communication.
(Any 4 Services/ Relevant explanation – 1 Mark each)
Ans: Following are some of the services offered by TCP to the process at the application layer:
1. Stream delivery service
2. Sending and receiving buffers
3. Bytes and segments
4. Full duplex service
5. Connection oriented service
6. Reliable service.
7. Process to process communication

1. Stream delivery service:


TCP is a stream oriented protocol. It allows the sending process to deliver data as a stream of
bytes and the receiving process to obtain as a stream of bytes.
TCP creates a working environment in such a way that the sending and receiving processes
seem to be connected by an imaginary “tube”
This is called as stream delivery service.
2. Sending and receiving buffers:
The sending and receiving process may not produce and receive data at the same speed.
Hence TCP needs buffers for storage. There are two types of buffers used in each direction:
1) Sending buffer
2) Receiving buffer.
A buffer can be implemented by using a circular array of 1 byte locations as shown
The movement of data in one direction on the sending side the buffer has there types of
locations:

Page 21 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

1. Empty Locations
2. Location containing the bytes which have been sent but not acknowledgement. These
bytes are kept in the buffer till an acknowledgement is received.
3. The locations containing the bytes to be sent by the sending TCP.
3. Bytes and segments:
Buffering is used to handle the difference between the speed of data transmission and
data consumption.
But only buffering is not enough. We need one more step before sending the data.
The IP layer, as a service provider for TCP, need to send data in the form of packets and
as a stream of bytes.
At the transport layer, TCP groups a number of bytes together into a packet called a
segment.
A header is added to each segment for the purpose of exercising control.
The segments are encapsulated in an IP datagram and then transmitted. The entire
operation is transparent to the receiving process.
The segments may be receiver out of order, lost or corrupted when it reaches the
receiving end.
4. Full duplex service:
TCP offers full duplex service where the data can flow in both the direction simultaneously.
Each TCP will then have a sending buffer and receiving buffer.
The TCP segments are sent both the directions.
5. Connection oriented service:
TCP is a connection oriented protocol. When process –I wants to communicate (send and
receive) with another process (process-2), the sequence of operations is as follows:
TCP of process -1 informs TCP of process -2 and gets its approval.
TCP of process -1 and TCP of process -2 exchange data in both the directions.
After completing the data exchange, when buffers on both sides are empty, the two TCPs
destroy their buffers.

Page 22 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

1. The type of connection in TCP is not physical, it is virtual. The TCP segment is encapsulated
in an IP datagram and can be sent out of order.
2. These segments can get lost or corrupted and have to be resent.
3. Each segment may take a different path to reach the destination.
6. Reliable services:
TCP is a reliable transport protocol. It uses an acknowledgment mechanism for checking
the safe and sound arrival of data.
7. Process to process communication:
The TCP user port numbers a transport layer addresses.
Show some well known port number used by TCP.
Note that if an application can use both UDP and TCP, the same port number is assigned to this
application.

b) Computer IPv4 and IPv6 (four points).


(Any four points -1 Mark each)

Ans:
IPv4 IPv6
Source and destination addresses are Source and destination addresses are 128
32 bits (4 bytes) in length. bits (16 bytes) in length. For more
information.
Uses broadcast addresses to send There are no IPv6 broadcast addresses.
traffic to all nodes on a subnet. Instead, multicast scoped addresses are
used.
Fragmentation is supported at Fragmentation is not supported at routers.
originating hosts and intermediate It is only supported at the originating host.
routers.
IP header includes a checksum. IP header does not include a checksum.
IP header includes options. All optional data is moved to IPv6
extension headers.

Page 23 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
IPSec support is optional. IPSec support is required in a full IPv6
implementation.
No identification of payload for QOS Payload identification for QOS handling
handling by routers is present within by routers is included in the IPv6 header
the IPv4 header. using the Flow Label field...
Addresses must be configured either Addresses can be automatically assigned
manually or through DHCP. using stateless address auto configuration,
assigned using DHCPv6, or manually
configured.
Uses host address (A) resource records Uses host address (AAAA) resource
in the Domain Name System (DNS) to records in the Domain Name System
map host names to IPv4 addresses. (DNS) to map host names to IPv6
addresses.

c) Explain handoff procedure of cellular mobile phone.


(Handoff Procedure -2 Marks, Types of Handoff – 2 Marks)

Ans: Assume that there is a call going on between two parties over a voice channel.

When the mobile unit moves out of coverage area of a particular cell site the reception becomes
weak.

Then the cell site will request a hand off.

The system will switch the call to a new cell site without interrupting the call or changing the
user. This procedure is called as the hand off procedure or handover procedure.

Following are various types of handoffs. Supported by a Mobile Station (MS):

1. Hard Hand Off

2. Soft Hand off

3. Queued hand off

4. Delayed hand off

5. Forced hand off

Page 24 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

1. Hard hand off:

A hard handoff is a handoff technique used with cellular networks that requires the user's
connection to be entirely broken with an existing base station before being switched to
another base station.

2. Soft hand off:

The hand off is known as soft handoff if the MS starts communication with a new base station
without stopping the communication with the older base station.

3. Delayed Hand off:

In many situations, instead of one level, a two level handoff procedure is used, in order to
provide a high opportunity for a successful handoff. A hand off can be delayed if on available
cell take the call.

4. Forced handoff :

A forced handoff is defined as the off which would normally occur but prevented from
happening or a handoff that should not occur but is forced to happen.

5. Queued handoff:

In the queued handoff process, the MTSO arranges the handoff requests in a queue instead of
rejecting them, if the new cell sites are busy.

d) Describe meaning and function of:


i) MAC address
ii) IP address

(MAC address explanation- 1 Mark, Example- 1 Mark)


Ans: i) MAC Address:
The MAC address is a unique value associated with a network adapter. MAC addresses are also
known as hardware addresses or physical addresses. They uniquely identify an adapter on a
LAN.
MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC
addresses are usually written in one of the following two formats:

Page 25 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

MM:MM:MM:SS:SS:SS

MM-MM-MM-SS-SS-SS
The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs
are regulated by an Internet standards body (see sidebar). The second half of a MAC address
represents the serial number assigned to the adapter by the manufacturer.
Example,
00:A0:C9:14:C8:29

ii) IP Address:
(IP address Explanation -1 Mark, Example – 1 Mark)
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network interface
identification and location addressing. Its role has been characterized as follows: "A name
indicates what we seek. An address indicates where it is. A route indicates how to get there."

1. The IP address consists of two parts namely a network identifier and a host identifier.
2. All the computers on a particular subnet will have the same network identifier but different
host identifiers
3. The internet Assigned Number Authority (IANA) assigns network identifiers to avoid any
duplication of addresses.
4. An IPv4 address consists of two parts. The first part of the of the address, called the network
number, identifies a network on the internet; the remainder, called the host ID, identifies an
individual host on that network.

Classful Addressing:
The IPv4 addresses are classified into 5 types as follows:
1. Class A
2. Class B

Page 26 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

3. Class C
4. Class D
5. Class E

e) What are the services provided by the network layer of OSI model.
(Any 4 Services – 1 Mark each)

Ans: The services provided by the network layer of OSI model as follows
1. To route the signals through various channels to the other end.
2. To act as the network controller by deciding which route data should take.
3. To divide the outgoing messages into packets and to assemble incoming packets into
messages for the higher levels.
4. The network layer is responsible for the source-to-destination delivery of a packet, possibly
across multiple networks (links)
5. Logical addressing: The physical addressing implemented by the data link layer handles the
addressing problem locally. If a packet passes the network boundary, we need another
addressing system to help distinguish the source and destination systems. The network layer
adds a header to the packet coming from the upper layer that, among other things, includes
the logical addresses of the sender and receiver.

f) Describe in brief:
i) Backing up data
ii) File sharing

Ans: i) Backing up data (Explanation - 2 Marks)

The process of data backup, data from computer system is copied from the disk to some other
medium for keeping it safe.

Such backups are important because it protects the data against any unpredictable, Accidental loss
of data due to system failure, computer viruses, or human error.

But taking a backup of individual user’s data separately is a time consuming and unorganized.

Hence in a network, the users first save their important data on the central server and then the
backup can be taken from the server itself.

Page 27 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

This reduces the time and stores the backup data at a signal place only. This makes the data
retrieval easy.

We can have two or three sets of the entire backup data. This help in the event of one or two sets
getting corrupt. The Duplication of backup data becomes easily possible due to centralization
storage.

The centralization back up procedures have become easy now a day due to the advanced
technology.

There are two basic network backup strategies:


1. Isolated
2. Centralized

The operating system will provide tools required for data backups. For example windows NT
proves a tape backup program called as backup.
Some backup Policies are as follows:
1. Full Backup.
2. Incremental Backup.
3. Differential Backup.

ii) File sharing:


(Explanation - 2 Marks)

File sharing is the primary feature of network. Due to use of networks the sharing of files
becomes easier.
File sharing requires a shared director or disk drive to which many users can access over the
network; more than one person can make changes to a file at the same time. They might both
making conflicting change simultaneously.

Hence most of software programs don’t have ability to allow multiple changes to a single file at
the same time to resolve this type of problem that might arise.

Page 28 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Network operating systems that perform file sharing also administer the security of these shared
files and what kind of access they have. For example: Some user might have permission to view
only certain shared files, while other have permission to edit or even delete certain shared files.
Advantages:

1. Easily share information on networking.


2. User needs regular access of word processing files. Spreadsheets so they access easily.

Disadvantages:
1. Conflicting problem arises.
2. Less secure if permission not set proper.

5. Attempt any FOUR of the following: Marks 16


a) Which layer of OSI model packages raw data bit. Describe bit stuffing with one example.
(Identification of Data link layer - 1 Mark, bit stuffing- 2 Marks, Example- 1 Mark)
Ans: Data link layer of OSI model packages raw data bit.

Bit stuffing:

Bit stuffing is the process of adding one extra 0 whenever five consecutive 1‟s in the data, so
that the receiver does not mistake the pattern 0111110 or a flag.

At sender side the bit is stuffed and at receiver side stuffed bit is removed. As shown in following

Page 29 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

For example
Stuffed Bit

Sequence 011111111000 becomes 0111110111000.

This extra bit is inserted regardless of sixth bit 0 or 1.

b) In which circumstances star topology is preferred mostly. Name the centralized device used
in star topology. Give its two advantages over Hub.
(List of circumstances - 1 Mark, Name of device - 1 Mark, Any Two advantages- 2 Marks)
Ans: star topology is preferred under following circumstances
1) When centralized management of nodes is required
2) There are more chances of adding or removing nodes in the network.
3) When there is a need of robust network. If one link fail only that node is affected.
Switch is the centralized device used in star topology.
Switch has following advantages over HUB
1) Switch is point to point networking device because switch send data to only destination node
2) Switch is intelligent device because it understands MAC address.

Page 30 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

3)Switch works at Data link layer of OSI model, where as Hub works at Physical Layer of OSI
model.
4) Switch gives full speed to all connected node, where as Hub Distributes the speed to the all
connected nodes.
c) Describe OSI model with layer structure.
(Diagram - 1 Mark, Explanation - 3 Marks)
Ans: OSI model (open system interconnection) model was developed by ISO (international standard
organization)
Function of OSI model
1) It provides way to understand how internetwork operates.
2) It gives guideline for creating network standard.
OSI model has 7 layers as shown in the figure.

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Datalink Layer

Physical Layer

Fig: OSI Reference model.

OSI model has following 7 layers as Physical layer, data link layer, Network layer, Transport
layer, session layer, presentation layer, application layer.

1) Physical layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It deals with mechanical and electrical specifications of interface and transmission
medium. For transmission it defines procedures and functions that devices and transmission
medium has to perform.

Page 31 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Physical characteristics of interfaces and media.


Representation of bits: Data rate(transmission rate).
Synchronization of bits.
Line configuration: Point to point or multipoint configuration should be used.

2) Data link layer:

It is responsible for transmitting group of bits between the adjacent nodes. The group of bits is
called as frame. The network layer passes a data unit to the data link layer. Header and trailer is
added to the data unit by data link layer. This data unit is passed to the physical layer.

Data link layer is responsible for moving frames from one node to the next.

Functions of data link layer are:

1) Framing
2) Physical addressing
3) Flow control
4) Error control
5) Media access control
6) Node to node delivery

3) Network layer:

It is responsible for routing the packets within the subnet i.e. from source to destination. It is
responsible for source e to destination delivery of individual packets across multiple networks.
It ensures that packet is delivered from point of origin to destination.

Functions of network layer:


1) logical addressing
2) Routing.
3) Congestion control
4) Accounting and billing
5) Address transformation
6) Source host to destination host error free delivery of packet.

Page 32 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

4) Transport layer:
Responsibility of process to process delivery of message
Ensure that whole message arrives in order.
1) Service point addressing
2) Segmentation and reassembly
3) Connection control
4) Flow control: Flow control is performed end to end

5) Error control

5) Session layer:
Establishes, maintains, synchronizes the interaction among communication systems
It is responsible for dialog control and synchronization
1) Dialog control
2) Synchronization, session and sub session
3) Session closure
6) Presentation layer: It is concerned with syntax, semantics of information exchanged
between the two systems.
Functions: Translation, encryption, compression
7) Application layer: It enables user to access the network. It provides user interfaces and
support for services like email, remote file access.
Functions: network virtual terminal, file transfer access and management, mail services and
directory services

d) Explain the working of “TELNET”


(Explanation - 4 Marks)
Ans: TELNET
TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual
terminal services proposed by ISO. TELNET enables establishment of connection to a remote
system in such a way that a local terminal appears to be terminal at remote system.
TELNET is general purpose client server application program.

Page 33 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Local Login
When user log in to local time sharing system it is called local login. The keystrokes accepted by
terminal driver. Terminal driver passes the character to the operating system. Operating system, in
tern interprets the combination of character and invoke the desired application or utility.

Remote login
When user wants to access the application or utility located at the remote machine ,he or she
performs remote login. Here the telnet client and server program come into use.
The user sends the keystrokes to local operating system. local operating system accept is, but do
not interpret them. The characters are send to TELNET client. TELNET client transform the
character to a universal character set called Network Virtual Terminal Character and deliver them
to the local TCP/IP stack.

Page 34 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

As shown in above figure the command/text in NVT form travel through internet, and arrive at
TCP/IP stack of remote Machine. Here the characters are delivered to the operating system and
Passed to the TELNET server. Which changes the characters to the understandable characters by
the remote computer. However characters could not directly pass to the operating system because
remote operating system is not designed to receive characters from TELNET server. The solution
is to add piece of software called Pseudo- terminal driver, which pretends that characters are
coming from terminal. The operating system passes the characters to appropriate application
program.

e) Which different classes are used for IP addressing. Describe each in brief.
(Listing of classes - 1 Mark, Explanation - 3 Marks)
Ans: IP Address is classified into 5 types as

Class A

Class B

Class C

Class D

Class E

Page 35 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Class A format

In this 7bits are used for network field and 24 bits for host field.
Class A IP address range includes 1.0.0.0 to 127.255.255.255
Class B format

In this 14 bits are used for network field and 16 bits for host field.
Class B IP address range includes 128.0.0.0 to 191.255.255.255
Class C format

In this 21 bits are used for network field and 8 bits for host field.
Class C IP address range includes 192.0.0.0 to 223.255.255.255
Class D format

Page 36 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Class D IP address is used for multicasting


Class D IP address range includes 224.0.0.0 to 239.255.255.255

Class E format

Class E IP address are reserved for future use.


Class E IP address range includes 240.0.0.0 to 255.255.255.255

f) Describe the role of following network device used in computer network


i) Gateway
ii) Router
iii) Hub
iv) Switch
(Each -1 Mark)
Ans: 1) Gateway
Gateway is protocol converter.
Gateway enables communication between different network architecture and environments.
Gateway connects two systems that do not use the same protocol, data format, language and
architecture.
It works at all layers of OSI model.
Convert commonly used protocols (e.g. TCP/IP) to a specialized protocol (for example, an
SNA: System Network Architecture).
Convert message formats from one format to another.
Translate different addressing schemes

2) Router
Router chooses the best path for packet forwarding.
Router read complex network address in packet.
It works at Network Layer of OSI model

Page 37 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Efficiently direct packets from one network to another, reducing excessive traffic.
Join neighboring or distant network
Connect dissimilar networks.
Prevent network bottlenecks by isolating portions of a network.
3) Hub
Hub connects all nodes in star topology. Hub is broadcasting device.
It sends packets to all nodes in the network.
It works at Physical Layer Of OSI model

4) Switch
Switch connects all nodes in star topology.
Switch is point to point networking device.
Switch sends packets only to destination node.
It works at Data link layer of OSI model

6. Attempt any TWO of the following: Marks 16


a) Describe TCP/IP with neat sketch. Compare TCP/IP and OSI reference model.
(TCP/IP model digram-2 Marks, explanation 2 Marks, Comparison of TCP/IP with OSI model
any 4 points - 4 Marks)
Ans: TCP/IP Model
Application Layer

Transport Layer

Internet Layer

Network access Layer


( Host to Network
Layer )

Page 38 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

TCP/IP Model contains following layer.


1) Network Access Layer
It defines characteristics of transmission media.
It also concern with delivery of data when two systems are attached to same network.
2) Internet Layer –
This layer permits host to inject packets into network and packet travels independently to
destination.
This layer defines packet format and protocol called IP (internet Protocol)
3) Transport Layer -
It has TCP and UDP
TCP (transmission control protocol) –it is Reliable & connection oriented protocol.
UDP (User Datagram Protocol)- it is Unreliable & connectionless protocol.
4) Application Layer -
It includes virtual Terminal (TELNET), file transfer Protocol (FTP), simple Mail Transfer
Protocol (SMTP) and other protocols like HTTP, WWW, DNS.

Comparison of TCP/IP model with OSI model.

Sr.No. TCP/IP MODEL OSI MODEL

1 It has 4 layers It has 7 layers

2 Function of presentation layer are It has separate presentation layer


performed by application layer

3 Function of session layer are performed It has separate session layer


by transport layer

4 Transport layer supports both Transport layer support only connection


connection oriented and connection less oriented services.
services.

5 It is difficult to add a new protocol in Adding a new protocol is easy.


existing protocol stack.

Page 39 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
6 Network layer supports only Network layer support both connection
connectionless service oriented and connection less service

7 It is used as internet standard . It is generic protocol independent


standard.
It describe protocols widely used
around internet. It describes general protocols

8 TCP/IP model not clearly distinguish OSI model clearly distinguish between
between services, interface and services, interface and protocol.
protocols

9 Diagram of TCP/IP Model Diagram of OSI model

Application Layer Application Layer


Transport Layer Presentation Layer
Internet Layer Session Layer
Network access
Layer Transport Layer
( Host to Network
Network Layer
Layer )
Datalink Layer

Physical Layer

b) Describe any two connectionless and connection oriented protocols.


(Any 2 Connectionless protocol- 4 Marks, Any 2 connection oriented protocols - 4 Marks)
Ans: Connectionless protocols:
1) IP
2) ICMP
3) UDP
IP
IP is internet Protocol.
It is unreliable protocol because it does not provide any error control and flow control.
Packets in IP are called “Datagram”

Page 40 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Datagram is variable length packet with two parts –header and data

ICMP
It is internet control message protocol.
It reports error and sends control messages.
Error reporting messages include – destination unreachable, source quench , time exceed,
parameter problem , redirection etc.
Query message includes –echo request and reply, time stamp request and reply, router
solicitation and advertisement. etc

UDP
UDP is user datagram protocol.
It is connectionless protocol because data is sent without establishing a connection between
sender and receiver before sending the data.
UDP is unreliable because data is delivered without acknowledgement.
UDP does not perform Auto retransmission.
UDP does not use flow control .
UDP has high transmission speed.

Connection oriented protocol:


1) TCP
2) SLIP
3) PPP
4) SMTP
TCP
TCP is transmission control protocol.
It is connection oriented protocol because connection must be establish prior to transmission of
data.
TCP is reliable protocol because data is delivered with acknowledgement.
TCP perform Auto Retransmission if the data is lost.
TCP use flow control.

Page 41 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
TCP has low speed of transmission.

SLIP
SLIP is serial line internet protocol
SLIP does not perform error detection and correction.
SLIP does not provide any authentication.
SLIP is not approved internet standard.
SLIP supports only Internet protocol (IP)
SLIP supports static IP address assignment

PPP
PPP is point to point protocol.
PPP perform error detection
PPP provides authentication and security.
PPP is approved internet standard.
PPP supports IP and other protocols.
PPP supports Dynamic IP address assignment

SMTP

SMTP is simple mail transfer protocol.


It is connection oriented text based protocol in which sender communicates with receiver using
a command and supplying data over reliable TCP connection.
SMTP is standard application layer protocol for delivery of email over TCP/IP network.
SMTP establish a TCP connection between Sender And port number 25 of receiver

Page 42 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

c) Explain following wireless technologies used in computer communication:


i) Wi-Fi
ii) Bluetooth
(WiFi diagram - 1 Mark, Explanation- 3 Marks, Bluetooth diagram – 2 Marks, Explanation 2
Marks)
Ans: i) Wi-Fi
Wi-Fi stands for wireless fidelity.
Wi-Fi provide data rate of 54 Mbps.
Wi-Fi based on IEEE 802.11 standard.

Advantages
1) Easy to use.
2) Easy and simple to expandability.
3) Easy to install and setup.
4) No requirement of wires

Page 43 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Disadvantage
1) The range of Wi-Fi is limited
2) Security is less in Wi-Fi connections as compared with others.
3) Wi-Fi connections are highly suspect able interruption by other devices which are operating
in close proximity.
ii) Bluetooth
Bluetooth is short range wireless technology.
Range of bluetooth is 10 meters.
Bluetooth Architeture define 2 types of networks.
1)piconet 2)scatternet

Piconet
It consist of 1 master node and 7 slave nodes.
Piconet have 8 active nodes(7+1) in the range of 10 meters.
There can be only 1 master station in each piconet.
Communication is between master and slave
Slave-slave communication is not possible.
Piconet can have 255 parked nodes, that can not take part in communication
There will be 7 slaves in active state and 255 nodes in parked state.

Fig :piconet

Page 44 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________

Scatter net
It is formed by combining various piconets.
Slave in one piconet can act as master in other piconet.
Such a node can receive message from the master in the first piconet and deliver the message
in second piconet.
Station can be member of two piconets.
Staion can not be master of two piconet.

Fig: Scatternet

Page 45 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in
the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try
to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills).
4) While assessing figures, examiner may give credit for principal components indicated in the
Figure. The figures drawn by candidate and model answer may vary. The examiner may give
Credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
Constant values may vary and there may be some difference in the candidate’s answers and
model answer.
6) In case of some questions credit may be given by judgment on part of examiner of relevant
answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.

1. a) Attempt any SIX of the following: Marks 12

i) List advantages of Computer Network.


(Any two Advantages - 1 Mark each)
Ans:
1) Resource Sharing
2) Reducing cost
3) High Reliability
4) Improved security
5) Centralized management.
6) E-mail
7) Flexible access.

Page 1 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

ii) Define the following


1) Protocol
2) Peer

(Definition - 1Mark each)


Ans:
a) Protocol: - It is set of rules and conventions .Sender and receiver in data communication
must agree on common set of rules before they can communicate with each other.
OR
Protocol is a system of digital message formats and rules for exchanging those messages in or
between computing systems.

Protocol defines.
a) Syntax (what is to be communicated)
b) Semantics (how is it to be communicated
c) Timing (When it should be communicated)

b) Peer: Peers are computer systems which are connected to each other via the Internet. Files
can be shared directly between systems on the network without the need of a central server. In
other words, each computer on a Peer to Peer network becomes a file server as well as a
client.

iii) List types of network topology. Name one device used in star topology.
(Network Topology- 1 Mark, Device Used- 1 Mark)
Ans:
Network Topology refers to layout of a network. How different nodes in a network are
connected to each other and how they communicate is determined by the network's topology.
Types of Network Topology
1. Mesh Topology
2. Bus Topology
3. Star Topology
4. Ring Topology
5. Tree Topology
6. Hybrid Topology
Device used in STAR Topology: Switch, Hub

Page 2 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

iv) What is hub? Give types of hub.


(Definition of hub -1Mark, types of hubs- 1Mark)

Ans:
HUB: Hub is amplifying & splitting device. Hub contains multiple ports & is a common
connection point for connecting all segments of a LAN. When a packet arrives on a port, it is
forwarded to rest of ports so that it can be sent to all other nodes in the network.
Types of Hub:-
1. Active Hub
2. Passive Hub
3. Intelligent hub

v) Define guided media. List the types of guided media.


(Definition - 1Mark, list types of guided media - 1Mark)
Ans:
Guided Media: Guided media are wired media, Electrical/Optical signals are passed through
a solid medium (different types of cables/wires) as the path traversed by the signals is guided
by shape and length of the wire, this type of media is called guided media. In Guided media,
the signals are confined within the wire and do not propagate outside of the wire/media.

Types of Guided Media:


1. Copper Unshielded Twisted Pair (UTP),
2. Copper Shielded Twisted Pair (STP),
3. Co-axial cables
4. Fiber Optic Cables.

vi) Name the layer which is associated with the transmission media.
(Naming the Layer - 2 Marks)
Ans:
Physical Layer: Transmission media operate at Layer 1 (Physical Layer) of the OSI model, it
encompass the physical entity and describe the types of medium on which voice and data can
travel.
Physical Layer is associated in two ways with transmission medium.
1. Guided(wired) media
E.g. Coaxial Cable, Fiber-optic Cable

Page 3 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

2. Unguided (Wireless) Media


E.g. Radio Frequencies, Microwave, Satellite, and Infrared.

vii) Define connection oriented protocol.


(Definition -2 Marks)

Ans:
Connection-oriented protocol service is sometimes called a "reliable" network service,
because it guarantees that data will arrive in the proper sequence.
Connection-oriented describes a means of transmitting data in which the devices at the end
points use a preliminary protocol to establish an end-to-end connection before any data is sent.
Example: Transmission Control Protocol (TCP) is a connection-oriented protocol.

viii) List two DHCP protocols


(Listing any Two Protocols -1 Mark each)
Ans:
1. ARP
2. RARP
3. IP
4. BOOTP

b) Attempt any TWO of the following: Marks 08

(i) State the reason for implementing a network these key resources often shared on a
network
(Reason -1 Mark, Any 3 key Resources - 1 Mark each)
Ans:

A primary reason for implementing a network is to share resources.


Resources: There are many resources to be shared on a network, they are as listed below.
1. Printers
2. Scanners
3. Applications
4. Files
5. Network access to the World Wide Web.

Page 4 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(ii) Draw with neat labelled sketch of star networks having three computers in two stars and
two computers in one star.

(Correct Diagram - 4 Marks)


Ans:

Fig: Star Bus Topology

(iii) Explain the SLIP protocol.


(Explanation - 4 Marks)
Ans:
SLIP

1. Serial Line Protocol is an encapsulation of the Internet Protocol designed to work over
serial ports and modem connections.
2. This packet-framing protocol and defines a sequence of bytes that frame IP packets on a
serial line.
3. SLIP is commonly used for point-to-point serial connections running TCP/IP
4. It is designed to transmit signals over a serial connection and has very low overhead.

Page 5 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

5. SLIP is serial line internet protocol


6. SLIP does not perform error detection and correction.
7. SLIP does not provide any authentication.
8. SLIP is not approved internet standard.
9. SLIP supports static IP address assignment

2. Attempt Any FOUR of the following Marks 16

a) If you have two computers to connect to a network located over a long distance over 100
KM, which type of transmission you will used? Justify your answer by describing its
features.
(Naming Transmission medium - 2 Marks, Features - 2 Marks)
Ans:
You can connect two computers over the Internet (Wide Area Network)
Features of Internet:
1. World Wide Web.
2. E-mail.
3. News
4. Telnet
5. File Transfer Protocol (FTP)
6. Internet Relay Chat (IRC)
The World Wide Web
E-mail
Electronic mail (e-mail) is the most popular reason people use the Internet.
To create, send, and receive e-mail messages you need an e-mail program and an
account on an Internet mail server with a domain name.
To use e-mail, a user must have an e-mail address, which you create by adding your
user name to the e-mail create by adding your user name to the e-mail server’s domain
name, as in [email protected].

News:
One Internet based service called news, includes tens of thousands of newsgroups.
Each newsgroup hosts discussions on a specific topic. A newsgroup a some indicated its
user’s special topic of interest, such as Food cake.
To participate in a newsgroup, you need a news-reader program that lets you read
articles that have been posted on a news server. You can post articles for others to read and
respond to.

Page 6 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Telnet
Telnet is a specialized service that lets you use one computer to access the contents of
another computer a telnet host.
A telnet program creates a “Window” into the host so you can access files, issue
commands, and exchange data.
Telnet is widely used by libraries to allow visitors to look up information, find articles
and so on.

File transfer protocol


File Transfer protocol (FTP) is the internet tool used to copy files from one computer to
another.
Using a special FTP program or a web browser, you can log into an ETP host Computer
over the internet and copy files on to your computer.
FTP is handy for finding and copying software files, articles and other types of data.
Universities and software companies use FTP servers to provide visitors with access to data.
Internet Relay chat (IRC)
Internet Relay chat (IRC) is a service that allows users to communicate in real time by
typing text in a special window.
Like news, there are hundreds of IRC “channel” each devoted to a subject or user group.
You can use a special IRC program to participate in chat room discussions but many
chat rooms are set up in web sites, enabling visitors to chat directly in their browser
window.

b) Explain horizontal communication and vertical communication.


(Horizontal Comm. - 2 Marks, Vertical Comm. - 2 Marks)
Ans:
Horizontal communications
The horizontal communication between the different layers is logical; there is no direct
communication between them. Information included in each protocol header by the
transmitting system is message that will be carried to the same protocol in the destination
system.
For two computers to communicate over a network, the protocols used at each layer of the
OSI model in the transmitting system must be duplicated at the receiving system.
The packet travels up through the protocol stack and each successive header is stripped off
by the appropriate protocol and processed.
When the packet arrives as it destination, the process by which the headers are applied at
the source is respected in reverse.
The protocol operating at the various layers communicate horizontally with their
counterparts in the other system, as shown in below fig.

Page 7 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Fig: Horizontal communications

Vertical Communications
In addition to communicating horizontally with the same protocol in the other system, the
header information also enables each layer to communicate with the layer above and below it.
The headers applied by the different protocols implemented the specific functions carried
out by those protocols.
For Example: When a system receives a packets and passes it up through the protocol
stack, the data link layer protocol header includes afield that identifies which network-layer
protocol the system should use to process the packet.
Network –layer protocol header in tern specifies one of the transport-layer protocols and
the transport-layer protocol identifies the application for which the data is ultimately destined.
Vertical communication makes it possible for a computer to support multiple protocols at
each of the layers simultaneously.

Page 8 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

c) You are said to establish a small network with minimum cost at least ten computer and also
necessary to use the centralized database. Which type of network and topology you will
prefer in this situation? Justify your answer.
(Identification of type of network – 1 Mark, its justification – 1 Mark, Identification of
Topology – 1Mark, its justification -1 Mark)
Ans:
Type of Network- Client-Server Network.
Justification- For the mention situation client Server network is preferred because centralized
database can be maintained at server.
Type of Topology- Bus Topology.
Justification -For the mention situation Bus Topology is preferred because cost is less due to
short cable length, no need of HUB, simple wiring layout. Bus topology can support 10
computers and additional nodes can be easily added to existing bus network

Page 9 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

d) Explain RARP and BOOTP.


(Explanation - 2 Marks For Each Protocol)
Ans:
RARP: The Reverse Address Resolution Protocol (RARP) is an obsolete computer
networking protocol used by a client computer to request its Internet Protocol (IPv4) address
from a computer network, when all it has available is its Link Layer or hardware address, such
as a MAC address. The client broadcasts the request, and does not need prior knowledge of
the network topology or the identities of servers capable of fulfilling its request.
RARP is described in Internet Engineering Task Force (IETF) publication RFC 903. RARP
requires one or more server hosts to maintain a database of mappings of Link Layer addresses
to their respective protocol addresses. Media Access Control (MAC) addresses needed to be
individually configured on the servers by an administrator. RARP was limited to serving
only IP addresses. Reverse ARP differs from the Inverse Address Resolution Protocol
(InARP) described in RFC 2390, which is designed to obtain the IP address associated with a
local Frame Relay data link connection identifier. InARP is not used in Ethernet.
BOOTP: The Bootstrap Protocol (BOOTP) is a computer networking protocol used
in Internet Protocol networks to automatically assign an IP address to network devices from a
configuration server. The BOOTP was originally defined in RFC 951. When a computer that
is connected to a network is powered up and boots its operating system, the system software
broadcasts BOOTP messages onto the network to request an IP address assignment. A
BOOTP configuration server assigns an IP address based on the request from a pool of
addresses configured by an administrator.
BOOTP is implemented using the User Datagram Protocol (UDP) as transport protocol, port
number 67 is used by the server to receive client requests and port number 68 is used by the
client to receive server responses. BOOTP operates only on IPv4networks.

e) What is MAC addresss? How it is located?


(MAC address - 2 Marks, Locating of MAC - 2 Mark)
Ans:
MAC (Media access control address)
MAC address is a unique id associated with the network adapter (NIC) and it uniquely
identifies an adapter on a LAN or internet.
Media Access Control (MAC) address is a binary number used to uniquely identify
computer network adapters. These numbers (sometimes called "hardware addresses" or

Page 10 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

"physical addresses") are embedded into the network hardware during the manufacturing
process, or stored in firmware, and designed to not be modified.
MAC addresses are 12-digit (6 bytes or 48 bits) hexadecimal numbers. By convention, they
are usually written in one of the following three formats:
a. MM:MM:MM:SS:SS:SS
b. MM-MM-MM-SS-SS-SS
c. MMM.MMM.SSS.SSS
The leftmost 6 digits (24 bits) called a "prefix" is associated with the adapter manufacturer

Locating a MAC Address in Windows XP, Vista, NT 2000, 2003,7, 8, 10.


1. Click the Start button, select Run.
2. Type CMD and click OK.
3. In Command prompt, Type ipconfig/all and press Enter. ...
4. MAC address (Physical Address) will be displayed in the Ethernet Adapter Local Area
Connection section.

f) Describe any four physical characteristics of fiber optic cable.


(Any Four physical characteristics - 1 Mark each)
Ans:
1. Core - Thin glass center of the fiber where the light travels.
2. Cladding - Outer optical material surrounding the core that reflects the light back into the
core.
3. Buffer coating - Plastic coating that protects the fiber from damage and moisture.
Hundreds or thousands of these optical fibers are arranged in bundles in optical cables. The
bundles are protected by the cable's outer covering, called a jacket.
4. Strengthening fibers: These components help protect the core against crushing forces and
exercise tension during installation.
5. Cable jacket: This is the outer layer of any cable. Most fiber optic cables have an orange
jacket, although some types can have black or yellow jackets

Optical fibers come in two types:


Single-mode fibers - Used to transmit one signal per fiber (used in telephones and cable TV)
Multi-mode fibers - Used to transmit many signals per fiber (used in computer networks, local
area networks)
Some optical fibers can be made from plastic. These fibers have a large core (0.04 inches or 1
mm diameter) and transmit visible red light from LEDs.

Page 11 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

3. Attempt any FOUR of the following: Marks 16

a) Differentiate LAN and WAN by considering following points:

i. Physical area
ii. Installation cost
iii. Bandwidth
iv. Transmission media
(1Mark for each Parameter)

Ans:

Characteristics LAN WAN


Physical area Network within a Network spans a large
single building or geographical area after
campus of up to a few a country or continent
kilometers in size. 100 km …1000km
10 … 1 Km campus. country

Installation cost Less High


Bandwidth Bandwidth is low. Bandwidth is high.

Transmission Media Coaxial cable. PSTN or Satellite


links.

Page 12 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

b) State two advantages of ring topology. Describe token. State whether ring topology is
broadcast or point to point network.
(Any two Advantages - 2 Marks, definition of token - 1 Mark; ring topology is broadcast or
point to point - 1 Mark)

Ans:

Advantages of Ring Topology:


1. The adding or removing of network nodes is easy, as the process requires changing only
two connections.
2. The data being transmitted between two nodes passes through all the intermediate nodes.
A central server is not required for the management of this topology
3. Here, since the system provides point to point flow of data i.e. the data is moving in one
direction from one computer to another i.e. active topology, hence no collision occurs in the
system.
4. Cable faults are easily identified.
5. Dual loop rings can be easily effective.
6. Packet or data delivery is guaranteed.
7. Every computer is having equal priority.
Token: Token is a special three byte frame that travels around the ring network. It can flow
clockwise or anticlockwise.
Ring topology is a point to point network.

c) What are the different IP address classes? Explain any one in brief.
(Enlisting IP classes -1 Mark & Any one class Explanation - 3Marks)
Ans:
Different IP classes are:
i) Class A
ii) Class B
iii) Class C
iv) Class D
v) Class E
i)Class A
Class A addresses are assigned to networks with a very large number of hosts. The high-order
bit in a class A address is always set to zero. The next seven bits complete the network ID.
The remaining 24 bits (the last three octets) represent the host ID. This allows for 126

Page 13 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

networks and 16,777,214 hosts per network. Figure illustrates the structure of class A
addresses.

ii) Class B
Class B addresses are assigned to medium-sized to large-sized networks. The two high-order
bits in a class B address are always set to binary 1 0. The next 14 bits complete thenetwork
ID. The remaining 16 bits represent the host ID. This allows for 16,384 networks and 65,534
hosts per network. Figure illustrates the structure of class B addresses.

iii) Class C
Class C addresses are used for small networks. The three high-order bits in a class C address
are always set to binary 1 1 0. The next 21 bits complete the network ID. The remaining 8 bits
(last octet) represent the host ID. This allows for 2,097,152 networks and 254 hosts per
network. Figure illustrates the structure of class C addresses.

iv) Class D
Class D addresses are reserved for IP multicast addresses. The four high-order bits in a class
D address are always set to binary 1 1 1 0. The remaining bits are for the address that

Page 14 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

interested hosts recognize. Microsoft supports class D addresses for applications to multicast
data to multicast-capable hosts on an internetwork.
v) Class E
Class E is an experimental address that is reserved for future use. The high-order bits in a
class E address are set to 1111.

d) Explain the following terms with respect to presentation layer:


(i) Data encryption
(ii) Data compression
(Data Encryption Explanation - 2 Marks & Data Compression Explanations - 2Marks.)

Ans:

(i) Data Encryption


 For ensuring the security and privacy of the information that is being communicated, a
process is called data encryption.
 Data encryption is carried out at the sending signal. In this the sender transforms the
original information to another form and sends the transformed information.
 Data encryption ensures the security of the data as it travels down the protocol stack.
 For example, one of the most popular encryption schemes that is usually associated with
the presentation layer is the Secure Sockets Layer (SSL) protocol. Not all encryption is done
at layer however; some encryption is often done at lower layers in the protocol stack, in
technologies such as IPSec.
(ii) Data Compression
 The data compression technique is used for reducing the number of bits required to send
information.
 Compression improve the throughput of data
 Data compression is essential for transmission of multimedia such as text, audio, video..

Page 15 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

e) Compare ARP and RARP


(Any four points - 4 Marks)

Ans:

ARP RARP

ARP converts an Internet Protocol address to RARP converts Ethernet MAC address to IP
its physical network address (MAC). address.

ARP broadcast an IP address in an effort to RARP broadcast the System’s hardware


discover its equivalent hardware address. address.

Local host maintain the ARP Table. A RARP server maintain the RARP table.

RFC 826 describes ARP RFC 903 describes RARP

f) State the criteria for selecting transmission media.


(1/2 Marks for any eight factors)

Ans:

Criteria to be considered:
1. Type of medium.
2. No of conductors/connectors.
3. Flexibility.
4. Durability.
5. Bandwidth.
6. Reliability of connection
7. Required speed 8. Distance
9. Ease of installation and maintenance access
10. Technical expertise required to install and utilize
11. Resistance to internal EMI, cross talk of parallel wires
12. Resistance to external EMI outside the cable.
13. Attenuation characteristics
14. Cost

Page 16 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

4. Attempt any FOUR of the following: Marks 16


a) Compare cable and wireless transmission.
(Any four points - 4Marks.)

Ans:

Cable(Wired media) Wireless Media

Also called as bounded or wired media Also called as unbounded or wireless media
Point to point connection i.e. signal travelling Used for radio broadcasting in all directions
is directed i.e. signal travelling is undirected
Transport signal in electric current or light/ Transport signal in the form of
beam electromagnetic waves
Unidirectional, not broadcast Broadcast
Installation is costly and time consuming Installation needs less time and money
Wired media leads to discrete network Wireless media leads to continuous network
topologies topologies
Attenuation depends exponentially on the Attenuation is proportional to square of the
distance distance
Example: Twisted pair cable, coaxial cable, Example: Radio and Infrared Signals.
optical fiber cable

b) In a small agency, there are five PCs in the network. Cost is an issue and the company
would prefer not to dedicate an individuals time to maintain a network. However the
agency is also concerned about keeping its data safe and the users are not sophisticated
computer users. In what ways is a peer to peer network appropriate for the company? In
what ways it is inappropriate?
(Reasons for appropriate - 2 Marks & Reasons for Inappropriate - 2 Marks)

Ans:

A peer to peer to peer network appropriate due to following reasons:

Page 17 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

i) P2P is more reliable as central dependency is eliminated. Failure of one peer doesn’t affect
the functioning of other peers.
ii) There is no need for full-time System Administrator. Every user is the administrator of his
machine. User can control their shared resources.
iii) The over-all cost of building and maintaining this type of network is comparatively very
less.
iv) It does not run efficient if you have many computers, it is best to used two to eight
computers..
A peer to peer to peer network appropriate due to following reasons:
i) Security in this system is very less viruses, spywares, Trojans, etc malwares can easily
transmitted over this P-2-P architecture.
ii) In this network, the whole system is decentralized thus it is difficult to administer. That is
one person cannot determine the whole accessibility setting of whole network.

c) Explain satellite communication with the help of neat diagram.


(Diagram - 2 Marks & Explanation - 2 Marks)

Ans:

SATELLITE COMMUNICATION:

In satellite communication, signal transferring between the sender and receiver is done with
the help of satellite. In this process, the signal which is basically a beam of modulated
microwaves is sent towards the satellite called UPLINK (6 Ghz). Then the satellite amplifies
the signal and sent it back to the receiver’s antenna present on the earth’s surface called as
DOWNLINK (4Ghz), as shown in the diagram given

Page 18 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

As the entire signal transferring is happening in space. Thus this type of communication is
known as space communication. The satellite does the functions of an antenna and the
repeater together. If the earth along with its ground stations is revolving and the satellite is
stationery, the sending and receiving earth stations and the satellite can be out of sync over
time.
Therefore Geosynchronous satellites are used which move at same RPM as that of the earth in
the same direction.
So the relative position of the ground station with respect to the satellite never changes.
However 3 satellites are needed to cover earth’s surface entirely.

Page 19 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Frequency band used in satellite communication:


Band Downlink Uplink
C 3.7 to 4.2 Ghz 5.925 to 6.425Ghz
Ku 11.7 to 12.2 Ghz 14 to 14.5 Ghz
Ka 17.7 to 21 Ghz 27.5 to 31 Ghz

d) Describe the term subnet masking.


(Subnet masking Explanation -2 Marks & Example - 2 Marks)
Ans:
An IP address has two components, the network address and the host address. A subnet mask
separates the IP address into the network and host addresses. In Internet Protocol (IP)
networking, devices on a subnet share contiguous ranges of IP address numbers. A mask
(known as the subnet mask or network mask) defines the boundaries of an IP subnet. The
correspondence between subnet masks and IP address ranges follows defined mathematical
formulas. IT professionals use subnet calculators to map between masks and addresses.
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address into
network address and host address. Subnet Mask is made by setting network bits to all "1"s and
setting host bits to all "0"s. Within a given network, two host addresses are reserved for
special purpose, and cannot be assigned to hosts. The "0" address is assigned a network
address and "255" is assigned to a broadcast address, and they cannot be assigned to hosts.
Subnet masking for 2 subnet: To calculate the number of subnets or nodes, use the formula
(2n-2) where n = number of bits in either field, and 2n represents 2 raised to the nth power.
Multiplying the number of subnets by the number of nodes available per subnet gives you the
total number of nodes available for your class and subnet mask. Also, note that although
subnet masks with non-contiguous mask bits are allowed, they are not recommended.
Example: 10001100.10110011.11011100.11001000 140.179.220.200 IP Address
11111111.11111111.11000000.00000000 255.255.192.000 Subnet Mask
--------------------------------------------------------
10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address Hence
Subnet number Address
1 140.179.64.0
2 140.179.128.0

Page 20 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

e) Which of the following TCP/IP transport layers is faster? Justify your answer:
i. TCP
ii. IP
iii. UDP
(Explanation of TCP - 2Marks, IP - 1Mark, UDP - 1Mark)
Ans:
TCP
 TCP is transmission control protocol.
 It is connection oriented protocol because connection must be establish prior to
transmission of data.
 TCP is reliable protocol because data is delivered with acknowledgement.
 TCP perform Auto Retransmission if the data is lost.
 TCP use flow control.
 TCP has low speed of transmission.
 Features of TCP are: connection oriented, point to point communication, support duplex
mode.
IP:
 IP is internet Protocol.
 It is unreliable protocol because it does not provide any error control and flow control.
 Packets in IP are called “Datagram”
 Datagram is variable length packet with two parts –header and data.
 Features of IP are encapsulation, addressing, routing, fragmentation, protocol
identification.
UDP:
 UDP is user datagram protocol.
 It is connectionless protocol because data is sent without establishing a connection
between sender and receiver before sending the data.
 UDP is unreliable because data is delivered without acknowledgement.
 UDP does not perform Auto retransmission.
 UDP does not use flow control.
 UDP has high transmission speed.

Page 21 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

f) What do you mean by remote access?


(Explanation of Remote access - 2 Marks, Advantages - 1 Mark, Disadvantages - 1Mark)
Ans:
Remote access is the ability to get access to a computer or a network from a remote distance.
In corporations, people at branch offices, telecommuters, and people who are travelling may
need access to the corporation's network. Home users get access to the Internet through
remote access to an Internet service provider. Dial-up connection through desktop, notebook,
or handheld computer modem over regular telephone lines is a common method of remote
access. Remote access is also possible using a dedicated line between a computer or a remote
local area network and the "central" or main corporate local area network. A dedicated line is
more expensive and less flexible but offers faster data rates. Integrated Services Digital
Network is a common method of remote access from branch offices since it combines dial-up
with faster data rates.
Advantages:
1. It enables user access to centralized application, stored private or shared files on LAN.
2. User can access their files and emails from remote location.
Disadvantages:
1. Require more security
2. More hardware or complex hardware required.

5. Attempt any FOUR of the following: Marks 16

a) For following situations, state which type of network architecture is appropriate?


(i) Number of users 50
(ii) Data and resources need to be restricted.
(iii) No network administrator required.
(iv) All users with equal priority
(1 Marks for each type)

Ans:
i) Number of users 50
 Client-Server Network
ii) Data and resources need to be restricted
 Client-Server Network

Page 22 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

iii) No network administrator required


 Peer to peer Network
iv) All users with equal priority
 Peer to peer Network

b) Explain twisted pair cable with neat sketch.


(Diagram - 2Marks Explanation - 2Marks)
Ans:
A type of cable that consists of two independently insulated wires twisted around one another.
The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction.
While twisted-pair cable is used by older telephone networks and is the least expensive type
of local-area network (LAN) cable, most networks contain some twisted-pair cabling at some
point along the network.
Types :
i ) Unshielded Twisted Pair Cable (UTP)
Unshielded twisted pair is the most common kind of copper telephone wiring. Twisted pair is
the ordinary copper wire that connects home and many business computers to the telephone
company. To reduce crosstalk or electromagnetic induction between pairs of wires, two
insulated copper wires are twisted around each other. Each signal on twisted pair requires both
wires.

Page 23 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

ii) Shielded Twisted Pair Cable (STP)


STP is a type of copper telephone wiring in which each of the two copper wires that are
twisted together are coated with an insulating coating that functions as a ground for the wires.
The extra covering in shielded twisted pair wiring protects the transmission line
from electromagnetic interference leaking into or out of the cable. STP cabling often is used
in Ethernet networks, especially fast data rate Ethernets.

Advantages of Twisted pair cable

1. It can be used to carry both analog and digital data.

Page 24 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

2. It is relatively easy to implement and terminate.


3. It is the least expensive media of transmission for short distances.
4. If portion of a twisted pair cable is damaged it does not affect the entire network.

c) State any two advantages of bus topology .Explain whether adding more computers in
bus topology affects performance of network.
(Any Two Advantage – 2 Marks Explanations – 2 Marks)

Ans:

The bus topology has the following advantages:


1. Low cost
2. Easy control.
3. It is easy to set-up and extend bus network.
4. Cable length required for this topology is the least compared to other networks.
5. Linear Bus network is mostly used in small networks. Good for LAN.

In bus topologies, all computers are connected to a single cable or "trunk or backbone", by a
transceiver either directly or by using a short drop cable. All ends of the cable must be
terminated, that is plugged into a device such as a computer or terminator. Most bus
topologies use coax cables. The number of computers on a bus network will affect network
performance, since only one computer at a time can send data, the more computers you have
on the network the more computers there will be waiting send data.

d) What is meant by file sharing and printer sharing? How this can be achieved?
(Explanation - 2Marks Each)

Ans:
File sharing:
File sharing is the primary feature of network. Due to use of networks, the sharing of files
becomes easier. File sharing requires a shared directory or disk drive to which many users can
access over the network. When many users are accessing the same file on the network, more
than one person can make changes to a file at the same time. They might both making
conflicting changes simultaneously.

Page 25 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Printer sharing:
Printer sharing can share costly & higher quality printers. Printer sharing can be done in
several different ways on network. The most common way is to use printer queues on server.
The printer queue holds print job until any currently running print jobs are finished & then
automatically send the waiting jobs to the printer i.e. printer connected to server. Another way
to share printer on a network is that each workstations accesses the printer directly.

e) Explain the term SMTP.


(Explanation - 4 Marks)

Ans :

 It is Simple Mail transfer Protocol.


 It is connection oriented text based protocol in which sender communicates with
receiver using a command and supplying data over reliable TCP connection.
 SMTP is standard application layer protocol for delivery of email over TCP/IP
network.
 SMTP establish a TCP connection between Sender And port number 25 of receiver.

 It is limited in its ability to queue messages at the receiving end, it is usually used with one
of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and
download them periodically from the server

f) Compare IPv4 and IPv6.


(Any 4 Points - 1Mark each)
Ans:

IPv4 IPv6

Source and destination addresses are 32 Source and destination addresses are 128
bits (4 bytes)in length. bits(16 bytes) in length.

Uses broadcast addresses to send There are no IPv6 broadcast addresses.

traffic to all nodes on a subnet. Instead, multicast scoped addresses are


used.

Page 26 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Fragmentation is supported at Fragmentation is not supported at routers.

Originating hosts and intermediate It is only supported at the originating host.


routers.
IP header includes a checksum. IP header does not include a checksum.

IP header includes options. All optional data is moved to IPv6

extension headers.

6. Attempt any TWO of the following: 16


a) Compare UDP with TCP protocols with respect to:
(i) Complexity
(ii) Connection
(iii) Reliability
(iv) Function
(v) Which layer they exist
(vi) Flow controlling
(vii) Overhead
(viii) Which is powerful?
(Each Parameter - 1Mark each)

Ans:

UDP TCP
Complexity UDP is less complex TCP is more complex
Connection UDP is connection less protocol TCP is connection oriented
protocol
Reliability It provides unreliable delivery It provides reliable delivery of
of messages messages

Function By using this protocol one As a message makes its way


program can send a load of across the internet from one
packets to another and that computer to another. This is
would be the end of the connection based.

Page 27 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

relationship.
Which layer they exist Transport layer Transport layer
Flow controlling UCP has no flow control TCP has flow control
Overhead Overhead is very low Overhead is low
Which is powerful UDP is less powerful TCP is more powerful.

b) Describe gateways. State the situations under which gateways are necessary in the
network.
(Explanations – 2 Marks, Diagram – 2 Marks, situation explanation - 4 Marks)

Ans:
A gateway is a node (router) in a computer network, a key stopping point for data on its way
to or from other networks. Using gateways, we are able to communicate and send data back
and forth. The Internet wouldn't be any use to us without gateways (as well as a lot of other
hardware and software).

In a workplace, the gateway is the computer that routes traffic from a workstation to the
outside network that is serving up the Web pages. For basic Internet connections at home, the
gateway is the Internet Service Provider that gives you access to the entire Internet.

Gateway operates at all 7 layers of the OSI model. It is a device, which connects two
different dissimilar networks which have same function of communication. Situation where
gateways are necessary for different network like Ethernet, Token Ring, and FDDI etc. It can
communicate if they are using same protocol for communication like TCP/IP and if they are
using different protocol from a gateway can also forward packet across different n/ws that
may also use different protocol.

Page 28 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Eg: if n/w A is a Token Ring network using TCP/IP & network B is a Novell Network, a
gateway can relay frames between two.

This means that a gateway is not only used for similar protocol, but also used between
different protocols. In certain situations the only changes required are to the frame header. In
other cases, the gateway must take case of different frame sizes, data rates, format,
acknowledgement schemes, and priority schemes tec.

Page 29 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

c) Draw the adjacent layers in DLL in OSI reference model and describe the major
functions and responsibilities of DLL .Describe two sublayers of DLL.
(Diagram – 2 Marks, Function and responsibility – 2 Marks, Each Sub layer – 2 Marks
each)

Ans:

Page 30 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Data link layer is responsible for transmitting group of bits between the adjacent nodes.
The group of bits is called as frame. The network layer passes a data unit to the data link
layer. Header and trailer is added to the data unit by data link layer. This data unit is passed to
the physical layer. Data link layer is responsible for moving frames from one node to the next.

Functions of data link layer are:

Link establishment and termination: establishes and terminates the logical link between
two nodes.
Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are
available.
Frame sequencing: transmits/receives frames sequentially.
Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers
from errors that occur in the physical layer by retransmitting non-acknowledged frames and
handling duplicate frame receipt.
Frame delimiting: creates and recognizes frame boundaries.
Frame error checking: checks received frames for integrity.
Media access management: determines when the node "has the right" to use the physical
medium.
Sublayers of Data Link layer:
1) Logical link control sub layer
It performs functions in the upper portion of the Data Link layer, such as flow control and
management of connection errors.
LLC supports the following three types of connections for transmitting data:
1) Unacknowledged connectionless service: does not perform reliability checks or maintain a
connection, very fast, most commonly used
2) Connection oriented service: once the connection is established, blocks of data can be
transferred between nodes until one of the node terminates the connection.
3) Acknowledged connectionless service provides a mechanism through which individual frames
can be acknowledged.

2) Media Access Control


This sub layer contains methods that logical topologies can use to regulate the timing of data
signals and eliminate collisions. The Media Access Control sub layer also determines where
one frame of data ends and the next one starts – frame synchronization. There are four means of
frame synchronization: time based, character counting, byte stuffing and bit stuffing.

Page 31 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 1/ 25

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values may
vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer based
on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.

Q.1.

A. Attempt any SIX : 12


a) Compare human network and computer network.
(Each point- 1 Mark, any two points)
Human Network Computer Network
1. Human Network is a network of 1.Computer network is a
human beings. interconnections of two or
more computers
2.It consist of individuals 2.It consist of computers &
,organizations, schools, hospitals, connecting devices like as
work places etc Hub or printer etc
3.Example: 1.Family network, Peer 3.Example : Internet
Network, Restaurant Network,
Contact Network

b) Define ‘packet’ in concern with computer communication.


(Definition – 2 Marks)
Packet: A packet is the unit of data that is routed between an origin and a destination on
the Internet or any other packet-switched network.

c) Define the term ‘Topology’. List the names of any two network topologies.
(Definition- 1 Mark, Listing – 1 Mark)
Topology: A topology is a usually “Schematic description of the arrangement of a network
including its nodes and connecting lines (links).
OR
The way in which computers are connected in a network is called as topology.
OR
It is physical interconnection between various elements on computer network such as links
& nodes.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 2/ 25

Types:
1. Bus
2. Ring
3. Star
4. Mesh
5. Tree
6. Hybrid

d) State whether the bus is active or passive network. Justify your answer.
( 2 Marks)
Bus is a passive network.
The bus topology is usually used when a network installation is small, simple or
temporary . In bus network, the cable is just one or more wires , with no active electronics
to amplify the signal or pass it along from computer to computer . This makes the bus a
passive network.
or
In the bus topology the major component is the backbone cable. The communication
takes place through it and this backbone does not do any amplification or correction of
signals passed through that’s why bus can be called as passive network.

e) Give any two applications of microwave communication.


(Each application- 1Mark, Any Two applications)
Two applications of Microwave Communication.
1) Radar uses microwave radiation to detect range, speed & other characteristics of
remote object.
2) It is used in satellite for long distance communication.
3) Satellite phones.
Any other relevant application such as cellular networks can also be considered.

f) State two applications of optical fiber cable.


(Each application- 1Mark, Any Two applications)
Two applications of optical fiber cable:
Applications are as follows

1) Military applications
2) Space applications
3) Cable television
4) Telephone
5) Computer networking
6) Medical applications

g) What is CDMA? (2 Marks)


CDMA: CDMA is code division multiple access. In CDMA more than one user is
allowed to share a channel or sub channel with the help of direct – sequence spread
spectrum signal. In CDMA each user is given a unique code sequence or signature
sequence. This sequence allows the user to spread the information signal across the
assigned frequency band.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 3/ 25

h) What is PPP? Describe in brief.

(Meaning- 1Mark, Description- 1 Mark)


PPP: PPP is Point-to-Point Protocol.
It is a data link protocol commonly used in establishing a direct communication between
two networking nodes. It can also provide authentication, transmission encryption &
compression.

B. Attempt any Two: 8


a) Give advantages and disadvantages of computer network.
(Any 2 advantages- 2 Marks, Any 2 disadvantages- 2 Marks)
Advantages:
1. File sharing: The major advantage of computer network is that it allows file sharing and
remote file access. A person sitting at one workstation that is connected to a network can
easily see files present on another workstation, provided he/she is authorized to do so.
2. Resource Sharing: A computer network provides a cheaper alternative by the provision
of resource sharing. All the computers can be interconnected using a network and just one
modem & printer can efficiently provide the services to all users.
3. Inexpensive set-up: Shared resources means reduction in hardware costs. Shared files
means reduction in memory requirement, which indirectly means reduction in file storage
expenses.
4. Flexible Handling: A user can log on to a computer anywhere on the network and access
his/her files. This offers flexibility to the user as to where he/she should be during the
course of his/her routine.

Disadvantages:
1. Security concerns: One of the major drawback of computer network is the security issues
that are involved.
2. Virus and malware: Viruses can spread on a network easily because of the inter-
connectivity of workstations.
3. Lack of robustness: If the main file server of a computer network breaks down , the entire
system becomes useless.
4. Needs an efficient handler: The technical skills and knowledge required to operate and
administer a computer network.

b) Describe Tree Topology with neat diagram. State its advantages. (any two)
(Diagram- 1.5 Marks, Explanation -1.5 Marks, two advantages- 1 Mark)
Tree Topology: A tree topology is variation of star. As in a star, nodes in a tree are linked
to a central hub head end that controls the traffic to a network.
However, not every computer plugs into the central hub, majority of them are connected to
a secondary hub which in turn is connected to the central hub as shown in fig.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 4/ 25

The central hub in the tree is active hub which contains repeater. The repeater amplifies the
signal & increase the distance a signal can travel. The secondary hubs may be active or
passive. A passive hub provides a simple physical connection between the attached devices.
Advantages:
1. Supported by several hardware and software venders.
2. It allows more devices to be attached to a single central hub and can therefore increases the
distance a signal can travel between devices.
3. It allows the network to isolate and prioritize communication from different computers i.e.
the computers attached to one secondary hub can be given priority over the computers
attached to another secondary hub.

c) You are asked to established a small network with minimum cost at least sight
computers. Also it is necessary to use centralized database. Which type of network
topology you will use? Justify your answer.
(Type of network- 1 Marks, Type of topology -1 Mark, Justification -2 Marks)
Due to necessity of centralized data base, we have to use the Client-Server network.
As the network is small & low cost, we can use the bus topology.
The bus topology has the following advantages:
1. Low cost
2. Easy control.
3. It is easy to set-up and extend bus network.
4. Cable length required for this topology is the least compared to other networks.
5. Linear Bus network is mostly used in small networks. Good for LAN.

Q.2. Attempt any FOUR:


a) Describe classification of computer networks.
(Classification – 2 Marks, Explanation of any one network -2 Marks)
Networks are classified depending on the geography & their components.
Classification of network by their geography: 1. PAN 2. CAN 3. LAN 4.MAN 5.WAN
Classification of network by their components by their component role: 1. Peer-to- Peer
Network 2. Client-server network
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 5/ 25

PAN: A PAN is personal area network is used for communication among computer devices
close to one’s person. Wireless networking or Bluetooth technologies are the some examples
of PAN. The communication network established for the purpose of connecting computer
devices of personal use is known as the PAN.
CAN: CAN is a Campus Area Network is used to connect buildings across campuses of
colleges or Universities. A CAN is actually a type of LAN. It is larger than a LAN but
smaller than MAN. CAN is a network that connects two or more LANs but that is limited to a
specific and contiguous geographical area such as a college campus, industrial complex or
military base.
Advantages: 1. CAN is economical.
2. CAN is simple and easy to implement.
3. Helpful for universities & corporate organization to work from any block and receive the
same speed of data together.

LAN: LAN is local area network. LAN is privately-owned networks covering a small
geographic area(less than 1 km), like a home, office, building or group of buildings. LAN
transmits data with a speed of several megabits per second.
Advantages:
1. The reliability of network is high because the failure of the computer in the network does not
affect the functioning for other computers.
2. Addition of new computer to network is easy.
3. High rate of data transmission is possible.
4. Loss expensive to install.
MAN: A Metropolitan Area Network (MAN) is a large computer network that spans a
metropolitan area or campus. A MAN typically covers an area up to 10 kms (city). The best
example of MAN is the cable Television network, available in many cities. For an
organization, the common use of a MAN is to extend their LAN connectivity between
buildings/offices that are within the same city or urban area (hence the name Metropolitan
Area Network). The organization can pass their Ethernet frames to the service provider
MAN; the service provider will carry their frames across the MAN; and then deliver the
frames to the destination site. From the customer's point of view, the MAN looks like one big
(long) Ethernet link between their offices. The different sites could belong to the same IP
subnet, and from the customer's viewpoint, no routing is required between their sites.
Advantages: 1. MAN spans large geographical area than LAN.
2. MAN falls in between the LAN and WAN therefore, increases the efficiency at handling
data.

WAN: WAN is wide area network. WAN is a long-distance communication network that
covers a wide geographic area, such as state or country. The most common example is
internet. A WAN provides long-distance transmission of data, voice, image and video
information over larger geographical areas that may comprise a country or even whole world.
Advantages: 1. WAN can connect the computer to a wider area geographically.
2. WAN shares software & resources with connecting workstations.

Classification of network by their component role:


Peer-to-Peer Network: Peer networks are defined by lack of central control over network.
There are no fixed division into client & server. In this individual who forms a loose group
can communicate with other in the group as shown in fig.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 6/ 25

Each computer is responsible for accessing & maintaining its own security & resources. In
Peer-to- Peer network every computer can function both as client & server. In this type of
network user simply share disk space & resources.
Advantages: 1. No extra investment in server hardware & software is required.
2. Easy setup.
3. No network administrator required.
Disadvantages: 1. Additional load due to sharing of resources.
2. Lack of central organization, which can make data hard to find.
3. Weak security.

Client -Server network (Server-based network)

Fig. shows server- based network.


Server based networks are defined by presence of servers on a network that provides security
& administration of network. Server-based network divide processing takes between client &
servers. Client request service such as file printing & servers deliver them. Servers are more
powerful than client computers.
Advantages:
1. Strong central security
2. Ability to share expensive equipments such as printer.
3. Ability of server to pull available hardware & software.
4. Easy manageability of large user.
Disadvantages:
1. Expensive dedicated hardware.
2. Expensive network operating system software & client license.
3. A dedicated network administrator.

[Any suitable advantages & disadvantages shall be considered]


MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 7/ 25

b) Enlist essential components required to design computer network. Describe any one in
brief.

(1 mark for list, 1 mark for diagram, 2 marks for description, any other component
can be considered)
The components of computer network are:
Hub
Router
Modem
Bridge
Switches
Network Interface Card
Cables and connectors
Crimping tool
LAN tester
Computers
Gateways

Explanation:
1) HUB: Hub is a connecting device; it is also known as multiport repeater.
It is normally used for connecting stations in a physical star topology
All networks require a central location to bring media segments together.
These central locations are called hubs. A hub organizes the cables and relays signals to the
other media segments. There are three main types of hubs:
1) Passive
2) Active
3) Intelligent
Passive Hubs: A passive hubs simply combines the signals of a network segments. There is
no signal processing or regeneration. A passive hub reduces the cabling distance by half
because it does not boost the signals and in fact absorbs some of the signal. With the passive
hub each computer receives the signal sent from all the other computers connected to the hub.
Active hubs: They are like passive hubs but have electronic components for regeneration and
amplification of signals. by using active hubs the distance between devices can be increased.
The main drawback of active hubs is that the amplify noise along with the signals. They are
also much expensive than passive hubs.
Intelligent hubs: in addition to signal regeneration, intelligent hubs perform some network
management and intelligent path selection. One advantage to this is that all transmission
media segment can be connected permanently because each segment will be used only when
a signal is sent to a device using that segment.

Node 1 Node 2

HUB

Node 3 Node 4
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 8/ 25

2) ROUTER: Router is a device that connects 2 or more networks. It consist of hardware and
software .hardware includes the physical interfaces to the various networks in the
internetwork. Software in a router is OS and routing protocols management software.
1) Router use logical and physical addressing to connect two or more logically separate
networks.
2) They accomplish this connection by organizing the large network into logical network
called subnets.
3) Each of the subnet is given a logical address. This allows the network to be separate but
still access to each other and exchange data.
4) Data is grouped into packets. Each packet has physical device address and logical network
address.

3) MODEM: Modem works as modulator as well as demodulator. Modem converts analog


signal to digital signal and vice versa. In case of networking data has to be transferred from
one location to another location. At present to transfer such data whatever the infrastructure
(PSTN) is available .it is of analog technology but computer sends digital data to transfer this
data to another location it is needed to convert into analog format so that it can be transferred
by using currently available infrastructure.
Signal corrupted by noise

Transmitted data Analog signal Received data

Modem Modem
(DCE) (DCE)

Telephone DTE
DTE

4) Switch: A switch is a small hardware device that joins multiple computers together within
one Local Area Network (LAN). Network switches operate at Data Link Layer of the OSI
model. A switch is device that provides a central connection point for cables from
workstations, servers and peripherals.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 9/ 25

5) Bridge: It is a device which connects two or more segment of a network. Use in DLL. If only
forwards the packet which are for other.

6) Gateway: It is a device which connects two different dissimilar networks which has similar
function of communication. It is also called as protocol convertor. It works in all layers of
OSI model.

c) With the help of neat diagram explain satellite communication.


(Diagram- 2 Marks, Explanation -2 Marks)
SATELLITE COMMUNICATION:
In satellite communication, signal transferring between the sender and receiver is done with
the help of satellite. In this process, the signal which is basically a beam of modulated
microwaves is sent towards the satellite called UPLINK (6 Ghz). Then the satellite amplifies
the signal and sent it back to the receiver’s antenna present on the earth’s surface called as
DOWNLINK (4Ghz), as shown in the diagram given

As the entire signal transferring is happening in space. Thus this type of communication is
known as space communication. The satellite does the functions of an antenna and the
repeater together. If the earth along with its ground stations is revolving and the satellite is
stationery, the sending and receiving earth stations and the satellite can be out of sync over
time.
Therefore Geosynchronous satellites are used which move at same RPM as that of the earth
in the same direction.
So the relative position of the ground station with respect to the satellite never changes.
However 3 satellites are needed to cover earth’s surface entirely.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 10/ 25

Frequency band used in satellite communication:

Band Downlink Uplink


C 3.7 to 4.2 Ghz 5.925 to 6.425Ghz
Ku 11.7 to 12.2 Ghz 14 to 14.5 Ghz
Ka 17.7 to 21 Ghz 27.5 to 31 Ghz

d) What is the frequency band used for cellular telephony? How a mobile call is
transmitted and received?
(Explanation of cellular telephony – 2 Marks, Explanation of mobile call transmission &
reception – 2 Marks)
What is the frequency band used for cellular telephony? How a mobile call is transmitted and
received.

Analog transmission is used for cellular telephony. Frequency modulation is used for
communication between the mobile phone and cell office. Two frequency bands are allocated
for this purpose. One band of them is for the communication that is initiated by mobile phone
& the other band for the land phone. Each channel requires a full-duplex dialog. For
preventing interference, adjacent channels are rarely allocated; some of them are also
required for control purposes.
This reduces the number of channels available for each cell. The same frequency band can be
used for multiple non-adjacent cells as shown in fig.
Calls using Mobile phones:
Call is made from the mobile phone by entering 7-, 8-, or 10-digit phone number; the mobile
phone itself scans the band & seeks a channel for setting up the call. After seeking, it sends
this number to the closest cell office, which in turn, sends it to the CTO. If the called party is
available, CTO lets MTSO (mobile telephone switching office) know. At this point, MTSO
allocates an empty voice channel to the cell to establish the connection. The mobile phone
adjust its tuning to the new channel & the dialog begins. When a land phone places a call to a
mobile phone, the telephone central office sends the number to the MTSO. The MTSO
performs a lookup to see where the mobile phone is currently placed by sending appropriate
query signal to all the cells. This process is known paging. The cell where the mobile phone
is currently located responds to the MTSO. Incoming calls work differently. To start with idle
phone is continuously listen to paging channel to detect messages at directed at them. The
MTSO then transmit the incoming call signal to that mobile phone & when the mobile phone
is answered, the MTSO assigns a voice channel to the call, thus enabling the conversation.

e) State any four advantages of server based network over peer to peer network.
(Each advantage -1 Mark, any four advantages)
1. Server based network has Strong central security over peer to peer network.
2. Sever based network has better performance for large number of users than Peer- to –Peer
network.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 11/ 25

3. Centralized backup can be taken in server based network.


4. Easy manageability for large number of users.
5. Very reliable dedicated Network operating system (NOS) required.
6. In server based network server is more powerful than client.

f) Draw the constructional sketch of co-axial cable. Describe any three characteristics of
co-axial cable.
( Sketch -2 Marks, Any three characteristics- 2 Marks)
Co-axial cable:

Characteristics of coaxial cable are:-


1. Used to transmit both analog & digital signals.
2. It carries signals of higher frequency ranges than twisted pair cable.
3. Lower attenuation than twisted pair cable.
4. Supports higher bandwidth.
5. Requires amplifiers every few kilometers for long distance transmission.
6. Requires repeaters every few kilometers for digital transmission.

Q.3. Attempt any FOUR: 16


a) List four types of servers. Describe them in brief.
(Listing of servers 1 mark, description 3 marks)
Types:
1. Application Server
2. Message Server
3. Database Server
4. Web server
DESCRIPTION:
Application Servers: The application server often serves to connect database servers
with the end-user, thus acting as a kind of "middleware" that releases stored information
requested by said user. The server is usually responsible for properly decoding and
recoding data and providing security over connections.
Message Servers: These servers provide instant, real-time communication between users,
regardless of where a user may be. Message servers allow a wide variety of
communication methods, from simple forms such as text to more complex forms such as
video, audio and graphics.
Database Servers: These servers manage the database that is stored in that server using
the SQL database management system. A client request is sent in the form of an SQL
query to the server. That server in turn searches through the database for the requested
information and sends the results to the client.
Web Servers: Web servers provide access to the Internet through the Hyper Text
Transfer Protocol (HTTP). Files in a web server use Hyper Text Markup Language
(HTML)to display content on web browsers. A web server usually receives requests from
a web browser and sends back the requested HTML file and related graphic files.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 12/ 25

b) State any two advantages of ring topology, define token. State whether ring topology
is broadcast or point to point network.
(Advantages 2 marks, definition of token 1 mark; ring topology is broadcast or point
to point 1 mark)
Advantages of Ring Topology:
1) Here, since the system provides point to point flow of data i.e. the data is moving in
one direction from one computer to another i.e. active topology, hence no collision occurs
in the system.
2) Cable faults are easily identified.
3) Dual loop rings can be easily effective.
4) Packet or data delivery is guaranteed.
5) Every computer is having equal priority.
What is Token?
Token is a special three byte frame that travels around the ring network.
It can flow clockwise or anticlockwise.
Ring topology is a point to point network.

c) In brief describe OSI model with suitable diagram.


(Layered structure 1 mark and explanation 3 marks)
OSI model (open system interconnection) model was developed by ISO(international
standard organization)
Function of OSI model
1) It provides way to understand how internet work operates.
2) It gives guideline for creating network standard. OSI model has 7 layers as shown in the
figure.
Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data link Layer

Physical Layer

OSI model has following 7 layers as Physical layer, data link layer, Network layer,
Transport layer, session layer, presentation layer, application layer.

1) Physical layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It deals with mechanical and electrical specifications of interface and
transmission medium. For transmission it defines procedures and functions that devices
and transmission medium has to perform.
2) Data link layer:
It is responsible for transmitting group of bits between the adjacent nodes. The group
of bits is called as frame. The network layer passes a data unit to the data link layer.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 13/ 25

Header and trailer is added to the data unit by data link layer. This data unit is passed to
the physical layer.
Data link layer is responsible for moving frames from one node
to the next. Functions of data link layer are:
1) Framing
2) Physical addressing
3) Flow control
4) Error control
5) Media access control
6) Node to node delivery
3) Network layer:
It is responsible for routing the packets within the subnet i.e. from source to
destination. It is responsible for source to destination delivery of individual packets
across multiple networks. It ensures that packet is delivered from point of origin to
destination.
Functions of network layer:
1) Logical addressing
2) Routing.
3) Congestion control
4) Accounting and billing
5) Address transformation
6) Source host to destination host error free delivery of packet.
4) Transport layer:
Responsibility of process to process delivery of message
Ensure that whole message arrives in order.
Functions of Transport Layer:
1) Service point addressing
2) Segmentation and reassembly
3) Connection control
4) Flow control: Flow control is performed end to end
5) Error control
5) Session layer:
Establishes, maintains, synchronizes the interaction among communication systems
It is responsible for dialog control and synchronization
Functions of Session Layer
1) Dialog control
2) Synchronization, session and sub session
3) Session closure

6) Presentation layer: It is concerned with syntax, semantics of information exchanged


between the two systems.
Functions: Translation, encryption, compression

7) Application layer: It enables user to access the network. It provides user interfaces and
support for services like email, remote file access.
Functions: network virtual terminal, file transfer access and management, mail services
and directory services
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 14/ 25

d) Describe connection oriented and connectionless services.


(Connection oriented services 2 marks and connectionless services 2 marks)
Connection-oriented communication includes the steps of setting up a call from one
computer to another, transmitting/receiving data, and then releasing the call, just like a
voice phone call. However, the network connecting the computers is a packet switched
network, unlike the phone system's circuit switched network. Connection-oriented
communication is done in one of two ways over a packet switched network: with and
without virtual circuits.
Connection oriented service is more reliable than connectionless service. We can send the
message in connection oriented service if there is an error at the receivers end. Example
of connection oriented is TCP (Transmission Control Protocol) protocol.
Connectionless communication is just packet switching where no call establishment and
release occur. A message is broken into packets, and each packet is transferred
separately. Moreover, the packets can travel different route to the destination since there
is no connection. Connectionless service is typically provided by the UDP (User
Datagram Protocol. The packets transferred using UDP are also called datagrams.

Difference between connection oriented and connectionless services:


1. In connection oriented service authentication is needed while connectionless service
does not need any authentication.
2. Connection oriented protocol makes a connection and checks (confirms delivery of
message) whether message is received or not and sends again if an error occurs
connectionless service protocol does not guarantees a delivery.
3. Connection oriented service is more reliable than connectionless service.
4. Connection oriented service interface is stream based and connectionless is message
based.

e) Explain data encapsulation in OSI

(Diagram of data encapsulation 2 marks , explanation 2 marks)

Each layer in the layered architecture provides service to the layers which are directly above
and below it. The outgoing information will travel down through the layers to the lowest
layer. While moving down on the source machine, it acquires all the control information
which is required to reach the destination machine. The control information is in the form of
headers and footers which surrounds the data received from the layer above. This process of
adding headers and footers to the data is called as data encapsulation. The headers and footers
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 15/ 25

contain control information in the individual fields. It is used to make message packet reach
the destination. The headers and footers form the envelope which carries the message to the
desired destination.

f) Compare UDP and TCP (four points)


(Any 4 points, 1 mark each )
TCP UDP
1. TCP is connection oriented protocol 1. UDP is connection less protocol
2. It provides reliable delivery of 2. It provides unreliable delivery of
messages messages
3. It assigns datagram size dynamically 3. Every datagram segment is of the same
for efficiency. size.
4. TCP has flow control 4. UDP has no flow control
5. Overhead is low 5. Overhead is very low.
6. Transmission speed is high 6. Transmission speed is very high

Q.4. Attempt any FOUR: 16


a) Describe different IP address classes
(Any 4 classes with explanation 1 mark each)
The Internet community originally defined five address classes to accommodate networks
of varying sizes. Microsoft TCP/IP supports class A, B, and C addresses assigned to
hosts. The class of address defines which bits are used for the network ID and which bits
are used for the host ID. It also defines the possible number of networks and the number
of hosts per network.
Class Range for first byte
A 0-127
B 128-191
C 192-223
D 224-239
E 240-255

1) Class A
Class A addresses are assigned to networks with a very large number of hosts. The high-
order bit in a class A address is always set to zero. The next seven bits complete the
network ID. The remaining 24 bits (the last three octets) represent the host ID. This
allows for 126 networks and 16,777,214 hosts per network. Figure illustrates the structure
of class A addresses.

2) Class B
Class B addresses are assigned to medium-sized to large-sized networks. The two high-
order bits in a class B address are always set to binary 1 0. The next 14 bits complete the
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 16/ 25

network ID. The remaining 16 bits represent the host ID. This allows for 16,384 networks
and 65,534 hosts per network. Figure illustrates the structure of class B addresses.

3)Class C
Class C addresses are used for small networks. The three high-order bits in a class C
address are always set to binary 1 1 0. The next 21 bits complete the network ID. The
remaining 8 bits (last octet) represent the host ID. This allows for 2,097,152 networks and
254 hosts per network. Figure illustrates the structure of class C addresses.

4) Class D
Class D addresses are reserved for IP multicast addresses. The four high-order bits in a
class D address are always set to binary 1 1 1 0. The remaining bits are for the address
that interested hosts recognize. Microsoft supports class D addresses for applications to
multicast data to multicast-capable hosts on an internetwork.
5) Class E
Class E is an experimental address that is reserved for future use. The high-order bits in a
class E address are set to 1111.

b) Compare IPv4 and IPv6.


MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 17/ 25

(Any 4 points, 1 mark each)

IPv4 IPv6
1. Source and destination addressesare32 1. Source and destination addresses are
bits (4 bytes)in length. 128 bits(16 bytes)in length.
2. Uses broadcast addresses to send traffic 2. There arenoIPv6 broadcast addresses.
to all nodes on a subnet. Instead, multicast scoped addresses are
used.
3. Fragmentation is supported at 3. Fragmentation is not supported at
Originating hosts and intermediate routers. routers. It is only supported at the
4.IP header include a checksum. originatinghost.
4. .IP header does not include a checksum.

5.IPheader includes options. 5. All optional data is moved toIPv6

6.IPsec support is optional extension headers.


6.IPsec support is required in a fullIPv6
implementation.

7. No identification of payload for QoS 7. Payload identification for QoS handling


Handling by routers is present within the By routers is included in theIPv6 header
using the FlowLabel field.
IPv4 header.
8.Address must be configured either 8.Addresses can be automatically assigned
manually or through DHCP using stateless address auto configuration,
assigned usingDHCPv6, or manually
9. IP address represented in decimal configured.
9. IP address is represented in hexadecimal
number system number system

10. ‘ . ‘ used as separator 10. ‘ : ‘ used as seperator


.11. Uses host address(A) resource records 11. Uses host address (AAAA) resource
in the domain name system to map host records in the domain name system
names toIPv4addresses.
to map host names toIPv6addresses

c) Explain in brief the functioning of Bluetooth.


(Diagram 1 mark, explanation 3 marks)
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 18/ 25

What is Bluetooth ?

1. A cable-replacement technology that can be used to connect almost any device to any
other device
2. Radio interface enabling electronic devices to communicate wirelessly via short range (10
meters) ad-hoc radio connections
3. a standard for a small , cheap radio chip to be plugged into computers, printers, mobile
phones, etc.
4. Uses the radio range of 2.45 GHz
5. Theoretical maximum bandwidth is 1 Mb/s
6. Several Bluetooth devices can form an ad hoc network called a “piconet”
7. In a piconet one device acts as a master (sets frequency hopping behavior) and the others
as slaves
Example: A conference room with many laptops wishing to communicate with each other

Bluetooth Architecture
1) Piconet
Each piconet has one master and up to 7 simultaneous slaves
Master : device that initiates a data exchange.
Slave : device that responds to the master
All devices in a piconet hop together
Master gives slaves its clock and device ID
Non-piconet devices are in standby

M=Master P=Parked
S=Slave SB=Standby

2) Scatternet
• Linking of multiple piconets through the master or slave devices
• Bluetooth devices have point-to-multipoint capability to engage in Scatternet
communication.
• Devices can be slave in one piconet and master of another

d) List any four IP functions.


MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 19/ 25

(Each function 1 mark)


1. Addressing: In order to perform the job of delivering datagrams, IP must know
where to deliver them to. For this reason, IP includes a mechanism for host
addressing. Furthermore, since IP operates over internetworks, its system is
designed to allow unique addressing of devices across arbitrarily large networks.
It also contains a structure to facilitate the routing of datagrams to distant
networks if that is required.

2. Data Encapsulation and Formatting/Packaging: IP accepts data from the


transport layer protocols UDP and TCP. It then encapsulates this data into an IP
datagram using a special format prior to transmission.

3. Fragmentation and Reassembly: IP datagrams are passed down to the data link
layer for transmission on the local network. However, the maximum frame size of
each physical/data-link network using IP may be different. For this reason, IP
includes the ability to fragment IP datagrams into pieces so they can each be
carried on the local network. The receiving device uses the reassembly function to
recreate the whole IP datagram again.

4. Routing / Indirect Delivery: When an IP datagram must be sent to a destination


on the same local network, this can be done easily using the network's underlying
LAN/WLAN/WAN protocol using what is sometimes called direct delivery.
However, in many (if not most cases) the final destination is on a distant network
not directly attached to the source. In this situation the datagram must be
delivered indirectly. This is accomplished by routing the datagram through
intermediate devices.

e) What is token passing? List any four protocols associated with application layer of
OSI model.
(Token passing definition 1 mark, any 4 protocols of application layer 1 mark each)
Token passing is a method of passing the token in the ring network either clockwise or
anticlockwise.
Protocols associated with application layer of OSI model are as follows:
1. TELNET
2. File Transfer Protocol (FTP)
3. Simple Mail Transfer Protocol (SMTP)
4. Domain Name System (DNS)
5. Hypertext Transfer Protocol (HTTP)

f) Compare LAN, MAN and WAN.


(1 mark for each point, any four comparison points)
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 20/ 25

LAN MAN WAN


1. Area – Network 1.Area-Network 1.Area – Network spans a
within a single within over an entire large geographical area
building or campus of city. after a country or
up to a few kilometres Up to 10km continent 100 km
in size. …1000km country
10 … 1 Km ….continent
campus.
2. LAN network has 2.MAN network has 2.WAN speed varies
very high speedlower speed compared based on geographical
mainly due to
to LAN. location of the servers.
proximity of computer WAN connects several
and network devices. LANs
3. Bandwidth is low. 3. Bandwidth is 3 Bandwidth is high.
moderate.
4. Transmission media 4.Transmission 4 Transmission media –
– coaxial cable. media- cables, PSTN, PSTN or Satellite links.
optical fiber cables,
wireless
5. Data rate is high. 5. Data rate is 5. Data rate is low.
moderate.

Q.5. Attempt any FOUR: 16


a) Differentiate SLIP and PPP.(any four points)
(Any 4 each 1Mark)
SLIP PPP
Serial Line Internet Protocol does not establish In PPP, LCP (Line Control Protocol) is
or maintain connection between the client and responsible for establishing, maintaining and
ISP server. termination connection between two end
points.
Communication starts once the connection Communication begins only after
between two modems are established. authentication and the types of traffic is sent by
the client.
Type of traffic cannot be selected in SLIP. Type of traffic can be selected by NCP(
Network Control Protocol)
No protocol for termination. IPCP(IP Control Protocol) terminates a
network layer connection between the user and
ISP.
No addressing mechanism provided. Additional services for addressing mechanism
is provided
Doesn’t allow error control Allows error control
No provision for data compression Provides Data compression.

b) Describe the function of repeater. In which situation the repeater is used in the
network?
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 21/ 25

(Any 2 functions – 1M; Situation: 2M)


Repeaters are used to take the distorted, weak and corrupt input signal and regenerate this
signal at its output.
It ensures that the signals are not distorted or weak before it reaches the destination.
It recreates the bit pattern of the signal, and puts this regenerated signal back on to the
transmission medium.
It works in the physical layer with no intelligent function.
In any computer network, when the data bit pattern is sent from a computer A to
Computer B, if Computer B is not able to receive the exact data bit pattern, a repeater is
connected in between. This will regenerate the weak signal so that the exact replica of the
original input signal is sent forward. A repeater can be used at as many points in the
network as required.

c) Describe the following terms with reference to cellular telephony


i. Hard Hand Off
ii. Soft Hand Off
(Each term 2M)

i. Hard Hand Off


In Hard Hand Off a mobile station only communicates with one base station.
When the (mobile handset) MS moves from 1 cell to another, communication
must first be broken with the previous base station before communication can
reestablished with the new one. This may create a rough transition. Hard hand off
was used in earlier systems.

ii. Soft Hand Off


In this case, a mobile station can communicate with two base stations at the same
time this means that, during Hand off a mobile station may continue with the new
base station before breaking off from the old one. This is used in new systems.
This provides seamless connectivity while roaming from one cell to another.

d) What is NIC? State functions of NIC.


(Definition- 1M; Any three functions – 1M each)

NIC:
NIC is a Network Interface Card which is a small card inserted or plugged on the
motherboard of the host. It has a small CPU, memory and a limited instruction set
required for the network related functions. Each NIC has a unique hardware address or
physical address to identify the host uniquely, which ensures that its unique all over
world.
These functions include,
It accepts instructions from host to transfer data to/ from cable.
It checks the status of the bus with the help of the transceiver and waits till the bus is idle.
It sends the data bit by bit once the bus is idle.
It inserts the CRC in the header of the frame while transmitting.
While accepting the data, NIC compares the destination address in the frame with its own
hardware address; If matches then only it is accepted otherwise rejected.
Validating the input frame by checking its CRC to ensure that the data is error free.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 22/ 25

e) Site addresses 201.70.64.0. The company needs six subnets. Design subnets. Write
addresses of all subnets.
(Identify the class and bits : 1M; Each subnet address : ½ M.)
Site Address : 201.70.64.0
No. of Subnets : 6
Class : Class C
Default subnet mask : 255.255.255.0
To design 6 subnets :
No. of bits used in the host id:
2n -2 ≥ 6 ; where n = number of bits
If n= 3;
23 – 2 ≥ 6.
Therefore, n= 3.

Given IP : 201.70.64.0
Network ID : 201.70.64

Subnet 1:
The bit combination is 001.
Taking last octet in binary :0 0 1 0 0 0 0 0 = 32 (10)

Hence the subnet address is, 201.70.64. 32

Subnet 2:
The bit combination is 01 0.
Taking last octet in binary :0 0 1 0 0 0 0 0 = 64(10)

Hence the subnet address is, 201.70.64. 64

Subnet 3:
The bit combination is 011.
Taking last octet in binary :0 1 1 0 0 0 0 0 = 96(10)

Hence the subnet address is, 201.70.64. 96

Subnet 4:
The bit combination is 100.
Taking last octet in binary :1 0 0 0 0 0 0 0 = 128(10)

Hence the subnet address is, 201.70.64. 128

Subnet 5:
The bit combination is 101.
Taking last octet in binary :1 0 1 0 0 0 0 0 = 160(10)

Hence the subnet address is, 201.70.64. 160

Subnet 6:
The bit combination is 110.
Taking last octet in binary :1 1 0 0 0 0 0 0 = 192 (10)

Hence the subnet address is, 201.70.64. 192


MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 23/ 25

f) In which situation MODEM are useful in network.


(Any two situations: 2 M each)

1. Modems are used when digital signal is sent over analog medium.
2. When the data transmission is over an analog medium such as telephone lines, Modem is
used for converting analog signal to digital signal.
3. When a home user need to connect to ISP a modem is used to connect to telephone lines.
Or when user wants to connect internet by telephone line.

Q.6. Attempt any TWO: 16


a) How cross cable is created? Draw figure and explain. Give its application.
(Creation: 4M; Diagram : 2M; Application : 2M)

Crossover cable is created by connecting the two UTP cables by swapping transmission
and reception signals as shown below:
Here, One end of the cable is crimped in the same way as straight cable, on the other end
the following change has to be done,
1-White and 3 orange- white are to be connected
2 –Green and 6 orange are to be connected as shown in the fig below.

Application:
While connecting one computer to another without going through router, switch or hub,
the crossover cables are used.
These are also used when connecting one computer to a device directly, without any other
connecting device.
Cross cable is used for connecting similar level devices.
For example : two computers or connecting computer with hub since all are level
1devices.

b) Describe TCP/IP model with suitable diagram. Describe the function of each layer.
(Diagram 2M; Explanation 6M)
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 24/ 25

1. Application Layer
The application layer is concerned with providing network services to applications. There
are many application network processes and protocols that work at this layer, including
HyperText Transfer Protocol (HTTP), Simple Mail Transport Protocol (SMTP) and File
Transfer Protocol (FTP).

2. Transport Layer
This layer is concerned with the transmission of the data. The two main protocols that
operate at this layer are Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP). TCP is regarded as being the reliable transmission protocol and it
guarantees that the proper data transfer will take place. UDP is not as complex as TCP
and as such is not designed to be reliable or guarantee data delivery.
3. Network Layer or Internet layer:
This layer is concerned with the format of datagrams as defined in the internet
protocol(IP) and also about the mechanism of forwarding datagrams from the source
computer to the final destination via one or more routers. The other protocol in this layer
include Address Resolution Protocol (ARP), Reverse Address Resolution Protocol
(RARP) and Internet Control Message Protocol (ICMP).

4. Data Link layer


This is similar to the other network models which deal with Media Access and Control
(MAC) and also with the frame formats.

5. Physical Layer:
This deals with hardware level, connections as in other network model.

[Note: TCP/IP four or Five layer May be considered]

c) With the help of neat sketch describe the working of router. Describe in detail the
operation of router considering OSI model.
(Explanation of Router 4M, Description of Router in OSI 4M))
Router is a device that connects two or more computer network together this allows two
or more disparate computer network to send data to each other.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 25/ 25

The figure shows a router connecting to two networks viz: A (Token Ring) and B
(Ethernet) at points X and Y respectively. This means that the router must have two
interfaces and also two Network interface cards (NICs) one to interact with network A at
point X, and the other to interact with network B at point Y. this enable it to send data
between the two networks A and B. a router connect more than two networks.

A router operates at a the physical, data link and network layer of the OSI model, as
shown in fig a router is termed as an intelligent device.
A router is useful for interconnecting two or more networks.
These networks can be heterogeneous, which means that they can differ in their physical
characteristics such as frame size, transmission rates, topologies, addressing etc. thus, if a
router has to connect such different networks, it has to consider all these issues.
A router has to determine the best possible transmission path among several available.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values may
vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer based
on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent concept.

Q. Sub Answer Marking


No Q. Scheme
N.

1. a) Attempt any SIX of the following: 12 Marks

(i) State the need of computer network. 2M

Ans: Need for computer network: (Any two


• File/Folder Sharing Each 1 mark)
• Hardware Sharing (Resource sharing)
• Application sharing
• User Communication (Email, Remote Access)

(ii) Name any two types of server. 2M

Ans: Types of Servers: (Any two


• File and print Servers server names
• Application Servers Each: 1 mark)
• Email servers
• Networking Servers like DHCP, VPN etc.
• Internet Servers like web, internet email, Proxy Server etc.
• Remote Access Servers
(iii) Give two criteria for selection of network topologies. 2M

Page 1 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Ans: Selection criteria for selecting network topology: (Any two
• Size of the network & number of devices or nodes being connected. criteria Each:
• Ease of configuration & installing. 1 mark)
• The ease of adding new device in an existing network.
• The ease of fault indication & reflection.
• Number of physical links required to be used for connecting the devices.
• Need of network connecting devices such as repeaters, switches, hubs etc.
• Costs of the network.
• Based on the security requirement
• Need of network administration.
(iv) State the function of: 2M
1) Hub
2) Router

Ans: Functions of Hub: (Any one


• Hub connects all nodes in star topology. Hub is broadcasting device. function of
• It sends packets to all nodes in the network. each device: 1
• It works at Physical Layer of OSI model mark)
Functions of Router:
• Router chooses the best path for packet forwarding.
• Router read complex network address in packet.
• It works at Network Layer of OSI model
• Efficiently direct packets from one network to another, reducing excessive traffic.
• Join neighbouring or distant network
• Connect dissimilar networks.
• Prevent network bottlenecks by isolating portions of a network.

(v) State the frequency band used in cellular telephony for transmission and 2M
reception.

Ans: • A quad-band GSM phone could use GSM service in the 850-MHz, 900-MHz, (Any one
1800-MHz or 1900-MHz band. Correct
• GSM operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in frequency
the 850-MHz and 1900-MHz band in the United States. band: 2
• CDMA mobiles operate in 800 MHz band
marks)
• In Advanced Mobile Phone System (AMPS) The band between 824 and 849 MHz
carries reverse communication; the band between 869 and 894 MHz carrie
forward communication

Page 2 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• A dual-band TDMA phone could use TDMA services in either an 800-MHz or a
1900-MHz system.

(vi) State four applications of satellite communication. 2M

Ans: Applications of Satellite communications: (Any four


• Communication between any points on Earth. 𝟏𝟏
applications: 𝟐𝟐
• Global Positioning System (GPS) satellites provide time and location information
mark)
for vehicles and ships.
• Used in voice and data communications for handheld terminals.
• Used in universal broadband Internet access.
• Used in data transmission to remote locations
(vii) Define Protocol. State the need for the same. 2M

Ans: Protocol : (Definition: 1


There are certain rules that must be followed to ensure proper communication & a set of mark, Need: 1
such rules and regulation is known as protocol. mark)
OR
It is set of rules and conventions sender and receiver in data communication must
agree on common set of rules before they can communicate with each other.
OR
Protocol is a system of digital message formats and rules for exchanging those
messages in or between computing systems.
Need:
The computers can be physically connected through networking transmission
medium and connectivity devices. The communication between two devices or
computer can take place only if the two ends agree upon common set of rules and
conventions. Hence protocol is essential for communication between two computers
or devices.

(viii) State two features of IPV6. 2M

Ans: Features of IPv6: (Any two


• An IPv6 address consists of 16 bytes (octets) features each:
• It is 128 bits long. 1 mark)
• IPv6 specifies hexadecimal colon notation.
• Therefore, the address consists of 32 hexadecimal digits, with every four digits
separated by a colon
• IPv6 has a much larger address space
• It gives greater flexibility in address allocation.
• There are three types of addresses in IPv6: unicast, anycast, and multicast.

Page 3 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• In an IPv6 address, the variable type prefix field defines the address type or
purpose.

b) Attempt any TWO of the following: 8 Marks

(i) Name any four resources that can be shared in a computer network. 4M

Ans: • Files (Each


• Folders or directories Resource: 1
• Devices like Printers, modems, Fax cards etc. mark)
• Application software

(ii) Draw a neat diagram and describe the working of star topology. 4M

Ans: (Diagram: 1
mark,
Description: 3
marks)

Star Topology:
• In a star topology, each device has a dedicated point-to-point link only to a
central controller, usually called a hub.
• The devices are not directly linked to one another.
• A star topology does not allow direct traffic between devices.
• The controller acts as an exchange.
• If one device wants to send data to another, it sends the data to the
controller, which then relays the data to the other connected device.
• A star topology is less expensive than a mesh topology.
• In a star, each device needs only one link and one I/O port to connect it to
any number of others. This factor also makes it easy to install and
reconfigure.

Page 4 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• Far less cabling needs to be housed, and additions, moves, and deletions
involve only one connection: between that device and the hub.
• Other advantages include robustness. If one link fails, only that link is
affected. All other links remain active. This factor also lends itself to easy
fault identification and fault isolation.
• As long as the hub is working, it can be used to monitor link problems and
bypass defective links.
• One big disadvantage of a star topology is the dependency of the whole
topology on one single point, the hub. If the hub goes down, the whole
system is dead.
• Although a star requires far less cable than a mesh, each node must be
linked to a central hub.
• The star topology is used in local-area networks (LANs). High-speed
LANs often use a star topology with a central hub.

(iii) Compare Mesh topology with Star topology. 4M

Ans: (Any 4 Each:


1 mark)
Mesh Topology Star Topology

In a mesh topology, every device has a In star topology, each device has a
dedicated point-to-point link to every dedicated point-to-point link only to a
other device. central controller.

More expensive than star Less expensive than Mesh

More cabling and I/O ports required Less cabling and less I/O ports required

Fault identification and fault isolation Fault identification and fault isolation
easier slightly less easier

More privacy and security Less privacy and security

Because every device must be connected Installation and reconnection are easier.
to every other device, installation and
reconnection are difficult.

Page 5 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

2. Attempt any FOUR of the following: 16 Marks

a) Describe the working of peer-to-peer network. 4M

Ans: Peer to peer network: (Any four


• A peer to peer network is the one in which computers on the network points each: 1
communicate with each other as equals. mark)
• Each computer is responsible for making its own resources available to other
computers on the network. These resources may be files, directories or folders,
devices or applications.
• Each computer is responsible for accessing the network resources it needs from
other peer to peer computers.
• In this each machine has same power.
• Uses less expensive computer hardware.
• Easy to setup & administrator.
• Less secure as all peers are able to access the resources.
• Network Operating System is not required
• It support small Network.

b) State four features of LAN and WAN. 4M

Ans: Features of LAN and WAN (Any four


LAN (Local Area Network): features from
𝟏𝟏
• Covers : Local areas only (e.g. homes, offices, schools) each, Each: 𝟐𝟐
• Definition : LAN (Local Area Network) is a computer network covering a small
mark)
geographic area, like a home, office, school, or group of buildings.
• Speed : High speed (1000 mbps)
• Data transfer rates : LANs have a high data transfer rate.
• Example : The network in an office building can be a LAN.
• Set-up costs: If there is a need to set-up a couple of extra devices on the network,
it is not
• Connection : One LAN can be connected to other LANs over any distance via
telephone lines and radio waves.
• Data Transmission Error : Experiences fewer data transmission errors
Page 6 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• Ownership : Typically owned, controlled, and managed by a single person or
organization.

WAN ( Wide Area Network):


• Covers: Large geographic areas(e.g. cities, states, nations)
• Definition : WAN (Wide Area Network) is a computer network that covers a
broad area (e.g., any network whose communications links cross metropolitan,
regional, or national boundaries over a long distance).
• Speed : Less speed (150 mbps)
• Data transfer rates : WANs have a lower data transfer rate compared to LANs.
• Example : Internet is a good example of a WAN
• Set-up costs: Computers connected to a wide-area network are often connected
through public networks, such as the telephone system. They can also be
connected through leased lines or satellites.
• Connection : Experiences more data transmission errors as compared to LAN
• Data Transmission Error : WANs (like the Internet) are not owned by any one
organization but rather exist under collective or distributed ownership and
management over long distances.
• Ownership : For WANs since networks in remote areas have to be connected

c) Draw a neat sketch and describe the construction of co-axial cable. 4M

Ans: (Neat labelled


Diagram: 2
marks,
Description: 2
marks)

Fig: Construction of Co-axial cable


• Coaxial cable, commonly called coax, has two conductors that share the same axis.
• A solid copper wire or standard wire runs down the center of the cable, rounded by
a second conductor, a wire mesh tube, metallic foil, or both.
• The wire mesh protects the wire from EMI. It is often called the shield.
• A tough plastic jacket forms the cover of the cable, providing protection and
insulation.
d) Give two applications of: 4M

Page 7 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
(i) Modems
(ii) Routers

Ans: Applications of Modem and Router (Any two


Modems: from each
• Used in connecting computers to communicate either wired or wireless Each: 1 mark)
• Used in remote management.
• Used in broadband connectivity
• Used in Point of Sale machines
Routers :
• Used in Connecting multiple LANs
• Used in connecting similar and dissimilar networks
• Used in connecting WAN (Internet) to LAN.

e) State four benefits of network used for centralized management. 4M

Ans: Four benefits of centralized managed network (Each Benefit:


• Centralised administration for higher security. 1 mark)
• Better performance for large number of user.
• Centralized backup can be taken.
• Easy to manage resources.
• Reduces the cost by sharing high cost devices
• Increased Reliability

f) Describe the architecture of bluetooth technology. 4M

Ans: Architecture of Bluetooth Technology (Each


Bluetooth defines two types of networks: piconet and scatternet. architecture:
Piconets 2 marks)
A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight
stations, one of which is called the primary; the rest are called secondaries. All the
secondary stations synchronize their clocks and hopping sequence with the primary.
Note that a piconet can have only one primary station. The communication between
the primary and the secondary can be one-to-one or one-to-many.

Page 8 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

Although a piconet can have a maximum of seven secondaries, an additional eight


secondaries can be in the parked state. A secondary in a parked state is synchronized
with the primary, but cannot take part in communication until it is moved from the
parked state. Because only eight stations can be active in a piconet, activating a station
from the parked state means that an active station must go to the parked state.
Scatternet

Piconets can be combined to form what is called a scatternet. A secondary station in


one piconet can be the primary in another piconet. This station can receive messages
from the primary in the first piconet (as a secondary) and, acting as a primary, deliver
them to secondaries in the second piconet. A station can be a member of two piconets.

3. Attempt any FOUR of the following: 16 Marks

a) Describe the working of server based networks. Where is it used? 4M

Page 9 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Ans: Server-based network (Working: 2
In a server-based network, the server is the central location where users share and access marks, Uses:
network resources. This dedicated computer controls the level of access that users have 2 marks)
to share resources. Shared data is in one location, making it easy to back up critical
business information. Each computer that connects to the network is called a client
computer. In a server-based network, users have one user account and password to log
on to the server and to access shared resources. Server operating systems are designed
to handle the load when multiple client computers access server-based resources.

Fig: Server-based network


Server based network are used for

1. Centralization: Servers help in administering the whole set-up. Access rights and
resource allocation is done by Servers.
2. Proper Management: All the files are stored at the same place. Also it becomes
easier to find files.
3. Back-up and Recovery possible: As all the data is stored on server it’s easy to make
a back-up of it.
4. Up-gradation and Scalability in Client-server set-up: Changes can be made easily
by just upgrading the server. Also new resources and systems can be added by
making necessary changes in server.
5. Accessibility: From various platforms in the network, server can be accessed
remotely.
6. Security: Rules defining security and access rights can be defined at the time of set-
up of server.

b) Draw a neat sketch of Bus topology and describe its working. Give its 4M
advantages.
Ans: Bus topology is a network setup in which each computer and network device are (Diagram: 1
connected to a single cable or backbone by the help of interface connectors. This central mark,
cable is the backbone of the network and is known as Bus. Every workstation Working: 2
communicates with the other device through this Bus. A signal from the source is marks,
broadcasted and it travels to all workstations connected to bus cable. Although the

Page 10 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
message is broadcasted but only the intended recipient, whose MAC address or IP Advantages: 1
address matches, accepts it. If the MAC /IP address of machine doesn’t match with the mark)
intended address, machine discards the signal. A terminator is added at ends of the
central cable, to prevent bouncing of signals. A barrel connector can be used to extend
it.

Fig: Bus Topology


Advantages of Bus topology
a. It is easy to set-up and extend bus network.
b. Cable length required for this topology is the least compared to other networks.
c. Bus topology costs very less.
d. Linear Bus network is mostly used in small networks which are good for LAN.
c) Describe the concept of encapsulation. 4M

Ans: Encapsulation is the process of taking data from one protocol and translating it into (Description:
another protocol, so the data can continue across a network. For example, a TCP/IP 4 marks)
packet contained within an ATM frame is a form of encapsulation. The physical layer
is responsible for physical transmission of the data. Link encapsulation allows local area
networking and Internet Protocol (IP) provides global addressing of individual
computers; Transmission Control Protocol (TCP) adds application or process selection.
During encapsulation, each layer builds a protocol data unit (PDU) by adding a header
(and sometimes trailer) containing control information to the PDU from the layer above.
For example, in the Internet protocol suite, the contents of a web page are encapsulated
with an HTTP header, then by a TCP header, an IP header, and, finally, by a frame
header and trailer. The frame is forwarded to the destination node as a stream of bits,
where it is de-capsulated (or de-encapsulated) into the respective PDUs and interpreted
at each layer by the receiving node. Encapsulation, the more abstract layer is often
called the upper layer protocol while the more specific layer is called the lower layer
protocol. Sometimes, however, the terms upper layer protocols and lower layer
protocols are used to describe the layers above and below IP

Page 11 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

d) Name the protocols used in: 4M


(i) Data Link layer
(ii) Network layer
(iii) Transport layer
(iv) Presentation layer
Ans: 1.Data Link layer: Any 2
• Ethernet Protocols in
• FDDI Fibre Distributed Data Interface Each Layer:
• Frame Relay ½ mark Each)
• L2TP Layer 2 Tunnelling Protocol
• PPP Point-to-Point Protocol
• SLIP Serial Line Internet Protocol
• Token ring

2. Network layer
• ICMP Internet Control Message Protocol
• IGMP Internet Group Management Protocol
• IGRP Interior Gateway Routing Protocol
• IPv4 Internet Protocol version 4
• IPv6 Internet Protocol version 6
• IPSec Internet Protocol Security

3. Transport layer
• AHAH Authentication Header over IP or IPSec
• TCP Transmission Control Protocol
• UDP User Datagram Protocol

4. Presentation layer
• Network Data Representation
• Netware Core Protocol
• MIDI (Musical Instrument Digital Interface)
Page 12 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• Telnet (a remote terminal access protocol)
• X.25 Packet Assembler/Disassembler Protocol (PAD)

e) State the reasons for having a layered architecture in OSI reference model. 4M

Ans: The reasons of having a layered architecture in OSI reference model are as follows: (Any 4
1. It simplifies the design process as the functions of each layers and their interactions reasons: 1
are well defined. mark Each)
2. The layered architecture provides flexibility to modify and develop network services.
3. The number of layers, name of layers and the tasks assigned to them may change from
network to network. But for all the networks, always the lower layer offers certain
services to its upper layer.
4. The concept of layered architecture redefines the way of convincing networks. This
leads to a considerable cost savings and managerial benefits.
5. Addition of new services and management of network infrastructure become easy.
6. Due to segmentation, it is possible to break complex problems into smaller and more
manageable pieces.
7. Logical segmentation helps development taking place by different terms.

f) Compare TCP and UDP. 4M

Ans: (Any 4
differentiation
TCP UDP : 1 mark
TCP is connection oriented protocol UDP is connectionless protocol. Each)
TCP is more reliable than UDP UDP is less reliable than TCP
TCP is slower for data sending than TCP. UDP is faster for data sending than TCP
TCP makes checks for errors and reporting. UDP makes error checking but no repor
TCP gives guarantee that the order of data at UDP has no such guarantee.
receiving end is same as on sending end
TCP is 20 bytes Header size of UDP is 8 bytes.
TCP is heavy weight as it needs three UDP is light weight.
packets to setup a connection
TCP has acknowledgement segments UDP has no acknowledgement
TCP is used for application that require high UDP is used for application that are tim
reliability but less time critical sensitive but require less reliability
4. Attempt any FOUR of the following: 16 Marks

a) Differentiate IPV4 and IPV6. 4M

Ans: (Any 4
differentiation
IPv4 IPv6 : 1 mark
Each)

Page 13 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Source and destination addresses are 32 bits Source and destination addresses are 128
(4 bytes) in length. bits (16 bytes) in length. For more
information.
Uses broadcast addresses to send traffic to There are no IPv6 broadcast addresses.
all nodes on a subnet. Instead, multicast scoped addresses are
used.
Fragmentation is supported at originating Fragmentation is not supported at routers. It
hosts and intermediate routers. is only supported at the originating host.
IP header includes a checksum. IP header does not include a checksum.
IP header includes options. All optional data is moved to IPv6 extension
headers.
IPsec support is optional. IPsec support is required in a full IPv6
implementation.
No identification of payload for QoS Payload identification for QoS handling by
handling by routers is present within the routers is included in the IPv6 header using
IPv4 header. the Flow Label field.
Addresses must be configured either Addresses can be automatically assigned
manually or through DHCP. using stateless address auto configuration,
assigned using DHCPv6, or manually
configured.
Uses host address (A) resource records in Uses host address (AAAA) resource records
the Domain Name System (DNS) to map in the Domain Name System (DNS) to map
host names to IPv4 addresses. host names to IPv6 addresses.
b) Explain the protocols ARP and RARP. 4M

Ans: ARP (Address Resolution Protocol): (ARP: 2


ARP is a protocol for mapping an Internet Protocol address (IP address) to a physical marks,
machine address that is recognized in the local network. For example, in IP Version 4, RARP: 2
the most common level of IP in use today, an address is 32 bits long. In an Ethernet local marks)
area network, however, addresses for attached devices are 48 bits long. (The physical
machine address is also known as a Media Access Control or MAC address.) A table,
usually called the ARP cache, is used to maintain a correlation between each MAC
address and its corresponding IP address. ARP provides the protocol rules for making
this correlation and providing address conversion in both directions.

RARP (Reverse Address Resolution Protocol):


RARP is a protocol by which a physical machine in a local area network can request
to learn its IP address from a gateway server's Address Resolution Protocol (ARP)
table or cache. A network administrator creates a table in a local area networks
gateway router that maps the physical machine (or Media Access Control - MAC
address) addresses to corresponding Internet Protocol addresses. When a new machine
is set up, its RARP client program requests from the RARP server on the router to be
sent its IP address. Assuming that an entry has been set up in the router table, the
RARP server will return the IP address to the machine which can store it for future
use.

Page 14 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
c) Draw a sketch indicating the construction of fibre optic cable. State four 4M
advantages over electrical cables.
Ans: (Diagram: 2
marks, Four
advantages: ½
marks each)

Core: This is the physical medium that transports optical data signals from an attached
light source to a receiving device. The core is a single continuous strand of glass or
plastic that’s measured in microns (µ) by the size of its outer diameter. The larger the
core, the more light the cable can carry.

Cladding: This is the thin layer that surrounds the fibre core and serves as a boundary
that contains the light waves and causes the refraction, enabling data to travel
throughout the length of the fibre segment.

Coating: This is a layer of plastic that surrounds the core and cladding to reinforce and
protect the fibre core. Coatings are measured in microns and can range from 250 to
900 microns.

Strengthening fibres: These components help protect the core against crushing forces
and excessive tension during installation. The materials can range from Kevlar® to
wire strands to gel-filled sleeves.

Cable jacket: This is the outer layer of any cable. Most fibre optic cables have an
orange jacket, although some types can have black or yellow jackets.

Advantages of optical fibre:


1. Extremely High Bandwidth.
2. Optical Fibre Transmission Distance
3. Easy to Accommodate Increasing Bandwidth
4. Resistance to Electromagnetic Interference
5. Secure Transmissions.

d) Describe the various IP address classes with suitable example. 4M

Ans: An IP address is 32-bit address that uniquely and universally defines the connection (List: 1 mark,
off a device (for example, a computer or a router) to the Internet Explanation:
IP addresses are classified into 5 classes 3 marks)

1) Class A
2) Class B
Page 15 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
3) Class C
4) Class D
5) Class E

Fig: Classes of IP address

Class A format:

0 network id host id

1byte 3 bytes (24 bits)


(For first byte)In the first field the first bit ‘0’ indicates that it is class A network address.
The next 7 bits are used indicate network id. Rest of the 3 bytes are used to indicate host
id Class A: Minimum value is 0.0.0.0 and maximum value 127.255.255.255

Class B format:

1 0 network id host id

14bits 16 bits (3rd& 4th byte)

Minimum value is 128.0.0.0 to maximum value 191.255.255.255

Class C format:

11 0 network id host id

Page 16 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
21bits 8 bits (4th byte)

Minimum value 192.0.0.0 to maximum value 223.255.255.255

Class D format:

111 0 multi cast address

If first 4 bits are 1110 the IP address belongs to class D

The IPv4 networking standard defines Class D addresses as reserved for multicast.
Multicast is a mechanism for defining groups of nodes and sending IP messages to that
group rather than to every node on the LAN (broadcast) or just one other node (unicast).
Multicast is mainly used on research networks. As with Class E, Class D addresses
should not be used by ordinary nodes on the Internet.

For class D minimum value for multi cast address is 224.0.0.0 and maximum multi class
address is 239.255.255.255

Class E format:
11110 reserved

For class E minimum value for reserved address is 240.0.0.0 to 255.255.255.255

e) Explain the services provided by the transport layer of the OSI model. 4M

Ans: 1. Service Point Addressing: Transport Layer header includes service point address (Any 4
which is port address. This layer gets the message to the correct process on the Services: 1
computer unlike Network Layer, which gets each packet to the correct computer. mark Each)
2. Segmentation and Reassembling: A message is divided into segments; each
segment contains sequence number, which enables this layer in reassembling the
message. Message is reassembled correctly upon arrival at the destination and
replaces packets which were lost in transmission.
3. Connection Control : It includes 2 types:
I. Connectionless Transport Layer: Each segment is considered as an
independent packet and delivered to the transport layer at the destination
machine.
II. Connection Oriented Transport Layer: Before delivering packets, connection
is made with transport layer at the destination machine.

Page 17 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
4. Flow Control: In this layer, flow control is performed end to end.
5. Error Control: Error Control is performed end to end in this layer to ensure that
the complete message arrives at the receiving transport layer without any error.
Error Correction is done through retransmission.
6. Data Integrity: Using checksums, the data integrity across all the delivery layers
can be ensured. These checksums guarantee that the data transmitted is the same
as the data received through repeated attempts made by other layers to have
missing data resent.

f) Draw a neat diagram and describe a wide area network. What are the three 4M
phases of communication in a WAN.

Ans: (Diagram: 1
mark,
Description of
WAN: 1
mark,
Explanation
of Three
phases: 2
marks)

Wide Area Network (WAN)

Wide Area Network is a computer network that covers relatively larger geographical
area such as a state, province or country. It provides a solution to companies or
organizations operating from distant geographical locations who want to
communicate with each other for sharing and managing central data or for general
communication.

WAN is made up of two or more Local Area Networks (LANs) or Metropolitan Area
Networks (MANs) that are interconnected with each other, thus users and computers
in one location can communicate with users and computers in other locations.

Page 18 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
In Wide Area Network, Computers are connected through public networks, such as
the telephone systems, fibre-optic cables, and satellite links or leased lines. The
Internet is the largest WAN in a world. WANs are mostly private and are built for a
particular organization by Internet Service Providers (ISPs) which connects the LAN
of the organization to the internet. WANs are frequently built using expensive leased
lines where with each end of the leased line a router is connected to extend the network
capability across sites.

The three phases of communication in WAN

1. Circuit establishment: The establishment phase involves creating the virtual


circuit between the source and destination devices.
2. Data transfer: Data transfer involves transmitting data between the devices over
the virtual circuit
3. Circuit termination: Circuit-termination phase involves tearing down the virtual
circuit between the source and destination devices.

5. Attempt any FOUR of the following: 16 Marks

a) Explain the various fields in the frame format of UDP with a neat diagram. 4M

Ans: (Diagram: 2
marks,
Explanation
of the field: 2
marks)

Fig:Frame Format of UDP:

Source port number:


This field identifies the sender's port when meaningful and should be assumed to be
the port to reply to if needed. If not used, then it should be zero. If the source host is
the client, the port number is likely to be an ephemeral port number. If the source host
is the server, the port number is likely to be a well-known port number.

Destination port number:


This field identifies the receiver's port and is required. Similar to source port number,
if the client is the destination host then the port number will likely be an ephemeral
Page 19 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
port number and if the destination host is the server then the port number will likely
be a well-known port number.[4]
Length:
A field that specifies the length in bytes of the UDP header and UDP data. The
minimum length is 8 bytes because that is the length of the header. The field size sets
a theoretical limit of 65,535 bytes (8 byte header + 65,527 bytes of data) for a UDP
datagram. The practical limit for the data length which is imposed by the
underlying IPv4 protocol is 65,507 bytes (65,535 − 8 byte UDP header − 20 byte IP
header).
In IPv6 jumbogram it is possible to have UDP packets of size greater than 65,535
bytes. RFC 2675 specifies that the length field is set to zero if the length of the UDP
header plus UDP data is
greater than 65,535.
Checksum:
The checksum field may be used for error-checking of the header and data. This field
is optional in IPv4, and mandatory in IPv6. The field carries all-zeros if unused.

b) Explain the operation of file transfer protocol. 4M

Ans: peration of FTP:When you want to copy files between two computers that are on the (Diagram: 1
same local network, often you can simply "share" a drive or folder, and copy the files mark,
the same way you would copy files from one place to another on your own PC. Explanation:
3 marks)
What if you want to copy files from one computer to another that is halfway around
the world? You would probably use your Internet connection. However, for security
reasons, it is very uncommon to share folders over the Internet. File transfers over the
Internet use special techniques, of which one of the oldest and most widely-used is
FTP. FTP, short for "File Transfer Protocol," can transfer files between any
computers that have an Internet connection, and also works between computers using
totally different operating systems.

Transferring files from a client computer to a server computer is


called "uploading" and transferring from a server to a client is "downloading".

Requirements for using FTP


Page 20 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

1. An FTP client like Auto FTP Manager installed on your computer


2. Certain information about the FTP server you want to connect to:
a. The FTP server address. This looks a lot like the addresses you type to browse
web sites.
Example : Server address is "ftp.videodesk.net".
Sometimes the server address will be given as a numeric address, like
"64.185.225.87".
b. A user name and password. Some FTP servers let you connect to them
anonymously.
For anonymous connections, you do not need a user name and password.

To transfer files, provide your client software (Auto FTP Manager) with the server
address, user name, and password. After connecting to the FTP server, you can use
Auto FTP Manager's File Manager to upload, download and delete files. Using the
File Manager is a lot like working with Windows Explorer.
c) Explain Handoff procedure in mobile communication. 4M

Ans: Hand off procedure in mobile communication: Mobility is the most important (Diagram: 2
feature of a wireless cellular communication system. Usually, continuous service is marks,
achieved by supporting handoff (or handover) from one cell to another. Handoff is the Explanation:
process of changing the channel (frequency, time slot, spreading code, or combination 2 marks)
of them) associated with the current connection while a call is in progress. It is often
initiated either by crossing a cell boundary or by a deterioration in quality of the signal
in the current channel.

Handoff is divided into two broad categories— hard and soft handoffs. They are
also characterized by “break before make” and “make before break.” In hard
handoffs, current resources are released before new resources are used; in soft
handoffs, both existing and new resources are used during the handoff process.

A hard handoff is essentially a “break before make” connection. Under the control of
the
MSC, the BS hands off the MS’s call to another cell and then drops the call. In a hard
handoff,
Page 21 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
the link to the prior BS is terminated before or as the user is transferred to the new
cell’s
BS; the MS is linked to no more than one BS at any given time. Hard handoff is
primarily
used in FDMA (frequency division multiple access) and TDMA (time division
multiple access),
where different frequency ranges are used in adjacent channels in order to minimize
channel interference. So when the MS moves from one BS to another BS, it becomes
impossible
for it to communicate with both BSs (since different frequencies are used).
A hard handoff occurs when the old connection is broken before a new connection is
activated.
The performance evaluation of a hard handoff is based on various initiation criteria

d) What are the situations under which gateways are used in networks? 4M

Ans: Following are the situations under which Gateways are used in a network : (List Any four
• Gateways are specifically made to connect dissimilar networks together situation
• A gateway is a node (router) in a computer network, a key stopping point for data on Each: 1 mark)
its way to or from other networks. The Internet wouldn't be any use to us without
gateways (as well as a lot of other hardware and software).
• In a workplace, the gateway is the computer that routes traffic from a workstation to
the outside network that is serving up the Web pages. For basic Internet connections
at home, the gateway is the Internet Service Provider that gives you access to the
entire Internet.
• On the Internet, the node that's a stopping point can be a gateway or a host node.
• A computer that controls the traffic your Internet Service Provider (ISP) receives
is a node.
• If you have a wireless network at home that gives your entire family access to the
Internet, your gateway is the modem (or modem-router combo) your ISP provides so
you can connect to their network. On the other end, the computer that controls all of
the data traffic your Internet Service Provider (ISP) takes and sends out is itself a
node.
• When a computer-server acts as a gateway, it also operates as a firewall and a proxy
server. A firewall keeps out unwanted traffic and outsiders off a private network. A
proxy server is software that "sits" between programs on your computer that you use
(such as a Web browser) and a computer server—the computer that serves your
network. The proxy server's task is to make sure the real server can handle your
online data requests.
e) Compare OSI and TCP/IP network model. 4M

Ans: Following are some major differences between OSI Reference Model and TCP/IP (Any four
Reference Model difference: 1
OSI TCP/IP Mark each)

Page 22 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
1. OSI is a generic, protocol 1. TCP/IP model is based on
independent standard, acting as a standard protocols around which
communication gateway between the Internet has developed. It is a
the network and end user. communication protocol, which
allows connection of hosts over a
network.
2. In OSI model the transport 2. In TCP/IP model the transport
layer guarantees the delivery of layer does not guarantees delivery
packets. of packets. Still the TCP/IP model
is more reliable.
3. Follows vertical approach. 3. Follows horizontal approach.
4. OSI model has a separate 4. TCP/IP does not have a separate
Presentation layer and Session Presentation layer or Session
layer. layer.
5. OSI is a reference model 5. TCP/IP model is, in a way
around which the networks are implementation of the OSI model.
built. Generally it is used as a
guidance tool.
6. Network layer of OSI model 6. The Network layer in TCP/IP
provides both connection model provides connectionless
oriented and connectionless service.
service.
7. OSI model has a problem of 7. TCP/IP model does not fit any
fitting the protocols into the protocol
model.
8. Protocols are hidden in OSI 8. In TCP/IP replacing protocol is
model and are easily replaced as not easy.
the technology changes.
9. OSI model defines services, 9. In TCP/IP, services, interfaces
interfaces and protocols very and protocols are not clearly
clearly and makes clear separated. It is also protocol
distinction between them. It is dependent.
protocol independent.
10. It has 7 layers 10. It has 4 layers

Page 23 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

Fig: Diagrammatic Comparison between OSI Reference Model and TCP/IP


Reference Model

f) Name the topology which combines two or more topologies. What are its 4M
advantages? Draw a neat diagram of the same.
Ans: Hybrid topology combines two or more topologies. (Topology
Advantages: identification:
1) Reliable : Unlike other networks, fault detection and troubleshooting is easy in 1 mark ,
this type of topology. The part in which fault is detected can be isolated from the rest Advantages: 1
of network and required corrective measures can be taken, WITHOUT affecting the mark ,
functioning of rest of the network. Diagram: 2
2) Scalable: Its easy to increase the size of network by adding new components, marks)
without disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of the
organization and by optimizing the available resources. Special care can be given to
nodes where traffic is high as well as where chances of fault are high.
4) Effective: we can design it in such a way that strengths of constituent topologies
are maximized while there weaknesses are neutralized. For example we saw Ring
Topology has good data reliability (achieved by use of tokens) and Star topology has
high tolerance capability

Page 24 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

Fig: Hybrid Topology

6. Attempt any TWO of the following: 16 Marks

a) 8M
Draw a neat diagram showing the layers of OSI model and state the function of
each layer.
Ans:
The ISO - OSI REFERENCE Model Layers (Diagram: 3
marks,
Functions: 5
marks)

Page 25 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
The OSI model takes the task of internetworking and divides that up into what is
referred to as a vertical stack that consists of the following 7 Layers
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio
signal — through the network at the electrical and mechanical level. It provides
the hardware means of sending and receiving data on a carrier, including defining
cables, cards and physical aspects. .
Data Link (Layer 2)
At OSI Model, Layer 2, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and handles errors in the
physical layer, flow control and frame synchronization. The data link layer is divided
into two sub layers: The Media Access Control (MAC) layer and the Logical Link
Control (LLC) layer. The MAC sub layer controls how a computer on the network
gains access to the data and permission to transmit it. The LLC layer controls
frame synchronization, flow control and error checking.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known
as virtual circuits, for transmitting data from node to node. Routing and forwarding
are functions of this layer, as well as addressing, internetworking, error
handling, congestion control and packet sequencing.
Transport (Layer 4)
Model, Layer 4, provides transparent transfer of data between end systems, or hosts,
and is responsible for end-to-end error recovery and flow control. It ensures complete
data transfer from source to destination.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection
coordination.
Presentation (Layer 6)
This layer provides independence from differences in data representation
(e.g., encryption) by translating from application to network format, and vice versa.
The presentation layer works to transform data into the form that the application layer
can accept. This layer formats and encrypts data to be sent across a network,
providing freedom from compatibility problems. It is sometimes called the syntax &
semantics
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Everything at this
layer is application-specific. This layer provides application services for file

Page 26 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
transfers, e-mail, and other network software services. Telnet and FTP are
applications that exist entirely in the application level. . All the applications are
residing in this layer.

b) Explain the terms: 8M


(i) Subnetting
(ii) Supernetting
(iii) Masking
(iv) Classless IP addressing with suitable examples.

Ans: (i) Subnetting: Logically separated network A subnet short for sub network is an (Description
identifiably separate part of an organization's network. Typically, a subnet may of each term:
represent all the machines at one geographic location, in one building, or on the 2 marks)
same local area network (LAN). Having an organization's network divided into
subnets allows it to be connected to the Internet with a single shared network
address. Without subnets, an organization could get multiple connections to the
Internet, one for each of its physically separate subnetworks, .

(ii) Supernetting : A supernetwork, or supernet, is an Internet Protocol (IP)


network that is formed, for routing purposes, from the combination of two or more
networks (or subnets) into a larger network. The new routing prefix for the
combined network represents the constituent
networks in a single route table entry. The process of forming a supernet is
called supernetting, prefix aggregation, route aggregation, or route
summarization
Supernetting within the Internet serves as a preventive strategy to avoid
topological
fragmentation of the IP address space by using a hierarchical allocation system
that
delegates control of segments of address space to regional network service
providers.[1] This method facilitates regional route aggregation.
The benefits of supernetting are conservation of address space and efficiencies
gained
in routers in terms of memory storage of route information and processing
overhead
when matching routes. Supernetting, however, has risks.

(iii) Masking : In computing world mask is data that are used for bitwise operations,
particularly in a bit field mask, multiple bits in a byte, nibble, word (etc.) can be
set either on, off or inverted from on to off (or vice versa) in a single bitwise
operation. if you take the example of IP Address masking where in subnet mask
of class C 255.255.255.0 will be masking first 3 digits that meanse first three
octate can not be changed for keeping yourself the part of the same network.
Thus here mask decides host part of an IP address & a network part of an IP
address
Page 27 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

(iv) Classless IP address : Using a classful IP addressing format worked well when
the Internet was relatively small. But as the number of networks on the Internet
grew, the limitations of classful addresses became apparent. The Class A address
space contains only 125 usable networks in the range 0–127 because networks 0
and 127 are reserved, and network 10 is used for private addressing. Each of these
125 Class A networks could theoretically contain 224 – 2 or 16,777,214 hosts, but
it's not realistic to have more than 16 million hosts on the same network.
Therefore, the Internet moved away from a classful address space to a classless
address space. In other words, the number of bits used for the network portion of
an IP address became variable instead of fixed.

The network portion of classful IP addresses is fixed. For the network portion of an
IP address, Class A addresses use 8 bits, Class B addresses use 16 bits, and Class
C addresses use 24 bits. A router could determine the address class by inspecting
the first byte of the address. A value of 1–126 is Class A, 128–191 is Class B, and
192–223 is Class C.

For classless IP addressing, there is no longer a relationship between the number


of bits used in the network portion and the value of the first byte of the address. A
different method has to be used to determine the size of the network portion of an
IP address. This new method allows you to borrow bits that are normally used for
the host portion of an IP address, and use them to extend the network portion of an
IP address.
c) With the help of neat diagram describe: 8M
(i) Single mode step index
(ii) Single mode graded index
(iii)Multimode step index
(iv)Multimode graded index fibre

Ans: Single Mode cable: Is a single stand that has one mode of transmission. Single Mode (Description
Fiber with a relatively narrow diameter, through which only one mode will propagate. of each point:
2 marks)
Single Modem fiber is used in many applications where data is sent at multi-frequency
(WDM Wave-Division-Multiplexing) so only one cable is needed - (single-mode on
one single fiber)

Single-mode fiber gives you a higher transmission rate. Single-mode fiber has a much
smaller core than multimode. The small core and single light-wave virtually eliminate
any distortion that could result from overlapping light pulses, providing the least
signal attenuation and the highest transmission speeds of any fiber cable type.

Page 28 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

jump to single mode fiber

Multi-Mode cable : has a little bit bigger diameter, Multimode fiber gives you high
bandwidth . Light waves are dispersed into numerous paths, or modes, as they travel
through the cable.

In Single mode light takes single path through the fiber core. Step index means sharp
step in the index of refraction between core and cladding interface. This indicates that
in step index, core and cladding have their own constant index of refractions N1 and
N2 respectively.

Single Mode Graded Index

Page 29 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

Step-Index Multimode Fiber: has a large core, up to 100 microns in diameter. As a


result, some of the light rays that make up the digital pulse may travel a direct route,
whereas others zigzag as they bounce off the cladding. These alternative pathways
cause the different groupings of light rays, referred to as modes, to arrive separately at
a receiving point.

Multimode Graded Index Fiber:

One way to reduce the modal dispersion in multimode fiber is to change the fiber's
optical characteristics to compensate for the problem. By modifying the refractive
index of the glass through very precise manufacturing techniques, the light can be
made to travel more slowly than light that is bouncing around in modes near the
outside of the core. The shorter paths are made slower so that they are held back to the
pace of the faster (but longer) paths. The light that travels farther travels faster and the
light that travels less travels slower. The net effect is that the light pulse stays together
and doesn't spread out in the way that it would with non-Graded Index fiber. A graded
index fiber typically transmits roughly 800 modes. The core fiber has a varying
refractive index. The core is clad with a glass with a lower refractive index, just like
non-GI multimode, to cause stray light to bounce back into the cable.

Step index single mode fibers :

• The light energy in a single-mode fiber is concentrated in one mode only.


• This is accomplished by reducing ∆ and or the core diameter to a point where the V
is less than 2.4.
• In other words, the fiber is designed to have a V number between 0 and 2.4.
• This relatively small value means that the fiber radius and ∆, the relative refractive
index difference, must be small.
No intermodal dispersion exists in single mode fibers because only one mode exists
Contd.

Page 30 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• With careful choice of material, dimensions and λ, the total dispersion can be made
extremely small, less than 0.1 ps /(km × nm), making this fiber suitable for use with
high data rates.
• In a single-mode fiber, a part of the light propagates in the cladding.
• The cladding is thick and has low loss.
• Typically, for a core diameter of 10 µm, the cladding diameter is about 120 µm.
• Handling and manufacturing of single mode step index fiber is more difficult.

Single - Mode Graded Index Fiber: In fiber optics, a graded index is an optical
fiber whose core has a refractive index that decreases with increasing radial distance
from the optical axis of the fiber . Because parts of the core closer to the fiber axis
have a higher refractive index than the parts near the cladding, light rays
follow sinusoidal paths down the fiber. The most common refractive index profile for
a graded-index fiber is very nearly parabolic. The parabolic profile results in continual
refocusing of the rays in the core, and minimizes modal dispersion.

WINTER – 16 EXAMI NATION


Model Answer XXXXX
Subject Code:

Q. Sub Answer Marking


No. Q. Scheme
N.

Page 31 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________

Page 32 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills).
4) While assessing figures, examiner may give credit for principal components indicated in the Figure. The
figures drawn by candidate and model answer may vary. The examiner may give Credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed Constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgment on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on Equivalent
concept.
Marks

1.(A)Attempt any SIX: 6 × 2 = 12

(a) Define Computer Network.


(Definition - 2 marks)

Ans:
A computer network is a group of computer systems and other computing hardware devices that are
linked together through communication channels to facilitate communication and resource-sharing
among a wide range of users.

Page 1 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(b) List two applications of Computer Network.


(Any two Applications - 1 mark each)

Ans:
Applications of Computer Network
 Banking
 Video conferencing
 Marketing
 School
 Radio
 Television
 E-mail
 Companies

(c) Define Network topology. List types of Network topologies


(Definition - 1 mark; Listing - 1 mark)
Ans:
Network Topology refers to layout of a network. How different nodes in a network are connected to
each other and how they communicate is determined by the network's topology.
Types of Network Topology
Mesh Topology
Bus Topology
Star Topology
Ring Topology
Tree Topology
Hybrid Topology

Page 2 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(d) State two features of (i) TELNET (ii) FTP.


(Any features - ½ marks for each Feature)
Ans:
1. TELNET
TELNET is a protocol that allows you to connect to remote computers (called hosts) over
a TCP/IP network (such as the Internet). Using telnet client software on your computer,
you can make a connection to a telnet server (i.e., the remote host)
1. TELNET is a specialized service that lets you use one computer to access the contents of
another computer a telnet host.
2. A telnet program creates a “Window” into the host so you can access files, issue commands,
and exchange data.
3. Telnet is widely used by libraries to allow visitors to look up information, find articles and so on
4. Telnet allows a user who login on any other computer on the network.
5. Telnet sends data in clear text.
2. FTP.
FTP is a stranded mechanism provided by the Internet for copying a file from one host to the other.
Some of the problem in transferring files from one system to the other is as follows:
1. Two systems may use different file name conventions.
2. Two systems may represent text data in different types. The directory structure of the two
systems may be different.
3. FTP provides a simple solution to all these problems.
4. FTP established two connections between the client and server. One is for data transfer and the
other is for the control information.
5. The fact that FTP separates control and data makes it very efficient.
6. The control connection uses simple rules of communication. Only one line of command or a
line of response is transferred at a time.
7. But the data connection uses more complex rules due to the variety of data types being
transferred.
8. FTP uses port 21 for the control connection and port 20 for the data connection.

Page 3 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(e) State the criteria for selection of transmission media.


(Any four criteria - ½ marks each)

Ans:
Criteria to be considered:
Type of medium.
No of conductors/connectors.
Flexibility.
Durability.
Bandwidth.
Reliability of connection
Required speed
Distance (segment length )
Ease of installation and maintenance access
Technical expertise required to install and configure
Resistance to internal EMI, cross talk of parallel wires
Resistance to external EMI outside the cable.
Attenuation
Cost
Bending Radius

Page 4 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(f) Draw and label fiber optics cable.


(Diagram - 1 mark; Labeling - 1 mark)
Ans:

(g) Define (i) Protocol (ii) Encapsulation


(Definition - 1 mark each)

Ans:
Protocol: There are certain rules that must be followed to ensure proper communication & a set
of such rules and regulation is known as protocol.
Encapsulation: Encapsulation is the process of adding the headers and footers to the data.

Page 5 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(h) Differentiate between IPV4 & IPV6. (two point)


(Any two points -1 mark each)
Ans:

IPv4 IPv6
1. Source and destination addresses are 32 bits 1. Source and destination addresses are 128bits
(4 bytes) in length. (16 bytes) in length.
2. Uses broadcast addresses to send traffic to all 2. There are no IPv6 broadcast addresses.
nodes on a subnet. Instead, multicast scoped addresses are used.
3. Fragmentation is supported at originating hosts 3. Fragmentation is not supported at routers. It
and intermediate routers. is only supported at the originating host.
4. IP header includes a checksum. 4. .IP header does not include a checksum
5. IP header includes options. 5. All optional data is moved to IPv6 extension
headers.
6. IPsec support is optional 6. IPsec support is required in a full IPv6
implementation.

(B) Attempt any TWO: 2 × 4=8

(a) Classify Networks on the basis of their geography and define.


(Classification - 1 mark; Definition - 3 marks)

Ans:
Classification of network by their geography:
LAN - Local Area Network
MAN - Metropolitan Area Network
WAN - Wide Area Network
CAN - Campus Area Network
PAN - Personal Area Network

Page 6 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

PAN: A PAN is personal area network is used for communication among computer devices close to
one’s person. Wireless networking or Bluetooth technologies are the some examples of PAN. The
communication network established for the purpose of connecting computer devices of personal use
is known as the PAN.

CAN: CAN is a Campus Area Network is used to connect buildings across campuses of colleges or
Universities. A CAN is actually a type of LAN. It is larger than a LAN but smaller than MAN.CAN
is a network that connects two or more LANs but that is limited to a specific and contiguous
geographical area such as a college campus, industrial complex or military base.

LAN: LAN is local area network. LAN is privately-owned networks covering a small geographic
area(less than 1 km), like a home, office, building or group of buildings. LAN transmits data with a
speed of several megabits per second.

MAN: A Metropolitan Area Network (MAN) is a large computer network that spans a metropolitan
area or campus. A MAN typically covers an area up to 10 kms (city). The best example of MAN is
the cable Television network, available in many cities. For an organization, the common use of a
MAN is to extend their LAN connectivity between buildings/offices that are within the same city or
urban area (hence the name Metropolitan Area Network). The organization can pass their Ethernet
frames to the service provider MAN; the service provider will carry their frames across the MAN;
and then deliver the frames to the destination site. From the customer's point of view, the MAN
looks like one big (long) Ethernet link between their offices. The different sites could belong to the
same IP subnet, and from the customer's viewpoint, no routing is required between their sites.

WAN: WAN is wide area network. WAN is a long-distance communication network that covers a
wide geographic area, such as state or country. The most common example is internet. A WAN
provides long-distance transmission of data, voice, image and video information over larger
geographical areas that may comprise a country or even whole world.

(b) Name the topology which is combination of different topologies. Explain it with advantages.
(Name of topology - 1 mark; Explanation - 2 marks; advantages - 1 mark)
Ans:
Name of topology: Hybrid Topology
Hybrid Topology:-A combination of two or more different topologies makes for a hybrid topology.
When different topologies are connected to one another, they do not display characteristics of any
one specific topology.
Working of Hybrid Topology The Hybrid topology scheme combines multiple topologies into one
large topology. The hybrid network is common in large wide area networks. Because each topology

Page 7 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

has its own strengths and weaknesses, several different types can be combined for maximum
effectiveness.

Advantages of Hybrid Topology


1) Reliable: Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the functioning of rest of the
network.
2) Scalable: It’s easy to increase the size of network by adding new components, without
disturbing existing architecture.

3) Flexible: Hybrid Network can be designed according to the requirements of the organization
and by optimizing the available resources. Special care can be given to nodes where traffic is
high as well as where chances of fault are high
4) Effective: Hybrid topology is the combination of two or more topologies, so we can design it in
such a way that strengths of constituent topologies are maximized while there weaknesses are
neutralized.

(c) List and describe criteria for selection of Network topology.


(Listing criteria - 1 mark; Description of any three criteria - 3 marks)
Ans:
Selection criteria for selecting network topology:
Size of the network & number of devices or nodes being connected.
Ease of configuration & installing.
The ease of adding new device in an existing network.

Page 8 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

The ease of fault indication & reflection.


Number of physical links required to be used for connecting the devices.
Need of network connecting devices such as repeaters, switches, hubs etc.
Costs involved.
Need of security.
Need of network administration.
Description:
1. Size of network: Size of network vary according to the company requirement and budget.
2. Configuration & Installation: This process should be simple & easy.
3. Adding new devices: Adding new nodes to the network topology should be easy & it should
not affect the other nodes.
4. Fault identification: Fault should be easily recognizable and proper remedy should be
available.

Page 9 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

2. Attempt any FOUR: 4 × 4 =16

(a) State the difference between server based network and peer to peer network.
(Any Four Points - 1 mark each)

Ans:

Server based network Peer to Peer


1. It is much like company uses centralized 1. It is much like company uses decentralized
management. management.
2. In this server has more power & client has 2.In this each machine has same power
less power.
3. It is hardware intensive. 3. Uses less expensive computer hardware.
4. Complex to setup & require professional 4. Easy to setup & administrator.
administrator.
5.Very secure 5.Less secure
6.Network O.S required 6.Network O.S not required
7.It support large Network 7.It support small Network
8.Better performance 8.Might hurt user's performance

(b) State the functions of (i) Hub (ii) Repeater (iii) Bridge (iv) Router
(Two Functions of Each component - ½ marks each)

Ans:
Hub
 Hub connects all nodes in star topology. Hub is broadcasting device.
 It sends packets to all nodes in the network.
 It works at Physical Layer Of OSI model
Repeater:
 Repeaters are used to take the distorted, weak and corrupt input signal and regenerate this signal
at its output.
 It ensures that the signals are not distorted or weak before it reaches the destination.
 It recreates the bit pattern of the signal, and puts this regenerated signal back on to the
transmission medium.

Page 10 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Bridge
 A bridge device filters data traffic at a network boundary.
 Bridges reduces the amount of traffic on a LAN by dividing it into two segments.
 It inspects incoming traffic and decides whether to forward or discard it.
 It sends packets between two networks of same type.

Router
 Router chooses the best path for packet forwarding.
 Router read complex network address in packet.
 It works at Network Layer of OSI model
 Efficiently direct packets from one network to another, reducing excessive traffic.
 Join neighbouring or distant network
 Connect dissimilar networks.
 Prevent network bottlenecks by isolating portions of a network.

(c) List type of cable. Draw and label the constructional sketch of co-axial cable.
(Listing - 1 mark; Diagram - 2 marks; Labeling - 1 mark)

Ans:
Types of cables:
1. Twisted Pair cable
2. Coaxial cable
3. Fiber optic cable

Page 11 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(d) State the need of transmission media.


(Any relevant four points - 1 mark each)

Ans:
1. Transmission media are needed for interacting with the devices.
2. Without transmission media communication cannot take place.
3. Communication media is the middle part of sender and receiver.
4. It is needed for faster communication.
5. It is needed for reliable delivery of data with efficient methods.
6. It is needed for secure transmission of data

(e) State four benefits of computer networks.


(Any four Points - 1 mark each)

Ans:
1. File sharing
2. Printer sharing
3. Application services
4. E-mail services.
5. Remote access

Page 12 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(f) State characteristics of cables.


(Any Four Points - 1 mark each)

Ans:
1. Bandwidth
2. Transmission impairments
3. Interference
4. Number of receivers
5. Range of communication

3. Attempt any FOUR : 16

(a) Explain which resources can be shared in computer networks.


(Any Four Resources - 1 mark each)
Ans:
1. File sharing: -files can be centrally stored and used by multiple users. Shared directory or disk
drive is used. If many users access same file on network and make changes at same time and
conflict occurs. Network operating system performs file sharing and provides security to share
files.
2. Printer sharing: Printer connected in a network can be shared in many ways . Use printer
queues on server. Here printer is connected to server. Each work station can access printer
directly. Printer can be connected to server. Connect a printer to a computer in a network and
run special print server software. Use built in print server. Use dedicated print server. By printer
sharing reduces no. of printers needed. Share costly and high quality printers.
3. Application services: Share application on a network. When applications are centralized,
amount of memory required on disk of work station is reduced. It is easier to administer an
application. It is more secure and reliable. It is faster and convenient.
4. E-mail services. Two types of email systems are available:

1) File based system: Files are stored in shared location on server. Server provides access to
file. Gate way server connects from file based email system to internet.
2) Client server e-mail system: E-mail server contains message and handles e-mail
interconnections. E-mail client functions (also consider other e-mail functions): read mail,
send, compose, forward, delete. E-mail protocols: SMTP, POP etc.

Page 13 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

5. Remote access: Set up remote access service on network operating system. Setup VPN (virtual
private network) on internet terminal services (TELNET).User can access files from remote
location. User can access centralized application or share files on LAN.
6. Disk sharing: Disk connected in a network can be shared in many users / computers also called
as mountain disk or shared volume.
7. Scanner sharing: Scanner connected in a network can be shared in many users/computers.

(b) What is role of Modems in Networking? Explain types of Modems.


(Diagram -1 mark, Explanation - 2 marks; Types - 1 mark)
Ans:

ROLE OF MODEM: MODEM works as modulator as well as demodulator. MODEM convers


analog signal to digital signal and vice versa. In case of networking data has to be transferred from
one location to another location. At present to transfer such a data whatever the infrastructure
(PSTN) is available it is of analog tech. but computer sends digital data to transfer this data to
another location it is needed to convert into analog format so that it can be transferred by using
currently available infrastructure.
Types of Modem:
1. Onboard Modem - Modem built onto the computer motherboard. These Modems cannot be
removed, but can be disabled through a Jumper or CMOS Setup.
2. Internal Modem - Modem that connects to a PCI slot inside a newer desktop computer
or ISA slot on an older computer. The Internal Modem shown at the beginning of this document
is an example of a PCI Modem.
3. External Modem - Modem within a box that connects to the computer externally, usually
the Serial Ports or USB port.

Page 14 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(c) Describe presentation layer of OSI model.


(Diagram - 2 marks; Explanation - 2 marks)

Ans:

Presentation Layer - OSI Model


The primary goal of this layer is to take care of the syntax and semantics of the information
exchanged between two communicating systems. Presentation layer takes care that the data is sent
in such a way that the receiver will understand the information (data) and will be able to use the
data. Languages (syntax) can be different of the two communicating systems. Under this condition
presentation layer plays a role translator.

Fig: Presentation Layer

Page 15 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Functions of Presentation Layer


1. Translation: Before being transmitted, information in the form of characters and numbers
should be changed to bit streams. The presentation layer is responsible for interoperability
between encoding methods as different computers use different encoding methods. It translates
data between the formats the network requires and the format the computer.
2. Encryption: It carries out encryption at the transmitter and decryption at the receiver.
3. Compression: It carries out data compression to reduce the bandwidth of the data to be
transmitted. The primary role of Data compression is to reduce the number of bits to be
transmitted. It is important in transmitting multimedia such as audio, video, text etc.

(d) State name of protocol used at different layers of OSI model.


(2 - Protocols of Each Layer - ½ marks each (Any Four Layer))
Ans
The following are the OSI protocols used in the seven layers of the OSI Model:
1. Physical Layer: Bluetooth, PON, OTN, DSL, IEEE.802.11, IEEE.802.3, L431 and TIA 449.
2. Data Link Layer: ARP, CSLIP, HDLC, IEEE.802.3, PPP, X-25, SLIP, ATM, SDLS and PLIP.
3. Network Layer: Internet Protocol (IPv4), Internet Protocol (IPv6), IPX, AppleTalk, ICMP,
IPSec and IGMP.
4. Transport Layer: Transmission Control Protocol (TCP), UDP, SPX, DCCP and SCTP.
5. Session Layer: PPTP, SAP, L2TP and NetBIOS.
6. Presentation Layer: XDR, TLS, SSL and MIME.
7. Application Layer: HTTP, SMTP, DHCP, FTP, Telnet, SNMP and SMPP.

Page 16 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(e) Explain the concept of encapsulation.


(Diagram - 2 marks; Explanation - 2 marks)
Ans:

In computer networking, the term encapsulation is used to refer to the process of each layer at
the sending computer adding its own header information, in the form of meta-data to the actual
payload (data)
Each layer’s header information would be interpreted and acted upon by a peer layer in another
machine.
Encapsulation is analogous to packing a letter inside an addressed envelope by the sender. Just
like postal envelopes cannot be delivered to the intended recipient without an address, similarly
without the encapsulation headers, data cannot be carried across the computer networks from
the sending computer to the receiving computer.
It is the primary means of communication between peer layers of different computers. For
instance, : the Network layer Header (NH) containing the destination IP address, helps a packet
to be routed to the correct receiving computer : the Data link layer Header (DLH) containing the
destination MAC address, helps a frame to be passed onto the correct next hop neighbor, during
a packets hop by hop journey from the source computer to the receiving computer : the
Transport layer Header (TH) containing the source port and the destination port helps the source
and the destination computers to correctly multiplex/demultiplex data among different
applications (like HTTP, FTP etc.).

Page 17 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(f) Write abbreviation / Acronym of following :


(i) SLIP (ii) PPP (iii) ARP (iv)RARP
(v) FTP (vi) SMTP (vii) DNS (viii) UDP
(½ - marks for each correct abbreviation)
Ans:

i) SLIP: Serial Line Internet Protocol


ii) PPP: Point-to-Point Protocol
iii) ARP: Address Resolution Protocol
iv) RARP: Reverse Address Resolution Protocol
v) FTP: File Transfer Protocol
vi) SMTP: Simple Mail Transfer Protocol
vii) DNS: Domain Name System
viii) UDP: User Datagram Protocol

4. Attempt any FOUR : 16

(a) State meaning of (i) Subnetting (ii) Supernetting with suitable examples.
(Subnetting - 1 mark; Example - 1 mark; Supernetting - 1 mark; Example - 1 mark)

Ans:

Sub-netting: Subnet mask is a net mask with the only real difference being that breaking a larger
Network into smaller parts and each smaller section will use different sets of address numbers.
The subnet mask is 32 bit value that usually express in dotted decimal notation used by IP address.
This is the combination of net-ID and host-ID.

Example:
Consider the subnet mask as 255.255.0.0. Convert the 255.255.0.0 subnet mask to binary.
255.255.0.0 = 11111111 11111111 00000000 00000000 (in binary) add 1s right after the last 1 on
the right (in the middle of the Mask, between the 1s and 0s) I add five 1s to make it look like this:
1111111111111111
11111000 00000000 Using the subnet's formula, this would give us 25 = 32networks
Super-netting: To create a supernetwork, the procedure is to be reversed. The networks are
combined by creating space for a larger number of hosts. To accomplish this, we start with the
default subnet mask of 255.255.255.0 and use some of the bits reserved for the Net id to identify

Page 18 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

the Host id. The following example shows we would create a new supernetwork by combining
four separate subnetworks.
Example: If a packet arrives at the router with the destination address 192.168.64.48, the
supernet mask 255.255.252.0 is applied to the destination address.
11000000.10101000.01000000.00110000 (destination IP address) AND
11111111.11111111.11111100.00000000 (Supernet mask) Returns
11000000.10101000.01000000.00000000

(b) Draw and explain layered structure of TCP/IP model.


(Diagram - 1 mark; Explanation - 3 marks)
Ans:

TCP/IP Reference Model: TCP/IP means transmission control protocol and internet protocol.
Protocols are set of rules which govern every possible communication over the internet. These
protocols describe the movement of data between the host computers or internet. These offer simple
naming and addressing schemes.
Overview of TCP/IP reference model
TCP/IP that is transmission control protocol and the internet protocol was developed by Department
of Defense’s Project Research Agency (ARPA, later DARPA) under the project of network
interconnection.
Originally it was created to connect military networks together, later it was used by government
agencies and universities. It is robust to failures and flexible to diverse networks. Most widely used
protocol for interconnecting computers and it is the protocol of the internet.
Description of different TCP/IP protocols
Layer 1: Host-to-network Layer
1. Protocol is used to connect the host, so that the packets can be sent over it.
2. Varies host to host and network to network.

Page 19 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Layer 2: Internet layer


1. Selection of a packet switching network which is based on a connectionless internetwork
layer is called internet layer.
2. It the layer which holds the whole architecture together.
3. It allows the host to insert the packets.
4. It helps the packet to travel independently to the destination.
5. Order in which packets are received is different from the way they are sent.
6. IP (internet protocol) is used in this layer.

Layer 3: Transport Layer


1. It decides if data transmission should be on parallel path or single path.
2. Functions such as multiplexing, segmenting or splitting on the data done by layer four that is
transport layer.
3. Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
4. Functions of the transport layer are same as the OSI model.
5. Transport layer also arrange the packets sent in sequence.
Layer 4: Application Layer
1. Protocols used in this layer are high level protocols such as TELNET, FTP (file transfer
protocol etc.

(c) Draw the Bluetooth architecture and describe its working.


(Piconet - 2 marks; Scatternet - 2 marks)

Ans:
Bluetooth Architecture
Bluetooth architecture defines two types of networks:
1. Piconet
2. Scattemet

1. Piconet
• Piconet is a Bluetooth network that consists of one primary (master) node and seven active
secondary (slave) nodes.
• Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or stations within the
distance of 10 meters.
• There can be only one primary or master station in each piconet.
• The communication between the primary and the secondary can be one-to-one or one-to-many.
• All communication is between master and a slave. Salve-slave communication is not possible.

Page 20 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

2. Scatternet:
• Scattemet is formed by combining two or more piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station or node can receive messages from the master in the first piconet and deliver the
message to its slaves in other piconet where it is acting as master. This node is also called
bridge slave.
• Thus a station can be a member of two piconets.
• A station cannot be a master in two piconets

Page 21 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(d) Define IP Addressing .List IP Address classes with their range of addresses.
(Define - 1 mark; Classes - 1 mark; range - 2 marks)

Ans:

Internet Protocol IP address is a number (example shown right) used to indicate the location of a
computer or other device on a network using TCP/IP. These addresses are similar to those of your
house; they allow data to reach the appropriate destination on a network and the Internet.
There are two versions of IP addresses used today, IPv4 and IPv6
IP address classes: There are five classes of available IP ranges: Class A, Class B, Class C, Class
D and Class E, while only A, B, and C are commonly used. Each class allows for a range of valid
IP addresses, shown in the following table.
Class Address Range
Class A 1.0.0.0 to 127.255.255.255
Class B 128.0.0.0 to 191.255.255.255
Class C 192.0.0.0 to 223.255.254.255
Class D 224.0.0.0 to 239.255.255.255
Class E 240.0.0.0 to 254.255.255.255

Page 22 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(e) What do you mean by Layered Architecture?


(Diagram - 2 marks; Explanation - 2 marks)

Ans

Fig: Layered Architecture of OSI Reference Model

The OSI reference model is as shown in the figure. There are seven layers in the model. Physical
layer, Data link layer, Network layer, Transport layer, Session layer, Presentation layer,
Application layer. Each layer performs unique and specific task and it offers services to the layer
above it. Each computer on a network uses a series of protocols to perform the functions assigned to
each layer. At the top of the stack is the application layer and at the bottom is the physical medium
which actually connects the computers to form a network. The figure shows the OSI model with
two hosts A and B, communicating with each other Interface: an interface defines the operations
and services offered by lower layer to the upper layer. This is an interface between each pair of
adjacent layers as shown in the figure. Peer: the entities comprising the corresponding layers on
different machines are called as peers. The communication actually takes place between the peers
using the protocols. Exchange of information: at the physical layer the communication is direct that
is, machine a sends a stream of bits to machine B. at higher layers each layer in the sending
machines adds its own information to the message it receives from the layer just above it and passes
the whole package to the layer just below it. The information added by each layer is in the form of

Page 23 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

headers or trailers. At layer 1 the entire package is converted to a form that can be transferred to the
receiving machine.

(f) Compare LAN & WAN.


(Any Four Comparison - 1 mark each)

Ans:
LAN WAN
Covers Local areas only (e.g. homes, offices, Large geographic areas(e.g. cities,
schools) states, nations)
Definition LAN (Local Area Network) is a WAN (Wide Area Network) is a
computer network covering a small computer network that covers a
geographic area, like a home, office, broad area (e.g., any network
school, or group of buildings. whose communications links cross
metropolitan, regional, or national
boundaries over a long distance).
Speed High speed (1000 mbps) Less speed (150 mbps)
Data transfer LANs have a high data transfer rate. WANs have a lower data transfer
rates rate compared to LANs.
Example The network in an office building can Internet is a good example of a
be a LAN WAN
Connection One LAN can be connected to other Computers connected to a wide-
LANs over any distance via telephone area network are often connected
lines and radio waves. through public networks, such as
the telephone system. They can also
be connected through leased lines
or satellites.
Data Experiences fewer data transmission Experiences more data transmission
Transmission errors errors as compared to LAN
Error
Ownership Typically owned, controlled, and WANs (like the Internet) are not
managed by a single person or owned by any one organization but
organization. rather exist under collective or
distributed ownership and
management over long distances.
Set-up costs If there is a need to set-up a couple of For WANs since networks in
extra devices on the network, it is not remote areas have to be connected

Page 24 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

very expensive to do that. the set-up costs are higher.


Geographical Have a small geographical range and Have a large geographical range
Spread do not need any leased generally spreading across
telecommunication lines boundaries and need leased
telecommunication lines
Maintenance Because it covers a relatively small Maintaining WAN is difficult
costs geographical area, LAN is easier to because of its wider geographical
maintain at relatively low costs. coverage and higher maintenance
costs.
Bandwidth High bandwidth is available for Low bandwidth is available for
transmission. transmission.
Congestion Less congestion More congestion

5. Attempt any FOUR : 16

(a) State the application of NIC device driver and client server software.
(NIC device driver application - 2 marks; client server software - 2 marks; any 2 application)

Ans:
Applications of NIC device driver
A driver (sometimes called a device driver) is software that enables a computer to work with a
particular device. Although a device might be installed on a computer, the computer's operating
system cannot communicate with the device until the driver for that device has been installed and
configured
Network interface card (NIC) drivers are computerized instructions and information that are
required for a NIC card to be operational after it is installed into or connected to a computer. It is
the software driver that tells the computer how to work with the device so that the device can
perform its job.

Applications:
There are drivers for nearly every type of computer device and peripheral.
1) The computer's operating system works with the driver to make the device perform.
Printers provide a good illustration of how drivers are used. Printers built by different
manufacturers have different features and functions.
2) It is impossible for computer and operating-system manufacturers to equip new computers
with all the software required to identify and work with every type of printer.
3) Network interface card (NIC) drivers are computerized instructions and information that are
required for a NIC card to be operational after it is installed into or connected to a computer.

Page 25 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

4) These instructions usually are written by highly proficient computer programmers who might
program in a variety of programming languages such as C or C++.
5) A NIC card is a hardware device, and hardware drivers might be thought of as the computer
code or machine language that "drives" hardware or makes it work.

Applications of Client – Server software


1) E-mail clients
A mail server (sometimes also referred to an e-mail server) is a server that handles and delivers
e-mail over a network, usually over the Internet. A mail server can receive e-mails from client
computers and deliver them to other mail servers. A mail server can also deliver e-mails to client
computers. A client computer is normally the computer where you read your e-mails, for example
your computer at home or in your office. Also an advanced mobile phone or Smartphone,
with e-mail capabilities, can be regarded as a client computer in these circumstances.

2) Web browsers
Web browser or browser is a software application used to locate, retrieve and display content on
the World Wide Web, including Web pages, images, video and other files. As a client/server
model, the browser is the client run on a computer that contacts the Web server and requests
information. The Web server sends the information back to the Web browser which displays the
results on the computer or other Internet-enabled device that supports a browser.

3) FTP (file transfer) clients


A File Transfer Protocol client (FTP client) is a software utility that establishes a connection
between a host computer and a remote server, typically an FTP server. An FTP client provides
the dual-direction transfer of data and files between two computers over a TCP network or an
Internet connection. An FTP client works on a client/server architecture, where the host
computer is the client and the remote FTP server is the central server.

Page 26 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(b) Differentiate between TCP and UDP (four points).


(Any - 4 points 1 mark for each)
Ans:

TCP UDP
TCP is transmission control UDP is user datagram protocol.
protocol.

It is connection oriented protocol It is connectionless protocol because data is


because connection must be sent without establishing a connection
establish prior to transmission of between sender and receiver before sending
data. the data.

TCP is reliable protocol because UDP is unreliable because data is delivered


data is delivered with without acknowledgement.
acknowledgement
TCP perform AutoRetransmission UDP does not perform Auto retransmission
if the data is lost.

TCP use flow control UDP does not use flow control.
TCP has high speed of UDP has very high transmission speed.
transmission

(c) Name the types of Handoffs in Mobile Communication and describe Handoff procedure with
suitable diagram.
(1 - mark for naming types of handoffs (any two); 3 - marks for explanation with diagram)
Ans:
Handoffs in Mobile Communication
A handoff refers to the process of transferring an active call or data session from one cell in a
cellular network to another or from one channel in a cell to another. A well-implemented handoff is
important for delivering uninterrupted service to a caller or data session user.
Handoffs may be classified into two types:
Hard handoff
Soft handoff
Queued handoff
Delayed handoff
Forced handoff

Page 27 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

1) Hard Handoff: Characterized by an actual break in the connection while switching from one
cell or base station to another.
2) Soft Handoff: Entails two connections to the cell phone from two different base stations. This
ensures that no break ensues during the handoff. Naturally, it is more costly than a hard handoff.

Handoff procedure with diagram

OR

Page 28 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Cellular networks are composed of cells, each of which is capable of providing telecommunications
services to subscribers roaming within them. Each cell can only serve up to a certain area and
number of subscribers. Thus, when any of these two limits is reached, a handoff ensues.
For instance, if a subscriber moves out of the coverage area of a particular cell while entering
another, a handoff takes place between the two cells. The cell that served the call prior to the
handoff is relieved of its duties, which are then transferred to the second cell. A handoff may also
be triggered when the number of subscribers using a particular cell has already reached the cell’s
maximum limit (capacity). Such a handoff is possible because the reach of the cell sites serving
these cells can sometimes overlap. Thus, if a subscriber is within an overlapping area, the network
may opt to transfer one subscriber's call to the cell involved in the overlap.
Sometimes a handoff can take place even if no limit is breached. For example, suppose that a
subscriber initially inside the jurisdiction of a large cell (served by an umbrella-type cell site) enters
the jurisdiction of a smaller cell (one served by a micro cell). The subscriber can be handed off to
the smaller cell in order to free up capacity on the larger one.

(d) A computer centre is connected in star topology with 8 computers. This set up has to be
converted into Mesh topology. What are the requirements? What are the advantages and
disadvantages of the two systems? Draw the sketches for both the topologies.

(Requirements - 1 mark; advantages and disadvantages - 2 marks; sketches of topologies - 1


mark)

Ans:

In Star topology Devices are connected to Hub/Switch that we have to disconnect and remove the
central device. Now, If we have to connect Eight devices in a mesh topology. How many cables are
needed? How many ports are needed for each device?

Cables needed (8*7)/2 = 28 and,


Each device needs to be connected to 7 other devices. So, each device needs to have 7 ports. Eight
devices times seven ports equals to 56 total ports.

Mesh is having high redundancy. Only one device would be disconnected if all the connections
were to fail for that device. You can have many connections to other devices that’s why it’s less
likely to fail. The only cause of failure at this point is really the power and if you just don't have
any. Even if one of the connections between two devices fail there is no effect on network and they
can still communicate through other channels.

Page 29 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Advantages of Mesh topology

1) Data can be transmitted from different devices simultaneously. This topology can withstand
high traffic.

2) Even if one of the components fails there is always an alternative present. So data transfer
doesn’t get affected.
3) Expansion and modification in topology can be done without disrupting other nodes.

Disadvantages of Mesh topology


1) There are high chances of redundancy in many of the network connections.
2) Overall cost of this network is way too high as compared to other network topologies.
3) Set-up and maintenance of this topology is very difficult. Even administration of the network is
tough.
Advantages of Star Topology
1) As compared to Bus topology it gives far much better performance, signals don’t necessarily get
transmitted to all the workstations. A sent signal reaches the intended destination after passing
through no more than 3-4 devices and 2-3 links. Performance of the network is dependent on
the capacity of central hub.
2) Easy to connect new nodes or devices. In star topology new nodes can be added easily without
affecting rest of the network. Similarly components can also be removed easily.
3) Centralized management. It helps in monitoring the network.
4) Failure of one node or link doesn’t affect the rest of network. At the same time its easy to detect
the failure and troubleshoot it.
Disadvantages of Star Topology
1) Too much dependency on central device has its own drawbacks. If it fails whole network goes
down.
2) The use of hub, a router or a switch as central device increases the overall cost of the network.
3) Performance and as well number of nodes which can be added in such topology is depended on
capacity of central device.

Page 30 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Fig. Star topology Fig. Mesh Topology

(e) Draw the frame format of TCP Header and state the function of various fields.
(Frame format - 2 marks; explanation of all fields - 2 marks)

Ans:
TCP/IP Header Format: TCP segments are sent as internet datagram’s. The Internet Protocol
header carries several information fields, including the source and destination host addresses. A
TCP header follows the internet header, supplying information specific to the TCP protocol. This
division allows for the existence of host level protocols other than TCP.

Page 31 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Source Port (16): The port number of the host sending the data
Destination Port (16): The port number of the application requested on the destination host.
Sequence Number (32): The sequence number of the first data octet in this segment (except
when SYN is present). If SYN is present the sequence number is the initial sequence number
(ISN) and the first data octet is ISN+1. It puts the data back in the correct order or retransmits
missing or damages data, a process called sequencing.
Acknowledgement Number (32): Define which TCP octet expected next. If the ACK control
bit is set this field contains the value of the next sequence number the sender of the segment is
expecting to receive. Once a connection is established this is always sent.
Header Length (4): Stands for header length, which defines the number of 32 bit words in the
header. This indicates where the data begins. The TCP header (even one including options) is
an integral number of 32 bits long.
Unused (6): Reserved for future use, it always set to 0.
Flags (6): Control functions used to set up and terminate a session. Flags from left to right:
o URG: Urgent Pointer field significant
o ACK: Acknowledgment field significant
o PSH: Push Function
o RST: Reset the connection
o SYN: Synchronize sequence numbers
o FIN: No more data from sender

Windows (16): The window size of the sender is willing to accept, in octet. The number of
data octets beginning with the one indicated in the acknowledgment field which the sender of
this segment is willing to accept.
Checksum (16): An error detection code. The checksum field is the 16 bit one's complement
of the one's complement sum of all 16 bit words in the header and text. If a segment contains an
odd number of header and text octets to be check summed, the last octet is padded on the right
with zeros to form a 16 bit word for checksum purposes. The pad is not transmitted as part of
the segment. While computing the checksum, the checksum field itself is replaced with zeros.
Urgent Pointer (16): Indicates the ends of urgent data. This field communicates the current
value of the urgent pointer as a positive offset from the sequence number in this segment. The
urgent pointer points to the sequence number of the octet following the urgent data. This field
is only be interpreted in segments with the URG control bit set.
Options (32): Options may occupy space at the end of the TCP header and are a multiple of 8
bits in length. All options are included in the checksum. An option may begin on any octet
boundary. There are two cases for the format of an option:
Case 1: A single octet of option-kind.
Case 2: An octet of option-kind, an octet of option-length, and the actual option-data octets.
The option-length counts the two octets of option-kind and option-length as well as the option
data octets.

Page 32 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(f) Draw the sketch of bus topology and explain.


(Diagram - 2 marks; explanation - 2 marks)

Ans:
Bus Topology is a network setup in which each computer and network device are connected to a
single cable or backbone. Bus uses a common backbone to connect all devices. A single cable, the
backbone functions as a shared communication medium that devices attach or tap into with an
interface connector. A device wanting to communicate with another device on the network sends a
broadcast message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message.

Advantages of bus topology


It works well when you have a small network.
Easiest network topology for connecting computers or peripherals in a linear fashion.
Requires less cable length than a star topology.

Disadvantages of bus topology


Difficult to identify the problems if the whole network goes down.
It can be hard to troubleshoot individual device issues.
Not great for large networks.
Terminators are required for both ends of the main cable.
Additional devices slow the network down.
If a main cable is damaged, the network fails or splits into two.

Page 33 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

6. Attempt any TWO : 16

(a) Draw and explain the functions of various layer of OSI Reference model.
(Layered structure 1 mark; functions of layers - 7 marks)
(Diagram - 2 marks; explanation of layers functions - 6 marks)
Ans:
OSI model (open system interconnection) model was developed by ISO (international standard
organization)
Function of OSI model
1) It provides way to understand how internet work operates.
2) It gives guideline for creating network standard. OSI model has 7 layers as shown in the
figure.
Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data link Layer

Physical Layer

OSI model has following 7 layers as Physical layer, data link layer, Network layer, Transport
layer, session layer, presentation layer, application layer.
 Physical layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It deals with mechanical and electrical specifications of interface and transmission
medium. For transmission it defines procedures and functions that devices and transmission
medium has to perform.
 Data link layer: It is responsible for transmitting group of bits between the adjacent nodes.
The group of bits is called as frame. The network layer passes a data unit to the data link
layer. Header and trailer is added to the data unit by data link layer. This data unit is passed
to the physical layer. Data link layer is responsible for moving frames from one node to the
next. Functions of data link layer are:

Page 34 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

1) Framing
2) Physical addressing
3) Flow control
4) Error control
5) Media access control
6) Node to node delivery
 Network layer: It is responsible for routing the packets with in the subnet i.e. from source to
destination. It is responsible for source to destination delivery of individual packets across
multiple networks. It ensures that packet is delivered from point of origin to destination.
Functions of network layer
1) logical addressing
2) Routing.
3) Congestion control
4) Accounting and billing
5) Address transformation
6) Source host to destination host error free delivery of packet.

 Transport layer: Responsibility of process to process delivery of message Ensure that whole
message arrives in order.
Functions of Transport Layer:
1) Service point addressing
2) Segmentation and reassembly
3) Connection control
4) Flow control: Flow control is performed end to end
5) Error control
6) Quality of service

 Session layer: Establishes, maintains, synchronizes the interaction among communication


systems It is responsible for dialog control and synchronization
Functions of Session Layer:
1) Dialog control/ Management
2) Synchronization, session and sub session
3) Session closure
 Presentation layer: It is concerned with syntax, semantics of information exchanged between
the two systems.
Functions:
Translation, encryption, compression of the data.
 Application layer: It enables user to access the network. It provides user interfaces and
support for services like email, remote file access.

Page 35 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Functions:
Network virtual terminal, file transfer access and management, mail services and directory
services

(b) Explain protocol used in internet layer in TCP/IP.


(Any - 4 protocols - 2 marks for each)

Ans:

The Internet layer of TCP/IP is responsible for addressing, packaging, and routing functions. The
core protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
1) The Internet Protocol (IP) is a routable protocol responsible for IP addressing, routing, and
the fragmentation and reassembly of packets. It has the task of delivering packets from the
source host to the destination host solely based on the IP address in the packet headers. For
this purpose, IP defines packet structures that encapsulate the data to be delivered. It also
defines addressing methods that are used to label the datagram with source and destination
information.

2) The Address Resolution Protocol (ARP) is responsible for the resolution of the Internet layer
address to the Network Interface layer address such as a hardware address. ARP was defined
by RFC 826 in 1982. ARP is used for mapping a network address (e.g. an IPv4 address) to a
physical address like an Ethernet address (also named a MAC address). ARP has been
implemented with many combinations of network and data link layer technologies

3) The Internet Control Message Protocol (ICMP) is responsible for providing diagnostic
functions and reporting errors due to the unsuccessful delivery of IP packets. It is used by
network devices, like routers, to send error messages indicating, for example, that a requested
service is not available or that a host or router could not be reached. ICMP can also be used to
relay query messages.
4) The Internet Group Management Protocol (IGMP) is responsible for the management of IP
multicast groups. It is used by hosts and adjacent routers on IPv4 networks to establish
multicast group memberships. IGMP is an integral part of IP multicast. IGMP can be used for
one-to-many networking applications such as online streaming video and gaming, and allows
more efficient use of resources when supporting these types of applications. IGMP is used
on IPv4 networks.

Page 36 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

(c) State eight advantages of fiber optic cable over other cables.
(Any 8 advantages - 1 mark for each)

Ans:
Fibre optic cable is one of the fastest-growing transmission mediums for both new cabling
installations and upgrades, including backbone, horizontal, and even desktop applications. Fiber
offers a number of advantages over copper.
1. Greater bandwidth
Fiber provides far greater bandwidth than copper and has standardized performance up to 10 Gbps.
Fiber speeds are dependent on the type of cable used. Single-mode cable offers far greater distance
than either 62.5- or 50-micron multimode cable. In addition, fiber optic cable can carry more
information with greater fidelity than copper wire. That’s why telephone and CATV companies are
converting to fiber.
2. Low attenuation and greater distance
Because the fiber optic signal is made of light, very little signal loss occurs during transmission, and
data can move at higher speeds and greater distances. Fiber does not have the 100-meter (9328-ft.)
distance limitation of unshielded twisted pair copper (without a booster). Fiber distances can range
from 300 meters (984.2 ft.) to 40 kilometers (24.8 mi.), depending on the style of cable, wavelength,
and network. Because fiber signals need less boosting than copper ones do, the cable performs
better.
3. Security
Your data is safe with fiber cable. It doesn’t radiate signals and is extremely difficult to tap. If the
cable is tapped, it’s very easy to monitor because the cable leaks light, causing the entire system to
fail. Fiber networks also enable to put all electronics and hardware in one central location, instead
of having wiring closets with equipment throughout the building.
4. Immunity and reliability
Fiber provides extremely reliable data transmission. It’s completely immune to many environmental
factors that affect copper cable. The core is made of glass, which is an insulator, so no electric
current can flow through. It’s immune to Electro Magnetic interference and radio-frequency
interference (EM/RFI), crosstalk, impedance problems, and more. Fiber is also less susceptible to
temperature fluctuations than copper and can be submerged in water.
5. Design
Fiber is lightweight, thin, and more durable than copper cable. Plus, fiber optic cable has pulling
specifications that are up to 10 times greater than copper cable’s. Its small size makes it easier to
handle, and it takes up much less space in cabling ducts. Although fiber is still more difficult to

Page 37 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

terminate than copper, advancements in connectors are making termination easier. In addition, fiber
is actually easier to test than copper cable.

6. Migration
The proliferation and lower costs of media converters are making copper to fiber migration much
easier. The converters provide seamless links and enable the use of existing hardware. Fiber can be
incorporated into network in planned upgrades.
7. Fieldtermination.

Although fiber is still more difficult to terminate than copper, advancements in fiber tools have
made terminating and using fiber in the field easier. Quick fusion splicers enables with auto-
alignments enable fast splicing in the field. Auto-aligning pins ensure accuracy. And the use of pig-
tails and pre-terminated cable make field connections quick and easy.
8. Cost

The cost for fiber cable, components, and hardware is steadily decreasing. Installation costs for
fiber are higher than copper because of the skill needed for terminations. Overall, fiber is more
expensive than copper in the short run, but it may actually be less expensive in the long run. Fiber
typically costs less to maintain, has less much less downtime, and requires less networking
hardware. And fiber eliminates the need to recable for higher network performance.

Page 38 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER-16 EXAMINATION
Model Answer

Subject Code: 17429 Subject Name: Computer Network

Page 39 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER– 17 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code: 17429
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.

Q. Sub Answer Marking


No. Q. N. Scheme

1. A) Attempt any six : Marks 12

a) Define computer network. 2M

Ans: A network consists of two or more computers that are linked in order to share resources (Definition
(such as printers and CDs), exchange files, or allow electronic communications. The : 2marks)
computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.

b) Give advantages of computer network. 2M

Ans: Advantages of Computer Network (Any 2


advantages
1. File sharing: The major advantage of computer network is that it allows file sharing :2marks)
and remote file access. A person sitting at one workstation that is connected to a
network can easily see files present on another workstation, provided he/she is
authorized to do so.
2. Resource Sharing: A computer network provides a cheaper alternative by the
provision of resource sharing. All the computers can be interconnected using a
network and just one modem & printer can efficiently provide the services to all
users.
3. Inexpensive set-up: Shared resources means reduction in hardware costs. Shared
files means reduction in memory requirement, which indirectly means reduction in
file storage expenses.

Page 1 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

4. Flexible Handling: A user can log on to a computer anywhere on the network and
access his/her files. This offers flexibility to the user as to where he/she should be
during the course of his/her routine.

c) What is hub? Give types of hub. 2M

Ans: HUB: Hub is a connecting device; it is also known as multiport repeater. It is normally (Hub:1
used for connecting stations in a physical star topology All networks require a central mark,
location to bring media segments together. These central locations are called hubs. A hub Types:
organizes the cables and relays signals to the other media segments. 1mark )

There are three main types of hubs:


1. Passive Hub
2. Active Hub
3. Intelligent Hub
d) What are the various network control devices? 2M

Ans: Network Control device: (Listing of


1. Repeater any 4
2. Hub control
3. Switch devices: 1/2
4. Bridge mark each)
5. Router
6. Gateway
7. Modem
e) Why the network cable is twisted? 2M

Ans: Twisted pair cabling is a type of wiring in which two conductors of a single circuit are (Relevant
twisted together for the purposes of canceling out electromagnetic interference (EMI) explanation
from external sources; for instance, electromagnetic radiation from unshielded twisted pair : 2 marks)
(UTP) cables, and crosstalk between neighboring pairs.
f) State any two advantages of coaxial cable. 2M

Ans: 1. Transmits digital signals at a very high speed of 10 Mbps (Any 2


2. Greater channel capacity. advantages
3. Greater bandwidth :1 mark
4. Lower error rates. each)
5. Data Transmission without distortion.
6. Greater spacing between amplifier

g) What is Layered Architecture? 2M

Ans: To reduce the design complexity, most of the networks are organized as a series of layers (Relevant
or levels, each one build upon one below it. Layered architecture is to divide the design explanation
into small pieces. Each layer adds to the services provided by the lower layers in such a : 2 marks)
manner that the highest layer is provided a full set of services to manage communications
and run the applications. The benefits of the layered architecture is modularity and clear
interfaces, i.e. open architecture and comparability between the different provider’s
components.

Page 2 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

h) What is IP address? State IP address classes. 2M

Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., (IP
computer, printer) participating in a computer network that uses the Internet Protocol for address: 1
communication. An IP address serves two principal functions: host or network interface mark,
identification and location addressing. IPv4 address is of 32 bit. Classes
Listing: 1
The IPv4 addresses are classified into 5 types as follows: mark)
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E

B) Attempt any two : Marks 8

a) Explain computer network facilities in terms of centralized network management. 4M

Ans: The Computer network facilitates centralized network management in following aspects (Each
facility: 1
1. Management of Software: Expensive software can be installed on one centralized mark)
computer and they can be accessed by other computers in a network.
2. Maintenance of network: Because of centralized management, maintenance of
network becomes easy an administrator can keep track of network performance, speed
and security from centralized computer
3. Keeping data Backup: It may happen that the data on any one computer system is
accidently lost due to system failure, computer viruses or human error. To avoid this,
data from computer system’s disk is copied to some other medium for keeping it safe.
Such backups are important to retrieve the lost data.
4. Network security: It becomes easy to maintain network with respect to virus and
malware attacks using centralized management

b) Describe router with neat and labeled diagram. State the situation under which 4M
router are necessary in network.

Ans: Router: (Diagram:


1 mark,
 It operates at the network layer. Description
:2 marks,
Situation: 1
 A router normally connects LANs and WANs in the Internet and has a routing table that
mark)
is used for making decisions about the route. The routing tables are normally dynamic
and are updated using routing protocols.

 Routers are devices that help in determining the best path out of the available paths, for
a particular transmission. They consist of a combination of hardware and software.

Page 3 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 The two main kinds of software in a router are the operating system and the routing
protocol.

 Routers use logical and physical addressing to connect two or more logically separate
networks.

 Messages are stored in the routers before re-transmission, routers are said to implement
a store-and-forward technique.

Fig: Router

Situation under which router can be used:

The router is a fundamental building block of modern business networks, providing traffic
with a gateway to both the Internet and other networks. Routers play important roles
on a network, with many combined with other devices such as firewalls, modems and
switches to provide networking solutions.

c) Explain the operation of modem. 4M

Ans: (Diagram:
MODEM: Modem works as modulator as well as demodulator. Modem converts analog 2 marks,
signal to digital signal and vice versa. In case of networking data has to be transferred Explaintion
from one location to another location. At present to transfer such data whatever the :2 marks)
infrastructure (PSTN) is available is of analog technology but computer sends digital data
to transfer this data to another location. Thus it is needed to convert into analog format so
that it can be transferred by using currently available infrastructure

Fig: Modem

Page 4 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

2. Attempt any four : Marks 16

a) What is meant by file sharing and printer sharing? How this can be achieved? 4M

Ans: 1. File sharing: It is the practice of distributing or providing access to digital media, such (Explanatio
as computer programs, multimedia (audio, images and video), documents or electronic n: 1mark
books. Each, How
it can be
File sharing typically involves word-processing files, spreadsheets, and other files to achieved(A
which many people need regular access. It requires a shared directory or disk drive that ny Relevant
many users can access over the network, along with the underlying programming logic answer):
needed to make sure that more than one person doesn’t make changes to a file at the 1mark
same time (called file locking). The reason you don’t want multiple people making each)
changes to a file at the same time is that they might both be making conflicting changes
simultaneously without realizing it.

2. Printer sharing: Printer sharing is beneficial to many users as they can share costly &
higher quality printers. Printer sharing can be done in several different ways on
network.
The most common way is to use printer queues on server. The printer queue holds print
job until any currently running print jobs are finished & then automatically send the
waiting jobs to the printer i.e. printer connected to server. Another way to share printer
on a network is that each workstations accesses the printer directly.

b) State various network features. Explain any one in detail. 4M

Ans: Network features: (State: 2


1. File Sharing marks,
2. Printer Sharing Explanatio
3. Application Services n of any
4. E-mail Services one:
5. Remote access 2marks)
6. Internet & Intranet

1) File sharing: File sharing is the primary feature of network. Due to use of networks,
the sharing of files becomes easier. File sharing requires a shared directory or disk drive to
which many users can access over the network. When many users are accessing the same
file on the network, more than one person can make changes to a file at the same time.
They might both making conflicting changes simultaneously.
2) Printer sharing: Printer sharing is beneficial to many users as they can share costly &
higher quality printers. Printer sharing can be done in several different ways on network.
The most common way is to use printer queues on server. The printer queue holds print
job until any currently running print jobs are finished & then automatically send the
waiting jobs to the printer i.e. printer connected to server. Another way to share printer on
a network is that each workstations accesses the printer directly.

Page 5 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

3) Application services: You can also share application on a network. For example you
can have a shared copy of Microsoft office or some other application & keep it on the
network server. Another application services you can have on the network is shared
installation i.e. contents of CD-ROM copy to the server, then run the installation the
installing application mush faster & more convenient.
4) E- mail services: E-mail is extremely valuable & important feature for communication
within organization or outside the people in world. E-mail service can be used by user in
two different ways: 1. File based 2.Client File based e-mail system requires gateway
server for connecting or handling the e-mail interface between the two systems using
gateway software that is part of the file-based e-mail system. A client-server e-mail
system is one where an e-mail server containing the messages & handles all incoming &
outgoing mail. It is more secure & powerful than file based e-mail system.
5) Remote access: Using this feature user can access their file & e-mail, when they are
travelling or working on remote location. It enables users to access to centralized
application, stored private or shared files on LAN.
6) Internet & Intranet: Internet: It is public network. This consists of thousands of
individual networks & millions of computers located around the world. Internets have
many different types of services available such as e-mail, the web & Usenet newsgroups.
Intranet: It is private network or it is company’s own network. Company use this feature
for internal use. For example: company establish its own web server, for placing
documents such as employee handbooks, purchases form or other information that
company publishes for internal use. It also has internet services such as FTP servers or
Usenet servers.

c) Define the following term :


1) Roaming 2) Soft hand off 3) GSM 4) AMPS
Ans: 1) Roaming: It is the ability for a cellular customer to automatically make and receive (Each
voice calls, send and receive data, or access other services, including home data definition:
services, when travelling outside the geographical coverage area of the home network, 1 mark)
by means of using a visited network.
2) Soft hand off: The hand off is known as soft handoff if the MS starts communication
with a new base station without stopping the communication with the older base
station.
3) GSM: (Global System for Mobile communication) is a digital mobile telephony system
which uses a variation of time division multiple access (TDMA). GSM digitizes and
compresses data, then sends it down a channel with two other streams of user data,
each in its own time slot.
4) AMPS: Advanced Mobile Phone Service (AMPS) is a standard system
for analog signal cellular telephone service. It uses FDMA to separate channels in a
link.

Page 6 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

d) With neat diagram, explain satellite communication system. 4M

Ans: Satellite Communication: In satellite communication, signal transferring between the (Diagram:
sender and receiver is done with the help of satellite. In this process, the signal which is 2 marks,
basically a beam of modulated microwaves is sent towards the satellite called UPLINK Explanatio
(6Ghz). Then the satellite amplifies the signal and sent it back to the receiver’s antenna n: 2 marks)
present on the earth’s surface called as DOWNLINK (4Ghz), as shown in the diagram
given

Fig: Satellite Communication


As the entire signal transferring is happening in space. Thus this type of communication is
known as space communication. The satellite does the functions of an antenna and the
repeater together. If the earth along with its ground stations is revolving and the satellite is
stationery, the sending and receiving earth stations and the satellite can be out of sync
over time. Therefore Geosynchronous satellites are used which move at same RPM as that
of the earth in the same direction. So the relative position of the ground station with
respect to the satellite never changes

e) Compare client server and peer to peer network. 4M

Ans: (Any 4
difference
Client server Network Peer to peer network
:1mark
Centralized management. Decentralized management.
each )
In this server has more power & client In this each machine has same power
has less power.
It is hardware intensive. Uses less expensive computer
hardware.
Complex to setup & require Easy to setup & administrator.
professional administrator.
Very secure Less secure
Network O.S required Network O.S not required
It support large Network It support small Network

Page 7 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

f) Explain basic principles of mobile communication. 4M

Ans: 1. The first mobile telephone system had a single channel for both sending and receiving (Any
in as early as 1946. relevant
2. Second development took place in 1960s. This was called Improved Mobile answer: 4
Telephone System (IMTS) marks)
3. It had a strong transmitter and used for two frequencies – one for sending and other for
receiving.
4. The third step was the development of Advanced Mobile Phone system (AMPS), the
area covered is conceptually divided in small regions known as cells, thus the name
cellular phones. Each cell has an antenna and a cell office to control that cell.
5. MTSO controls various such cell offices and coordinates the communication between
them and the Telephone central office
6. Telephone central office is a part of the wired land telephone system.
7. The computer at MTSO is responsible for not only the connections but also for the
information and billing of cells
8. The typical cell radius size is 0 to 12 miles.

3. Attempt any four : Marks 16

a) With neat diagram explain client server network along with its advantages and 4M
disadvantages.
Ans:  The servers stores all the network's shared files and applications programs, such as (Diagram:
word processor documents, compilers, database applications, spreadsheets, and the 1 mark ,
network operating system. Explanatio
 Client will send request to access information from the server based on the request n:1 mark,
server will send the required information to the client. Any 2
Advantages
:1 mark,
Any 2
Disadvanta
ges:1 mark)

 Advantages of Client Server Network:


2) It has the centralized control i.e. centralized user accounts, security, and access to
simplify network administration.
3) It does not slow down with heavy use.
4) The size of the network can be expanded to any size.
5) Proper Management in which all files are stored at the same place. In this way,
management of files becomes easy. Also it becomes easier to find files.
6) As all the data is stored on server it’s easy to make a back-up of it.

Page 8 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

7) Reduces Data duplication by storing data stored on the servers instead of each
client, so it reduces the amount of data duplication for the application.

Disadvantages of Client Server Network:


1) Server failure leads to whole network failure.
2) It is very expensive to install and manage as dedicated hardware (server) and
special software is required.
3) A Professional IT person is required to maintain the servers and other technical
details of network.
b) Explain mesh topology with suitable diagram. 4M

Ans: (Diagram:
2 marks,
Explanatio
n: 2 marks)

 In a mesh network topology, each of the network node, computer and other devices,
are interconnected with one another.
 Every node not only sends its own signals but also relays data from other nodes.
 In fact a true mesh topology is the one where every node is connected to every other
node in the network.
 This type of topology is very expensive as there are many redundant connections, thus
it is not mostly used in computer networks.
 It is commonly used in wireless networks.
 Flooding or routing technique is used in mesh topology.

c) Describe the OSI model with neat diagram. 4M

Ans: OSI model (open system interconnection) model was developed by ISO (international (Diagram:
standard organization) 1 mark,
Explanatio
Function of OSI model: n: 3 marks)

i. It provides way to understand how internetwork operates.


ii. It gives guideline for creating network standard.

Page 9 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

OSI model has 7 layers as shown in the figure.

Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer

OSI model has following 7 layers as Physical layer, data link layer, Network layer,
Transport layer, session layer, presentation layer, application layer.

1. Physical layer:
o It co-ordinates the functions required to transmit bit stream over physical medium.
o It deals with mechanical and electrical specifications of interface and transmission
medium.
o For transmission it defines procedures and functions that devices and transmission
medium has to perform
 Physical characteristics of interfaces and media.
 Representation of bits: Data rate (transmission rate).
 Synchronization of bits.
 Line configuration: Point to point or multipoint configuration should be
used.

2. Data link layer:


o It is responsible for transmitting group of bits between the adjacent nodes. The
group of bits is called as frame.
o The network layer passes a data unit to the data link layer.
o Header and trailer is added to the data unit by data link layer.
o This data unit is passed to the physical layer.
o Data link layer is responsible for moving frames from one node to the next.
o Functions of data link layer are:
 Framing
 Physical addressing
 Flow control
 Error control
 Media access control
 Node to node delivery

3. Network layer:
o It is responsible for routing the packets within the subnet i.e. from source to
destination.
o It is responsible for source e to destination delivery of individual packets across
multiple networks.
o It ensures that packet is delivered from point of origin to destination.
o Functions of network layer:
 logical addressing
Page 10 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Routing.
 Congestion control
 Accounting and billing
 Address transformation
 Source host to destination host error free delivery of packet.

4. Transport layer:
o Responsibility of process to process delivery of message Ensure that whole
message arrives in order.
o Functions of Transport layer:
 Service point addressing
 Segmentation and reassembly
 Connection control
 Flow control: Flow control is performed end to end.
 Error Control

5. Session layer:
o Establishes, maintains, and synchronizes the interaction among communication
systems
o It is responsible for dialog control and synchronization.
o Functions of Session layer:
 Dialog control
 Synchronization, session and sub session
 Session closure

6. Presentation layer:
o It is concerned with syntax, semantics of information exchanged between the two
systems.
o Functions of Presentation layer:
 Translation: presentation layer is responsible for converting various
formats into required format of the recipient
 Encryption: Data encryption and decryption is done by presentation layer
for security.
 Compression and Decompression: data to be transform compressed while
sending and decompress while receiving for reducing time of transmission.

7. Application layer:
o It enables user to access the network.
o It provides user interfaces and support for services like email, remote file access.
o Functions of Application layer:
 Network virtual terminal
 file transfer access and management
 mail services and directory services

Page 11 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

d) Describe data encapsulation. 4M

Ans: (Diagram:
2 marks,
Explanatio
n: 2 marks)

Explanation:
 The protocols operating at the various layers work together to supply a unified quality
of service.
 Each protocol layer provides a service to the layers directly above and below it.
 The process of adding the headers and trailers to the data is called as data
encapsulation.
 A packet(header and data ) at level 7 is encapsulated in a packet at level 6.The whole
packet at level 6 is encapsulated in a packet at level 5, and so on. In other words, the
data portion of a packet at level N-1 carries the whole packet (data and header and
maybe trailer) from level N.

e) State any four protocol associated with application layer of OSI model. 4M

Ans: Protocol associated with Application layer of OSI Reference model are (Any 4
correct
1. Virtual Terminal (TELNET) protocols: 1
2. File transfer Protocol (FTP) mark each
3. Simple Mail Transfer Protocol (SMTP) )
4. Hypertext Transport Protocol (HTTP)
5. Domain Name System (DNS)

Page 12 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

f) Differentiate between SLIP and PPP. 4M

Ans: (Any 4
SLIP PPP correct
points: 1
Serial Line Internet Protocol does not In PPP, LCP (Line Control Protocol)
mark each
establish or maintain connection is responsible for establishing,
)
between the client and ISP server. maintaining and termination
connection between two end points.
Communication starts once the Communication begins only after
connection between two modems are authentication and the types of traffic
established. is sent by the client.
Type of traffic cannot be selected in Type of traffic can be selected by
SLIP. NCP ( Network Control Protocol)
No protocol for termination. IPCP/IP (Control Protocol) terminates
a network layer connection between
the user and ISP.
No addressing mechanism provided. Additional services for addressing
mechanism is provided
Doesn’t allow error control Allows error control
No provision for data compression Provides Data compression.

4. Attempt any four : Marks 16

a) Explain TCP/IP reference model with diagram. 4M

Ans: (Diagram:
1mark,
Explanatio
n: 3marks )

TCP/IP Reference Model:

 TCP/IP means transmission control protocol and internet protocol.


 Protocols are set of rules which govern every possible communication over the
internet.
 These protocols describe the movement of data between the host computers or
internet. These offer simple naming and addressing schemes.
 It is robust to failures and flexible to diverse networks.
Page 13 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Most widely used protocol for interconnecting computers and it is the protocol of the
internet.

Description of different TCP/IP layers

 Layer 1: Host-to-network Layer

1. Protocol is used to connect the host, so that the packets can be sent over it.
2. Varies host to host and network to network.

 Layer 2: Internet layer

1. Selection of a packet switching network which is based on a connectionless


internetwork layer is called internet layer.
2. It the layer which holds the whole architecture together.
3. It allows the host to insert the packets.
4. It helps the packet to travel independently to the destination.
5. Order in which packets are received is different from the way they are sent.
6. IP (internet protocol) is used in this layer.

 Layer 3: Transport Layer

1. It decides if data transmission should be on parallel path or single path.


2. Functions such as multiplexing, segmenting or splitting on the data done by layer
four that is transport layer.
3. Transport layer breaks the message (data) into small units so that they are handled
more efficiently by the network layer.
4. Functions of the transport layer are same as the OSI model.
5. Transport layer also arrange the packets sent in sequence.

 Layer 4: Application Layer

1. Protocols used in this layer are high level protocols such as TELNET, FTP (file
transfer protocol etc.

b) Explain subnet masking. 4M

Ans: (Relevant
 An IP address has two components, the network address and the host address. Explanatio
 A subnet mask separates the IP address into the network and host addresses. n:4 marks)
 In Internet Protocol (IP) networking, devices on a subnet share contiguous ranges of
IP address numbers.
 A mask (known as the subnet mask or network mask) defines the boundaries of an IP
subnet.
 The correspondence between subnet masks and IP address ranges follows defined
mathematical formulas.
 IT professionals use subnet calculators to map between masks and addresses.
 A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address
into network address and host address.
Page 14 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Subnet Mask is made by setting network bits to all "1"s and setting host bits to all
"0"s. Within a given network, two host addresses are reserved for special purpose, and
cannot be assigned to hosts.
 The "0" address is assigned a network address and "255" is assigned to a broadcast
address, and they cannot be assigned to hosts.
 Subnet masking for 2 subnet: To calculate the number of subnets or nodes, use the
formula (2n-2) where n = number of bits in either field, and 2n represents 2 raised to
the nth power. Multiplying the number of subnets by the number of nodes available
per subnet gives you the total number of nodes available for your class and subnet
mask. Also, note that although subnet masks with noncontiguous mask bits are
allowed, they are not recommended.
 Example:
10001100.10110011.11011100.11001000 140.179.220.200 IP Address
11111111.11111111.11000000.00000000 255.255.192.000 Subnet Mask
--------------------------------------------------------------------------------------------------
10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address
Hence Subnet number Address
 140.179.64.0
 140.179.128.0

c) Distinguish between guided and unguided transmission media. 4M

Ans: (Any 4
correct
GUIDED MEDIA UNGUIDED MEDIA points:1
Also called as bounded or wired media Also called as unbounded or wireless mark each
media )
Point to point connection i.e. signal Used for radio broadcasting in all
travelling is directed directions i.e. signal travelling is
undirected
Transport signal in electric current or Transport signal in the form of
light/ beam electromagnetic waves
Unidirection, not broadcast Broadcast
Installation is costly and time Installation needs less time and money
consuming
Wired media leads to discrete network Wireless media leads to continuous
topologies network topologies
Attenuation depends exponentially on Attenuation is proportional to square
the distance of the distance
Example: Twisted Pair cable, Coaxial Example: Radio, Infrared light,
cable, Fibre optic cable Microwave

Page 15 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

d) Compare IPV6 and IPV4. 4M

Ans: (Any 4
IPV6 IPV4 correct
Source and destination addresses are Source and destination addresses are points:1
128 bits (16 bytes) in length. For more 32 bits (4 bytes) in length. mark each
information. )

There are no IPv6 broadcast addresses. Uses broadcast addresses to send


Instead, multicast scoped addresses are traffic to all nodes on a subnet.
used.

Fragmentation is not supported at Fragmentation is supported at


routers. It is only supported at the originating hosts and intermediate
originating host. routers.

IP header does not include a IP header includes a checksum.


checksum.
All optional data is moved to IPv6 IP header includes options.
extension headers.

IPSec support is required in a full IPv6 IPSec support is optional.


implementation.

Payload identification for QOS No identification of payload for QOS


handling by routers is included in the handling by routers is present within
IPv6 header using the Flow Label the IPv4 header.
field...
Addresses can be automatically Addresses must be configured either
assigned using stateless address auto manually or through DHCP.
configuration, assigned using
DHCPv6, or manually configured.
Uses host address (AAAA) resource Uses host address (A) resource records
records in the Domain Name System in the Domain Name System (DNS) to
(DNS) to map host names to IPv6 map host names to IPv4 addresses.
addresses.

e) Write the names of layer that performs the following function in OSI. 4M
1) 1)Data encapsulation 2) Error detection 3) File transfer 4) Encoding
Ans: (For each
1. Data Encapsulation- Transport Layer, Data Link Layer. (All OSI Layers) correct
layer:1
2. Error Detection-Data link layer and Transport Layer mark)

3. File Transfer-Application layer

4. Encoding- Data link layer

Page 16 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

f) Distinguish between LAN and WAN. 4M

Ans: (Any 4
LAN WAN correct
Covers Local areas only (e.g. homes, Large geographic areas(e.g. cities, points:1
offices, schools) states, nations) mark each
Definition LAN (Local Area Network) is a WAN (Wide Area Network) is a )
computer network covering a computer network that covers a
small geographic area, like a broad area (e.g., any network
home, office, school, or group whose communications links cross
of buildings. metropolitan, regional, or national
boundaries over a long distance).
Speed High speed (1000 mbps) Less speed (150 mbps)
Data transfer LANs have a high data transfer WANs have a lower data transfer
rates rate. rate compared to LANs.
Example The network in an office Internet is a good example of a
building can be a LAN WAN
Connection One LAN can be connected to Computers connected to a wide-
other LANs over any distance area network are often connected
via telephone lines and radio through public networks, such as
waves. the telephone system. They can
also be connected through leased
lines or satellites.
Data Experiences fewer data Experiences more data
Transmission transmission errors transmission errors as compared to
Error LAN
Ownership Typically owned, controlled, WANs (like the Internet) are not
and managed by a single person owned by any one organization but
or organization. rather exist under collective or
distributed ownership and
management over long distances.
Set-up costs If there is a need to set-up a For WANs since networks in
couple of extra devices on the remote areas have to be connected
network, it is not very the set-up costs are higher.
expensive to do that.
Geographical Have a small geographical Have a large geographical range
Spread range and do not need any generally spreading across
leased telecommunication lines boundaries and need leased
telecommunication lines
Maintenance Because it covers a relatively Maintaining WAN is difficult
costs small geographical area, LAN is because of its wider geographical
easier to maintain at relatively coverage and higher maintenance
low costs. costs.
Bandwidth High bandwidth is available for Low bandwidth is available for
transmission. transmission.
Geographical Have a small geographical Have a large geographical range
Spread range and do not need any generally spreading across
leased telecommunication lines boundaries and need leased
telecommunication lines
Page 17 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

5. Attempt any four : Marks 16

a) Explain RARP and ICMP. 4M

Ans: RARP (Reverse Address Resolution Protocol): (RARP:2


 This is used to obtain the IP address of a host based on its physical address. marks,
 This performs the job exactly opposite to that of ARP (Address Resolution Protocol) ICMP: 2
 In RARP, a host in LAN can request to learn its IP address from a gateway server's marks)
Address Resolution Protocol (ARP) table or cache.
 A network administrator creates a table in a local area networks gateway router that
maps the physical machine (or Media Access Control - MAC address) addresses to
corresponding Internet Protocol addresses.
 When a new machine is set up, its RARP client program requests from the RARP
server on the router to be sent its IP address.
 Assuming that an entry has been set up in the router table, the RARP server will return
the IP address to the machine which can store it for future use.

The Internet Control Message Protocol (ICMP):


 ICMP is a error reporting protocol.
 This protocol is responsible for providing diagnostic functions and reporting errors
due to the unsuccessful delivery of IP packets.
 It is used by network devices, like routers, to send error messages indicating, for
example, that a requested service is not available or that a host or router could not be
reached.
 ICMP can also be used to relay query messages.
 ICMP enables the detection and reporting of problems in the Internet.

b) Describe repeater. State the situation under which repeater are necessary in 4M
network.

Ans: Repeater (Repeater :


 Repeaters are used to take the distorted, weak and corrupt input signal and regenerate 2marks,
this signal at its output. Any
 It ensures that the signals are not distorted or weak before it reaches the destination. suitable
 It recreates the bit pattern of the signal, and puts this regenerated signal back on to the Situation: 2
transmission medium marks)
 It works in the physical layer with no intelligent function.
 It simply recreates the bit pattern of the signal and puts this regenerated signal back on
to the transmission medium. In effect, the original signal is created once again.

Example situation in which repeater is used:


Repeater is used to remove attenuation in the media, In any computer network,
when the data bit pattern is sent from a computer A to Computer B, if Computer B is not
able to receive the exact data bit pattern, a repeater is connected in between. This will
regenerate the weak signal so that the exact replica of the original input signal is sent
forward.

Page 18 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Diagram:

c) Explain microwave link with diagram. 4M

Ans: Microwave link : (Explanatio


 Microwaves use the line of sight method of propagation, as the signals do not travel n:3marks,
along the surface of the earth. Any
 Thus, two antennas must be in a straight line, able to see each other without any suitable
obstacle in between. Diagram:
 The taller the antenna, the more distance that these waves can travel. Thus, they are 1mark)
always positioned at higher levels like on mountains.
 Microwave signals travel only one direction at a time.
 Thus for two way communication like telephone systems, two frequencies are
allocated.
 At both ends, a transceiver is used which is a combination of a transmitter and
receiver, operating at two respective frequencies.
 Therefore only one antenna can server both the functions and cover both the
frequencies.
 Repeaters are used along with the antennas to enhance the signal.
 The data rates defined are 1Mbps to 10Gbps.

Page 19 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

d) Compare hub and switch. 4M

Ans: (Any four


comparison
Factor Hub Switch points:1ma
Function To connect a network of To connect multiple computers rk each)
personal computers in which it can direct a
together, they can be joined transmission to its specific
through a central hub. destination. (Unicast the
(Broadcast the signals) signals)
Types Active, Passive, Intelligent Layer 2 and Layer 3 Switches
Operating Layer in Physical Layer Data Link Layer
OSI
Type of device Passive (Active hubs also Active
available)
Used in network type LAN LAN

Used in network Star Topology Star Topology


topology
Address used MAC address MAC address
Usage To connect multiple Can be used to connect Single
computers in a single and multiple networks also
network

e) Explain structure of IP frame header. 4M

Ans: {**Note: IPv4 or IPv6 packet header shall be considered as the answer for IP frame (Diagram:
header. **} 2marks,
Explanatio
IPv4 header: n: 2marks)

The IP datagram contains header and data.


The header consists of around 20 to 60bytes consists of information about routing and
delivery.
The header is like an envelope i.e., it contains information about the data.
The structure of the standard format is as shown below.

HLEN
Version Service Type
(4 Total Length ( 16 bits)
(4 Bits) (ToS) (8 Bits)
bits)
Flags Fragmentation offset ( 13
Identification ( 16 bits)
( 3bits) bits)
Time to Live Protocol
Header Checksum ( 16 bits)
(TTL) (8 bits) ( 8 bits)
Source IP address (32 bits)
Destination IP address (32 bits)

Page 20 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

The various fields are as described below:


Version: This field identifies the version of IP, which contains a value 4, which indicates
IP version 4. It may contain 6 for IPv6

Header length (HLEN): This indicates the size of the header in a multiple of 4 byte
words. When the header size is 20 bytes, HLEN = 5, and HLEN = 15 when maximum size
(60 bytes).

Service Type (Type of Service): This field is used to define service parameters such as
the priority of the datagram and the level of reliability desired.

Total Length: This field contains the total length of the IP datagram. IP datagram cannot
be more than 65,536 since this filed size is 2 bytes or 16 (216 = 65,536).

Identification: This field is used in the situations when a datagram is fragmented. The sub
datagram are sequenced using identification field so that later it can be used to reconstruct
the original datagram.

Flags: This field corresponds to identification field. It indicates whether a datagram can
be fragmented and if fragmented, the position of the fragment (first, last or middle).

Fragmentation Offset: If a datagram is fragmented, this field indicates the offset of the
data in the original datagram before segmentation. This is used while reconstructing.

Time to Live (TTL): This filed is initialized by some value and decremented each time it
passes through routers. If the value becomes zero or negative, the data is not forwarded.
Thus it decides the lifetime of the data.

Protocol: This field identifies the transport protocol running on top of IP. The upper layer
software piece can be TCP or UDP. This field specifies which piece of software at the
destination node the datagram should be passed on to.

Source address: This field contains the 32 bit IP address of the sender.

Destination address: This field contains the 32 bit IP address of the final destination.

OR

Page 21 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

IPv6 header:

IPv6 fixed header is 40 bytes long and contains the following information.

 Version (4 bit): It represents the version of Internet Protocol, i.e. 0110

 Traffic Class (8-bits): These 8 bit are divided into two parts. The most significant 6 bits are
used for Type of Service to let the Router Known what services should be provided to this
packet. The least significant 2 bits are used for Explicit Congestion Notification (ECN).

 Flow label (20-bits): This label is used to maintain the sequential flow of the packets
belonging to a communication. The source labels the sequence to help the router identify that a
particular packet belongs to a specific flow of information. This field helps avoid re- ordering
of data packets. It is designed for streaming/real –time media.

 Payload Length (16-bits): This field is used to tell the routers how much information a
particular packet contains in its payload. Payload is composed of Extension Headers and Upper
Layer data. With 16 bits, up to 65535 bytes can be indicated, but if the Extension Headers
contain Hop-by-Hop Extension Header, then the payload may exceed 65535 bytes and this
field is set to 0.

 Next Header (8-bits): This field is used to indicate either the type of Extension Header, or if
the Extension Header is not present then it indicates the Upper Layer PDU. The values for the
type of Upper Layer.

 Hop Limit (8-bits): This field is used to stop packet to loop in the network infinitely. This is
same as TTL in IPV4. The value of Hop Limit field is decremented by 1 as it passes a link
(router/hop). When the field reaches 0 the packets is discarded.

 Source Address (128-bits): This field indicates the address of originator of the packet.

 Destination Address (128–bits): This field provides the address of intended recipient of the
packet.
Page 22 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

f) Draw and explain working of bridges. 4M

Ans: Bridge: (Any


 It is a device which connects two or more segment of a network. relevant
 It only forwards the packet which are for the exact destination. diagram:2
 A bridge device filters data traffic at a network boundary. marks,
 Bridges reduces the amount of traffic on a LAN by dividing it into two segments. Explanatio
 It inspects incoming traffic and decides whether to forward or discard it. n:2marks)
 It sends packets between two networks of same type.
 A bridge operates in both the physical and the data link layer.
 As a physical layer device, it regenerates the signal it receives.
 As a data link layer device, the bridge can check the physical (MAC) addresses
(source and destination) contained in the frame.

6. Attempt any two : Marks 16

a) Explain working of data link layer and network layer of OSI model. 8M

Ans: Data link layer: (Data Link


Data link layer is the second layer of the OSI model. It accepts the data from the Network Layer: 4
layer, attaches header & trailer and send it to the physical layer. At receives side it accepts marks,
the data from the physical layer snip of header & footer & give back to network layer the Network
way it has taken. IEEE has divided data link layer into two sub layers Layer: 4
marks)
1) Logical link control (LLC)

2) Media access control (MAC)

Working:
 It is responsible for transmitting group of bits between the adjacent nodes.
 The group of bits is called as frame.
 The network layer passes a data unit to the data link layer. Header and trailer
information is added to the data unit by data link layer.
 This data unit is passed to the physical layer.
 Data link layer is responsible for moving frames from one node to the next.
Functions of data link layer include Framing, Physical addressing, Flow control, Error
control, Media access control, Node to node delivery.

Page 23 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Network layer:
 It is responsible for routing the packets within the subnet i.e. from source to
destination.
 It is responsible for source e to destination delivery of individual packets across
multiple networks.
 It ensures that packet is delivered from point of origin to destination.

Working:
 Network layer chooses a route before sending all the packets belonging to the same
message.
 A header is added to a packet, which includes source and destination addresses.
 Any congestion at a node is tackled by the network layer.
 When there are multiple subnet operators of different types, the different rates are
charged by the network layer as an accounting function.
 Functions of network layer include Logical addressing, Routing, Congestion control,
Accounting and billing, Address transformation and Source host to destination host
error free delivery of packet.

b) What is ARP? Explain function of ARP. 8M


Ans:  ARP stands for Address Resolution Protocol. ARP converts an Internet Protocol (ARP
address to its physical network address (MAC). ARP was defined by RFC 826 in Definition:
1982. It operates at layer 2 of the OSI model. 2 marks,
Diagram:2
Diagram: marks, Any
4 Functions
of ARP:
1mark
each)

Fig: ARP Operation

Page 24 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Functions:
 Local host maintains the ARP Table. ARP maps the Internet Protocol address (IP)to a
physical machine address.
 It provides the interface between the IP addressing system used by IP and the
Hardware addresses used by the data link layer protocol.
 ARP broadcasts an IP address in an effort to discover its equivalent hardware address.
 ARP has been implemented with many combinations of network and data link layer
technologies.
 Responsible for ARP query and ARP response datagram.
 Maintains ARP cache so that if the same query has been processed earlier, new
broadcast message is not created but, it checks in the ARP cache.

c) Describe advantages and disadvantages of optical fiber cable. 8M

Ans: Optical fibre advantages: (Any 4


 Higher bandwidth : Fiber-optic cable can support dramatically higher bandwidths Advantages
(and hence data rates) than either twisted-pair or coaxial cable :1 mark
 Less signal attenuation: Fiber-optic transmission distance is significantly greater each, Any 4
than that of other guided media. A signal can run for 50 km without requiring Disadvanta
regeneration. ges: 1 mark
 Immunity to electromagnetic interference: Electromagnetic noise cannot affect each)
fiber-optic cables.
 Resistance to corrosive materials: Glass is more resistant to corrosive materials than
copper.
 Light weight: Fiber-optic cables are much lighter than copper cables.
 Greater immunity to tapping: Fiber-optic cables are more immune to tapping than
copper cables. Copper cables create antenna effects that can easily be tapped.
 Lesser number of repeaters
 Electrical isolation: - Optical fibres are fabricated from glass or plastic polymers
which are electrical insulators. Hence they do not exhibit earth loop.
 Signal security: - The light from Optical fibre does not radiate significantly &
therefore they provide a high degree of signal security.

Optical fibre disadvantages:


 Installation: Not easy to install.
 Maintenance: Its maintenance require expertise.
 Unidirectional light propagation: Propagation of light is unidirectional. Two fibers
are needed for bidirectional communication.
 Cost: The cable and the interfaces are relatively more expensive than those of other
guided media. If the demand for bandwidth is not high, often the use of optical fiber
cannot be justified.

Page 25 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.

Q. Sub Answer Marking


No Q. N. Scheme

1. Attempt any ten: 20 Marks

a) Define ‘Packet’ in concern with computer communication. 2M

Ans: It is the complete unit transmitted by sending computer over the network medium. (Any correct
OR definition: 2
A packet is the unit of data that is routed between an origin and a destination on the marks)
Internet or any other packet-switched network.

b) Give any two application of microwave communication. 2M

Ans:  One to one communication (1 mark each


for any 2
 Cellular phone correct
applications)
 Wireless LAN

 Satellite network

 Medical Science

 Remote Sensing Radar uses microwave radiation to detect range, speed & other
characteristics of remote object

Page | 1
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
c) Give the problem faced in ring topology. 2M

Ans:  Traffic is unidirectional. (1 mark each


for any 2
 Slow in speed. correct
problems)
 If one node goes down; the entire network goes down.

 Reconfiguration is needed to add a new node.

 Difficulty in troubleshooting the ring.

d) State whether the bus is active or passive network. Justify your answer. 2M

Ans: Bus is a passive network. (1 mark:


The bus topology is usually used when a network installation is small, simple or mentioning
temporary. In bus network, the cable is just one or more wires, with no active electronics whether it is
active or
to amplify the signal or pass it along from computer to computer. This makes the bus a
passive:1
passive network. mark:
OR justification)

In the bus topology the major component is the backbone cable. The communication
takes place through it and this backbone does not do any amplification or correction of
signals passed through that’s why bus can be called as passive network

e) List two DHCP protocols. 2M

Ans:  RARP (1 mark each


for any 2
 BOOTP correct
 TFTP protocols)

 TCP/IP

f) List advantages of computer network. 2M

Ans:  File sharing: The major advantage of computer network is that it allows file sharing (1 mark each
and remote file access. A person sitting at one workstation that is connected to a for any 2
network can easily see files present on another workstation, provided he/she is correct
authorized to do so. advantages)

Page | 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
 Resource Sharing: A computer network provides a cheaper alternative by the
provision of resource sharing. All the computers can be interconnected using a
network and just one modem & printer can efficiently provide the services to all
users.

 Inexpensive set-up: Shared resources means reduction in hardware costs. Shared


files means reduction in memory requirement, which indirectly means reduction in
file storage expenses.

 Flexible Handling: A user can log on to a computer anywhere on the network and
access his/her files. This offers flexibility to the user as to where he/she should be
during the course of his/her routine.

g) State the names of two sublayers of data link layer. 2M

Ans:  Logic Link Control Sublayer (1 mark each


for 2 correct
 Media Access Control Sublayer
names)

h) What are different transmission media? 2M

Ans: Transmission media is broadly classified into two groups. (1 mark each
for 2 types)
 Wired or Guided Media or Bound Transmission Media

(a) Twisted pair cable

(i) Shielded twisted pair

(ii) Unshielded twisted pair

(b) Co-axial cable

(c) Fiber optic cable

 Wireless or Unguided Media or Unbound Transmission Media

(a) Radio wave

(b) Microwave

(c) infrared

Page | 3
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
i) State any four topologies. 2M

Ans:  Bus (½ mark for


each, any 4
 Ring topology)

 Star

 Mesh

 Tree

 Hybrid

j) List any two characteristics of LAN. 2M

Ans:  The reliability of network is high because the failure of the computer in the (1 mark each
network does not affect the functioning for other computers. for any 2
correct
 Resource Sharing characteristi
cs)
 Addition of new computer to network is easy.

 High rate of data transmission is possible.

 Less expensive to install.

 Peripheral devices can be shared.

k) Why the network cable is twisted? 2M

Ans: Twisted pair cabling are used in network because its wiring has two conductors of a (2 mark for
single circuit are twisted together for the purposes of canceling out electromagnetic explanation)
interference (EMI) from external sources; for instance, electromagnetic radiation from
unshielded twisted pair (UTP) cables, and eliminates crosstalk between neighboring
pairs.

Page | 4
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
l) State any 2 advantages of co-axial cable. 2M

Ans:  Less susceptible to EMI and noise. (1 mark each


for any 2
 Covers high bandwidth.
correct
 Covers long distance than twisted pair. advantages)
 Low attenuation than twisted pair.

m) Define protocol. 2M

Ans: It is defined as set of rules and regulations to communicate between layers. (Any correct
definition 2
marks)

n) List any two services provided by PPP. 2M

Ans:  PPP is point to point protocol. (1 mark each


for any 2
 PPP perform error detection correct
services)
 PPP provides authentication and security.

 PPP supports IP and other protocols.

 PPP supports Dynamic IP address assignment

2. Attempt any four : 16Marks

a) Explain classification of computer network by their geography. 4M

Ans:  LAN - Local Area Network (1 mark:


listing;3
 MAN - Metropolitan Area Network marks for
explanation,
 WAN - Wide Area Network any 3
explanation)
 CAN - Campus Area Network

 PAN - Personal Area Network

Page | 5
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
PAN:
1. A PAN is personal area network is used for communication among computer
devices close to one’s person.

2. Wireless networking or Bluetooth technologies are the some examples of


PAN. The communication network established for the purpose of connecting
computer devices of personal use is known as the PAN.

CAN:
1. CAN is a Campus Area Network is used to connect buildings across
campuses of colleges or Universities.

2. A CAN is actually a type of LAN.

3. It is larger than a LAN but smaller than MAN.CAN is a network that


connects two or more LANs but that is limited to a specific and contiguous
geographical area such as a college campus, industrial complex or military
base.

LAN:
1. LAN is local area network. LAN is privately-owned networks covering a
small geographic area(less than 1 km), like a home, office, building or group
of buildings.

2. LAN transmits data with a speed of several megabits per second.

MAN:
1. A Metropolitan Area Network (MAN) is a large computer network that spans
a metropolitan area or campus.

2. A MAN typically covers an area up to 10 kms (city). The best example of


MAN is the cable Television network, available in many cities.

3. For an organization, the common use of a MAN is to extend their LAN


connectivity between buildings/offices that are within the same city or urban
area (hence the name Metropolitan Area Network).

Page | 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
4. The organization can pass their Ethernet frames to the service provider
MAN; the service provider will carry their frames across the MAN; and then
deliver the frames to the destination site.

5. From the customer's point of view, the MAN looks like one big (long)
Ethernet link between their offices.

6. The different sites could belong to the same IP subnet, and from the
customer's viewpoint, no routing is required between their sites.

WAN:
1. WAN is wide area network.

2. WAN is a long-distance communication network that covers a wide


geographic area, such as state or country.

3. The most common example is internet.

4. A WAN provides long-distance transmission of data, voice, image and video


information over larger geographical areas that may comprise a country or
even whole world.

b) State merits and demerits of client server network. 4M

Ans: Advantages: (2 marks for


any 2 correct
 Strong central security.
merits , 2
 Ability to share expensive equipment such as printer. marks for
any 2 correct
 Ability of server to pull available hardware & software. demerits)

 Easy manageability of large user.

Page | 7
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Disadvantages:
 Expensive dedicated hardware.

 Expensive network operating system software & client license.

 A dedicated network administrator is required.

c) Compare Hub, Switch and Bridge. 4M

Ans: (1 mark for


any 4 correct
point)
SR. HUB SWITCH BRIDGE
NO
1 Broadcast Point-to-point Both
2 Operates at physical Operates at data link Operates at data link
layer layer layer
3 Dumb Intelligent Highly intelligent
4 Cheap Expensive Very expensive
5 It simply broadcasts It uses switching table to It filters, forwards and
the incoming packets find correct destination blocks frames

d) With the help of neat diagram, describe working of fiber optic cable. 4M

Ans: (2 marks for


diagram,2
marks
Explanation)

Page | 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429

Working:
1. Fiber optics transmits signals in the form of light.

2. Following figure shows:

How ray of light changes direction when going from one substance to another.

3. When the angle of incidence i is less than critical angle then the ray refracts.

4. Angle of incidence i is equal to critical angle then, the rays bends along the surface.

5. When the angle of incidence i is greater than critical angle, then the ray reflects.

6. The ray incident above the critical angle it is trapped in the fiber.

Page | 9
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
e) State the functions of data link layer. 4M

Ans: Data link layer: It is responsible for transmitting group of bits between the adjacent (1 mark for
nodes. The group of bits is called as frame. The network layer passes a data unit to the each correct
data link layer. Header and trailer is added to the data unit by data link layer. This data function, any
unit is passed to the physical layer. Data link layer is responsible for moving frames 4 function)
from one node to the next.

Functions of data link layer are:


 Link establishment and termination: establishes and terminates the logical link
between two nodes.

 Frame traffic control: tells the transmitting node to "back-off" when no frame
buffers are available.

 Frame sequencing: transmits/receives frames sequentially.

 Frame acknowledgment: provides/expects frame acknowledgments. Detects and


recovers from errors that occur in the physical layer by retransmitting non-
acknowledged frames and handling duplicate frame receipt.

 Frame delimiting: creates and recognizes frame boundaries.

 Frame error checking: checks received frames for integrity.

 Media access management: determines when the node "has the right" to use the
physical medium.

f) Explain subnet masking. 4M

Ans: 1. An IP address has two components, the network address and the host address. (2 marks
2. A subnet mask separates the IP address into the network and host addresses. Explanation,
3. In Internet Protocol (IP) networking, devices on a subnet share contiguous 2 marks
ranges of IP address numbers. Example)
4. A mask (known as the subnet mask or network mask) defines the boundaries of
an IP subnet.
5. The correspondence between subnet masks and IP address ranges follows
defined mathematical formulas.
6. IT professionals use subnet calculators to map between masks and addresses.
7. A Subnet mask is a 32-bit number that masks an IP address, and divides the IP
address into network address and host address.
8. Subnet Mask is made by setting network bits to all "1"s and setting host bits to
all "0"s. Within a given network, two host addresses are reserved for special
Page | 10
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
purpose, and cannot be assigned to hosts.
9. The "0" address is assigned a network address and "255" is assigned to a
broadcast address, and they cannot be assigned to hosts.
10. Subnet masking for 2 subnet: To calculate the number of subnets or nodes, use
the formula (2n-2) where n = number of bits in either field, and 2n represents 2
raised to the nth power. Multiplying the number of subnets by the number of
nodes available per subnet gives you the total number of nodes available for your
class and subnet mask. Also, note that although subnet masks with non-
contiguous mask bits are allowed, they are not recommended.

Example:
10001100.10110011.11011100.11001000 140.179.220.200 IP Address
11111111.11111111.11000000.00000000 255.255.192.000 Subnet Mask
--------------------------------------------------------------------------------------------------
10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address
Hence Subnet number Address
1. 140.179.64.0
2. 140.179.128.0

3. Attempt any four: 16 Marks

a) Compare Client- Server and peer to peer network. 4M

Ans: Client server Network Peer to peer Network (Any 4


1) Strong central security 1) Weak central security. comparison
2) Better performance for large number 2) Poor performance for large number of :1 mark
of user. user. each)
3) Centralized backup can be taken. 3) Each user needs to take his as her own
backup.
4) Easy manageability for large number 4) Difficult to manage more than few (10)
of user. user.
5) Very reliable dedicated Network 5) No Network OS required, existing
operating system (NOS) required. machines with stand-alone OS.
6 )Expensive dedicated H/W. 6) No extra dedicated H/W.
7) Requires professional N/W 7) Not required, user can manage.
Administrator.
8) Here server is more powerful than 8) All user are equal in peer to peer.
client.
9) Client always request & server 9) Anybody can be server and anybody can
serves the request. be client.

Page | 11
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
b) Explain tree topology with neat diagram. 4M

Ans: (Note: Any other diagram showing central hub and other connection may also be (Diagram
considered) :2marks,
Explanation:
2 marks)

Explanation:

Tree has a hierarchy of various hubs, like branches in a tree, hence the name. Tree
topology can be derived from the star topology. Figure shows that every node is
connected to the same hub. However, only few nodes are connected directly to the
central hub.

The central hub contains a repeater, which looks at the incoming bits and regenerates
them afresh as full blown signals for 0 or 1 as per case. This allows the digital signals to
traverse over longer distances. Therefore, the central hub is also called active hub. The
tree topology also contains many secondary hubs, which may be active hubs or passive
hubs.

Page | 12
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
c) Enlist any four communication bands for unguided media with their frequency 4M
range.

Ans: (Any 4
Communicat
ion bands
with correct
range : 1
mark each)

d) With neat diagram explain the ESS architecture of IEEE 802.11. 4M

Ans: Extended Service Set: (Diagram: 2


marks,
An extended service set (ESS) is made up of two or more BSSs (Basic Service Set) with Explanation
Aps (Access Points). In this case, the BSSs are connected through a distribution system, :2 marks)
which is usually a wired LAN. The distribution system connects the APs in the BSSs.
IEEE 802.11 does not restrict the distribution system; it can be any IEEE LAN such as
an Ethernet. The extended service set uses two types of stations: mobile and stationary.
The mobile stations are normal stations inside a BSS. The stationary stations are AP
stations that are part of a wired LAN.

Page | 13
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429

e) Explain OSI reference model with its layered architecture. 4M

Ans: OSI model (Open System Interconnection) model was developed by ISO (international (Diagram: 1
standard organization) which provides way to understand how internetwork operates. It mark,
gives guidelines for creating network standard. Explanation:
OSI model has 7 layers as shown in the figure. 3 marks)

Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer

The OSI model takes the task of internetworking and divides that up into what is
referred to as a vertical stack that consists of the following 7 Layers.

Page | 14
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429

Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal —
through the network at the electrical and mechanical level. It provides the hardware
means of sending and receiving data on a carrier, including defining cables, cards and
physical aspects.

Data Link (Layer 2)


At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes
transmission protocol knowledge and management and handles errors in the physical
layer, flow control and frame synchronization. The data link layer is divided into two
sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC)
layer. The MAC sub layer controls how a computer on the network gains access to the
data and permission to transmit it. The LLC layer controls frame synchronization, flow
control and error checking.

Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error handling, congestion
control and packet sequencing.

Transport (Layer 4)
Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and
is responsible for end-to-end error recovery and flow control. It ensures complete data
transfer from source to destination.

Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection
coordination.

Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g.,
encryption) by translating from application to network format, and vice versa. The
presentation layer works to transform data into the form that the application layer can
accept. This layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the syntax & semantics.

Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Everything at this
layer is application-specific. This layer provides application services for file.

Page | 15
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
f) State different IP address classes. Explain any one in brief. 4M

Ans: Different IP address classes in IPv4:- Class A, Class B, Class C, Class D, Class E. (List of
classes: 1
Class A : mark, Any
one class
explanation:
3 marks)
In this, the first bit is ‘0’. The next 7 bits are used indicate network id. Rest of the 3
bytes are used to indicate host id. Class A: Minimum value is 0.0.0.0 and maximum
value 127.255.255.255. In this class, number of hosts that can be connected to each
network (216) is more than the number of networks (27).

Class B :

In this, the first two bits are ‘1 0’. The next 14 bits are used indicate network id. Rest of
the 2 bytes are used to indicate host id. Class A: Minimum value is 128.0.0.0 to
maximum value 191.255.255.255. In this class, number of hosts that can be connected to
each network (214) is almost the same as the number of networks (216).

Class C :

In this, the first three bits are ‘1 1 0’. The next 21 bits are used indicate network id. Rest
of the One byte is used to indicate host id. Class A: Minimum value is 192.0.0.0 to
maximum value 223.255.255.255. In this class, number of hosts that can be connected to
each network (28) is very less compared to the number of networks (221).
21bits 8 bits (4th byte) Minimum value

Class D:

If first 4 bits are ‘1 1 1 0’ the IP address belongs to class D. The IPv4 networking
standard defines Class D addresses as reserved for multicast. Multicast is a mechanism
for defining groups of nodes and sending IP messages to that group rather than to every
node on the LAN (broadcast) or just one other node (unicast). Multicast is mainly used
on research networks. As with Class E, Class D addresses should not be used by
ordinary nodes on the Internet. For class D minimum value for multi cast address is
224.0.0.0 and maximum multi class address is 239.255.255.255.

Page | 16
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Class E:

If first 5 bits are ‘1 1 1 1 0’ the IP address belongs to class E. For class E minimum
value for reserved address is 240.0.0.0 to 255.255.255.255. These are used for research
work in IP addresses.

4. Attempt any four : 16 Marks

a) Draw and explain Wide Area Network. 4M

Ans: Wide Area Network (WAN) (Any suitable


Wide Area Network is a computer network that covers relatively larger geographical Diagram:2
area such as a state, province or country. It provides a solution to companies or marks;
organizations operating from distant geographical locations who want to communicate Explanation:
with each other for sharing and managing central data or for general communication. 2 marks)
WAN is made up of two or more Local Area Networks (LANs) or Metropolitan Area
Networks (MANs) that are interconnected with each other, thus users and computers in
one location can communicate with users and computers in other locations.
In Wide Area Network, Computers are connected through public networks, such as the
telephone systems, fibre-optic cables, and satellite links or leased lines. The Internet is
the largest WAN in a world. WANs are mostly private and are built for a particular
organization by Internet Service Providers (ISPs) which connects the LAN of the
organization to the internet. WANs are frequently built using expensive leased lines
where with each end of the leased line a router is connected to extend the network
capability across sites.
The three phases of communication in WAN
1. Circuit establishment: The establishment phase involves creating the virtual circuit
between the source and destination devices.

2. Data transfer: Data transfer involves transmitting data between the devices over the
virtual circuit.

3. Circuit termination: Circuit-termination phase involves tearing down the virtual


circuit between the source and destination devices.

Page | 17
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429

OR

Page | 18
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
b) What is transceiver? State the advantages and disadvantages of it. 4M

Ans: Transceivers: These are devices that both transmit and receive. Transceivers are used to (Definition: 2
connect nodes to the various Ethernet media. Most computers and network interface marks, Any 2
cards contain a built-in 10BaseT or 10Base2 transceiver, allowing them to be connected Advantages:
directly to Ethernet without requiring an external transceiver. Many Ethernet devices ½ mark
provide an AUI connector to allow the user to connect to any media type via an external each; Any 2
transceiver. The transceiver is responsible for transmitting, receiving, and detecting Disadvantag
collisions. The transceiver is connected to the station via a transceiver cable that es: ½ mark
provides separate paths for sending and receiving. each.)

Advantages:

1, Provides separate paths for sending and receiving.

2. The same device can provide path for send and receive signals.

3. No collision of data in the card (but can happen only in media).

Disadvantages:

1. Increases the cost of the network.


2. The cable length to connect computers from transceiver is less (50m) compared to
other guided media (100m -500m).

c) Draw a sketch of shielded twisted pair cable and describe any two characteristics. 4M

Ans: Shielded Twisted pair (STP): (Diagram: 2


marks, Any 2
Characteristi
cs: 1 mark
each)

Page | 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429

Characteristics:
 It has metal shield that covers twisted pair.
 STP costs more than UTP but less than fiber-optic cable.
 STP can theoretically run at 50OMbps for a 100-meter cable length.
 STP eliminates Cross talk.
 The requirement for special connectors can make STP more difficult to install
than UTP.
 It is less noisy, so signal is more secure as compared to UTP.
 Since it has a metal foil or braided mesh, it is bulkier.

d) Describe data encapsulation in OSI model. 4M

Ans: (Diagram: 2
marks,
Explanation:
2 marks)

OR

Page | 20
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429

Explanation:
The protocols operating at the various layers work together to supply a unified quality of
service. Each protocol layer provides a service to the layers directly above and below it.
The process of adding the headers and trailers to the data is called as data
encapsulation.
A packet(header and data ) at level 7 is encapsulated in a packet at level 6.The whole
packet at level 6 is encapsulated in a packet at level 5, and so on. In other words, the
data portion of a packet at level N-1 carries the whole packet (data and header and
maybe trailer) from level N.

Page | 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
e) Explain horizontal and vertical communication. 4M

Ans: (Note: Either a single diagram (2M) or Individual (each 1M) may be considered) (Horizontal
communicati
on: 2 marks,
Vertical
communicati
on: 2 marks)

Horizontal Communication:

 In horizontal communication, programs or processes on different machines


communicate.
 The horizontal communication is the logical connection between the layers, there
is no direct communication between them.
 Information included in each protocol header by the transmitting system is a
message that will be carried to the same protocol in the destination system .
 For two computers to communicate over a n/w, the protocol used at each layer of
the OSI model in the transmitting system must be duplicated at the receiving
system.
 The packet travels up through the protocol stack and each successive header is
stripped of by the appropriate protocol & processed.

 When the packet arrived at its destination, the process by which the headers are
applied at the source is repeated in server.

Page | 22
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
 Application layer of Host A machine communicates with Application layer Of
Host B machine. Presentation layer of Host A machine communicates with
presentation layer Of Host B machine. Session layer of Host A machine
communicates with Session layer Of Host B machine. Transport layer of Host A
machine communicates with Transport layer Of Host B machine and so on.

Vertical Communication:

 In addition to communicating horizontally with the same protocol in the other


system, the header information also enables each layer to communicate with the
layer above & below it.
 Eg. The n/w layer will communicate with the data link layer & transport layer.

 This interlayer communication is called communication vertical.


 When a system receives a packet & passes it up through various layers the data
link layer protocol header includes a field which specifies the name of n/w layer
protocol to be used to process the packet.

Page | 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429

 The n/w layer protocol header will specify the name of transport layer protocol to
be used to process the packet.
 Due to vertical communication, it becomes protocol at each layer
simultaneously.

f) Explain the principle of FTP. 4M

Ans: FTP Diagram : (Diagram: 2


marks,
Explanation
: 2 marks)

Page | 24
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Explanation:

File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying
a file from one host to another. Figure shows the basic model of FTP.
 The client has three components: user interface, client control process, and the
client data transfer process. The server has two components: the server control
process and the server data transfer process.
 The control connection is made between the control processes. The data
connection is made between the data transfer processes.
 The control connection remains connected during the entire interactive FTP
session.
 The data connection is opened and then closed for each file transferred. It opens
each time commands that involve transferring files are used, and it closes when
the file is transferred. In other words, when a user starts an FTP session, the
control connection opens. While the control connection is open, the data
connection can be opened and closed multiple times if several files are
transferred.
 Separation of commands and data transfer makes FTP more efficient. FTP uses
the services of TCP. It needs two TCP connections.
 FTP uses two well-known TCP ports: Port 21 is used for the control connection,
and port 20 is used for the data connection.

5. Attempt any four : 16 Marks

a) With neat diagram explain Gateways. 4M

Ans: A gateway is a node (router) in a computer network, a key stopping point for (Explanation
data on its way to or from other networks. Using gateways, we are able to communicate s: 2 marks,
and send data back and forth. The Internet wouldn't be any use to us without gateways Diagram
(as well as a lot of other hardware and software). /Any Similar
:2 marks)
A common use for a gateway is to connect a LAN and a Mainframe computer by
changing protocols and transmitting packets between two entirely different networks.
For example, a network designed to use the OSI model can be connected to another
network using the Internet model.

When comparing all the network devices, it is to be noted that a gateway is


slower than a router and a router is slower than a bridge, unless the processing capability
is raised proportionately.

Page | 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Diagram:

b) With the help of diagram, explain satellite communication. 4M

Ans: In satellite communication, signal transferring between the sender and receiver is done (Diagram/
with the help of satellite. In this process, the signal which is basically a beam of Any similar:
modulated microwaves is sent towards the satellite called UPLINK (6 Ghz). 2 marks,
Explanation
Then the satellite amplifies the signal and sent it back to the receiver’s antenna present
:2 marks)
on the earth’s surface called as DOWNLINK (4Ghz), as shown in the diagram given

As the entire signal transferring is happening in space. Thus this type of communication
is known as space communication.

The satellite does the functions of an antenna and the repeater together. If the earth along
Page | 26
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
with its ground stations is revolving and the satellite is stationery, the sending and
receiving earth stations and the satellite can be out of sync over time.

Therefore Geosynchronous satellites are used which move at same RPM as that of the
earth in the same direction. So the relative position of the ground station with respect to
the satellite never changes. However 3 satellites are needed to cover earth’s surface
entirely.

Frequency band used in satellite communication:

c) State token passing. Compare token passing with CSMA/CD. 4M

Ans: Token passing: when hosts want to transmit data, it should hold the token, which is an (Token
empty packet. The token is circling the network in a very high speed. Passing
explaination:
If any workstation wants to send data, it should wait for the token. When the token has
2 marks,
reached the workstation, the workstation can take the token from the network, fill it with
Comparison
data, mark the token as being used and place the token back to the network.
: 2 marks:
Compare token passing and CSMA/CD two points)

Point 1:

The token passing is the least sensitive to work load. In token passing when the network
is lightly loaded the overhead is high but it is least sensitive to work load. As the load
increases the throughput does not decrease.

CSMA/CD offers the shortest delay under light load conditions but it is most sensitive to
variations of load. That means when the load increases in CSMA/CD we know that
delay increases significantly particularly when the load is heavy.

Point 2:

Token passing is suitable for real-time traffic because the delay is deterministic.

CSMA/CD it is non-deterministic, how much time it will take is not known. Therefore,
as a consequence in case of CSMA/CD some packets may take very long time to deliver

Page | 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
and there is a possibility that some unfortunate packets will not be delivered

d) Explain the functions of presentation layer and network layer. 4M

Ans: Functions of Presentation Layer: (Function of


presentation
1. Translation: layer: 2
Before being transmitted, information in the form of characters and numbers marks,
should be changed to bit streams. The presentation layer is responsible for Function of
interoperability between encoding methods as different computers use different network
encoding methods. It translates data between the formats the network requires layer:2
and the format the computer. marks)
2. Encryption:

It carries out encryption at the transmitter and decryption at the receiver.

3. Compression:

It carries out data compression to reduce the bandwidth of the data to be


transmitted. The primary role of Data compression is to reduce the number of
bits to be transmitted. It is important in transmitting multimedia such as audio,
video, text etc.
Network layer:

It is responsible for routing the packets within the subnet i.e. from source to destination.
It is responsible for source e to destination delivery of individual packets across multiple
networks. It ensures that packet is delivered from point of origin to destination.

Functions of network layer:

1. logical addressing

2. Routing.

3. Congestion control

4. Accounting and billing

5. Address transformation

6. Source host to destination host error free delivery of packet.

Page | 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
e) Compare IPv4 and IPv6. 4M

Ans: (Any 4
points, 1
IPV4 IPV6
mark each)
1. Source and destination addresses are 1. Source and destination addresses are
32 bits (4 bytes) in length. 128 bits (16 bytes) in length.

2. Uses broadcast addresses to send 2. There are no IPv6 broadcast


traffic to all nodes on a subnet. addresses. Instead, multicast scoped
addresses are used.

3. Fragmentation is supported at 3. Fragmentation is not supported at


originating hosts and intermediate routers. It is only supported at the
routers. originating host.

4. IP header includes a checksum. 4. IP header does not include a


checksum

5. IP header includes options. 5. All optional data is moved to IPv6


extension headers.

6. IPsec support is optional 6. IPsec support is required in a full


IPv6 implementation.

7. No identification of payload for QoS 7. Payload identification for QoS


handling by routers is present within the handling by routers is included in the
IPv4 header. IPv6 header using the Flow Label field.

8. Address must be configured either 8. Addresses can be automatically


manually or through DHCP. assigned using stateless address auto
configuration, assigned using DHCPv6,
or manually configured.

Page | 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
f) With neat diagram explain DNS in Internet. 4M

Ans: (Diagram/
Any suitable:
1 mark,
Explanation
:3 marks)

 The Domain Name System (DNS) is a client/server application that identifies each
host on the Internet with a unique user-friendly name.
 DNS organizes the name space in a hierarchical structure to decentralize the
responsibilities involved in naming.
 Each node in the tree has a domain name.
 A domain is defined as any subtree of the domain name space.
 Domain Name system has top level domains such as .edu, .org, .com etc
 The name space information is distributed among DNS servers.
 A domain name server is simply a computer that contains the database and the
software of mapping between domain names and IP addresses.

Functions of DNS:

 Accept request from programs for converting domain names into IP addresses.
 Accept request from other DNS servers to convert domain names into IP
addresses

Page | 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
6. Attempt any two: 16 Marks

a) With neat diagram, explain client server network along with its advantages and 8M
disadvantages.

Ans: The servers stores all the network's shared files and applications programs, such as word (Explanation
processor documents, compilers, database applications, spreadsheets, and the network :3 marks,
operating system. Diagram:1
mark,
Client will send request to access information from the server based on the request
Advantages
server will send the required information to the client.
2 marks and
Disadvantag
e: 2 marks)

OR

Page | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429

Client :

A computer which is seeking any resource from another computer is a Client Computer.
You can think a client as a computer in your network, where a network user is
performing some network activity.

For Example: Downloading a file from a File Server, Browsing Intranet/Internet etc.
The network user normally uses a client computer to perform his day to day work.

Server:

If a computer has a resource which is served to another computer, it is a Server


computer. The client establishes a connection to a Server and accesses the services
installed on the Server. A Server is not meant for a network user to browse in internet or
do spreadsheet work.

A Server computer is installed with appropriate Operating System and related Software
to serve the network clients with one or more services, continuously without a break.

Features of Servers:

1) They have large storage capacity.


2) They are able to provide information to many computers simultaneously
therefore has large RAM.
3) Its processor speed is high, as it may have to execute multiple task together.

Advantages of Client Server Network:

1. It has the centralized control. i.e. centralized user accounts, security, and access
to simplify network administration.
2. It does not slow down with heavy use.
3. The size of the network can be expanded to any size.
4. Proper Management in which all files are stored at the same place. In this way,
management of files becomes easy. Also it becomes easier to find files.
5. As all the data is stored on server it’s easy to make a back-up of it.
6. Reduces Data duplication by storing data stored on the servers instead of each
client, so it reduces the amount of data duplication for the application.

Disadvantages of Client Server Network:

1. Server failure leads to whole network failure.


2. It is very expensive to install and manage as dedicated hardware (server) and
special software is required.
3. A Professional IT person is required to maintain the servers and other technical
details of network.
Page | 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
b) With the help of neat diagram, describe the working of Routers. Also enlist types of 8M
routers.

Ans: Routers (Diagram: 2


 It operates at the network layer. marks,
 A router normally connects LANs and WANs in the Internet and has a routing router
table that is used for making decisions about the route. The routing tables are explanation:
normally dynamic and are updated using routing protocols.
5 marks,
 Routers are devices that help in determining the best path out of the available
paths, for a particular transmission. They consist of a combination of hardware types of
and software. router: 1
 The two main kinds of software in a router are the operating system and the mark)
routing protocol.
 Routers use logical and physical addressing to connect two or more logically
separate networks.
 Messages are stored in the routers before re-transmission, routers are said to
implement a store-and-forward technique.

Functions of Router:

 Router chooses the best path for packet forwarding.


 Router read complex network address in packet.
 It works at Network Layer of OSI model
 Efficiently direct packets from one network to another, reducing excessive
traffic.
 Join neighboring or distant network
 Connect dissimilar networks.
 Prevent network bottlenecks by isolating portions of a network.

Advantage of Router:

 They don’t forward broadcasts by default it save the bandwidth of network.


 They can filter the network based on layer 3 (Network layer) information (i.e., IP
address).
 Packet switching and Packet filtering possible at router.
 Internetwork communication.
 Route selection from source to destination.
 It works on Both LAN and WAN
 Router uses NAT (Network-Address-Translation) that can the IP Address
because each device need to go on internet.

Page | 33
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429

Disadvantage of Router:

 It is complex to maintain.
 Security Risk.
 Router is more expensive

Types of router:

1. Static Router

2. Dynamic Router

Page | 34
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
c) Describe TCP/IP model with suitable diagram. 8M

(Diagram:2
marks,
Explanation
of each layer
:6 marks)

TCP/IP Reference Model: TCP/IP means transmission control protocol and internet
protocol.

Overview of TCP/IP reference model

TCP/IP that is transmission control protocol and the internet protocol was developed by
Department of Defense’s Project Research Agency (ARPA, later DARPA) under the
project of network interconnection.

Most widely used protocol for interconnecting computers and it is the protocol of the
internet. It has 4 layers as given below.

Layer 1: Host-to-network Layer


1. Protocol is used to connect the host, so that the packets can be sent over it.
2. Varies host to host and network to network.

Layer 2: Internet layer


1. Selection of a packet switching network which is based on a connectionless
internetwork layer is called internet layer.
2. It the layer which holds the whole architecture together.
3. It allows the host to insert the packets.
4. It helps the packet to travel independently to the destination.
5. Order in which packets are received is different from the way they are sent.
6. IP (internet protocol) is used in this layer.

Page | 35
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Layer 3: Transport Layer

1. It decides if data transmission should be on parallel path or single path.


2. Functions such as multiplexing, segmenting or splitting on the data done by layer four
that is transport layer.
3. Transport layer breaks the message (data) into small units so that they are handled
more efficiently by the network layer.
4. Functions of the transport layer are same as the OSI model.
5. Transport layer also arrange the packets sent in sequence.

Layer 4: Application Layer


1. Protocols used in this layer are high level protocols such as TELNET, FTP (file
transfer protocol etc.

Page | 36
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in the model
answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to
assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance
(Not applicable for subject English and Communication Skills).
4) While assessing figures, examiner may give credit for principal components indicated in the
figure. The figures drawn by candidate and model answer may vary. The examiner may give
credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant
values may vary and there may be some difference in the candidate’s answers and model
answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant
answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.

Q. Sub Answer Marking


No Q.N. Scheme
1. (A) Attempt any six of the following: 12
a) Define protocols? Why it is needed? 2M
Ans. Protocol: Protocol is a set of rules that govern data communication. It
represents an agreement between the Communication devices. Definiti
Without a protocol two devices may be connected but not on 1M
communicating.
Need
The need of protocol: 1M
1.Protocols facilitate communication between the heterogeneous
pieces of hardware.
2.Protocols define the rules that govern network communication.
These rules determine things like packet format, type and size.
3.They also determine what happens when an error occurs, and which
part of the network is supposed to handle the error and how.
4.Protocols work in layers, the highest being what the user sees, and
the lowest being the wire that the information travels across. These
layers communicate with each other according to the rules, allowing
human communication to occur accurately and efficiently.

Page 1 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

b) Define error. 2M
Ans Any distortion or noise occurred during the process of transmission or Correct
reception can be termed as error. definitio
n 2M
c) Compare guided and unguided media (02 points) 2M
Ans
Guided media Unguided media Any two
The signal energy propagates The signal energy propagates points
within the guided media .i.e. through air 1M
through wires each
It is mainly suited for point to It is mainly used for
point line configurations. broadcasting purpose.
The signal propagates in the The signal propagates in the
form of voltage, current or form of electromagnetic waves.
photons.
Examples of guided media are:- Examples are:- Microwave or
Twisted Pair Cable, Co-axial Radio Links Infrared
Cable, Optical Fiber Cable

d) List any four layers of OSI model. 2M


Ans The Layers of OSI model are: Listing
1.Physical Layer of any
2.Data Link Layer four
layers
3.Network Layer
½M
4.Transport Layer each
5.Session layer
6.Presentation Layer
7.Application Layer

e) List out four ways of accessing internet. 2M


Ans Different ways of accessing Internet are:
 Dial-Up (A modem (internal or external) connects to the Internet Listing
after the computer dials a phone number. This analog signal is of any
converted to digital via the modem and sent over a land-line four
serviced by a public telephone network. ) ways
 Digital Subscriber Line(DSL)( uses a router to transport data and ½M
the range of connection speed, depending on the service offered, is each
between 128K to 8 Mbps.)

Page 2 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
 Cable( provides an internet connection through a cable modem
and operates over cable TV lines, it uses radio frequency)
 Wireless( does not use telephone lines or cables to connect to the
internet
 Satellite(Satellite accesses the internet via a satellite in Earth’s
orbit.)
 Cellular ( provides wireless Internet access through cell phones.)
f) Define IP address. State its need. 2M
Ans Definition: Correct
IP address is a logical address, 32 bit address having netid & hostid definitio
that uniquely & universally identified over TCP/IP network or local n 1M
network or to internet. Messages are routed in a TCP/IP network
based on destination IP address.

Need:
1. 1. In order to communicate with other devices in the network, there Need
needs a global addressing scheme. IP addresses are used for logically 1M
addressing the computers.
2. It provides a unique identification of the computer in the network.
g) Compare SLIP and PPP (02 points) 2M
Ans SLIP PPP
Any two
Can be used only with Can be used with multiple
points
TCP/IP. protocols. 1M each
Supports only synchronous Supports synchronous as well as
transmission of data. asynchronous data transmission.
SLIP cannot have auto PPP can auto-configure settings
configure settings.
while SLIP doesn’t Provide PPP provides error detection
error detection and recovery. and recovery.

h) Define Encapsulation 2M
Note: Any explanation or diagram shall be considered. Correct
Ans The protocols operating at the various layers work together to supply definitio
a unified quality of service. Each protocol layer provides a service to n 2M
the layers directly above and below it. The process of adding the
headers and trailers to the data is called as data encapsulation.

Page 3 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

OR
A packet(header and data ) at level 7 is encapsulated in a packet at
level 6.The whole packet at level 6 is encapsulated in a packet at level
5, and so on. In other words, the data portion of a packet at level N-1
carries the whole packet (data and header and maybe trailer) from
level N. The concept is called encapsulation.
OR

B) Attempt any two of the following 8


a) Describe any four characteristics of data communication system. 4M
Ans The effectiveness of any data communications system depends upon Any
the following four fundamental characteristics: four
1) Delivery: The data should be delivered to the correct destination characte
and correct user. ristics
2) Accuracy: The communication system should deliver the data 1M each
accurately, without introducing any errors. The data may get
corrupted during transmission affecting the accuracy of the delivered
data.
3) Timeliness: Audio and Video data has to be delivered in a timely
manner without any delay; such a data delivery is called real time
transmission of data.
4) Jitter: It is the variation in the packet arrival time. Uneven Jitter
may affect the timeliness of data being transmitted.

Page 4 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

b) State the name of IEEE standards. 4M


i) 802.2 ii)802.4 iii)802.5 iv)802.11
Ans i)802.2:
This is the standard for the upper Data Link Layer sublayer also Each
known as the Logical Link Control layer (LLC). name
1M
ii)802.4
This standard covers Token Bus.

iii)802.5
This standard covers Token Ring

iv)802.11
These are set of standards which wireless Local Area Network
(WLAN) and popularly known as Wireless Fidelity.

c) Give difference between UDP and TCP (04 points) 4M


Ans TCP UDP
1) TCP is Transport layer 1) UDP is Transport layer protocol Any
protocol & use in TCP/IP & use in TCP/IP Protocol suite. four
Protocol suite. differen
2) Connection oriented. 2) Connection less. ces 1M
3) More reliable. 3) Less reliable. each
4) Speed is less. 4) Speed is more.
5) Complexity is more. 5) Complexity is less.
6) Performs more 6) Performs less function.
functions.
7) Provides flow control. 7) Doesn’t provide flow control.
8) More overhead (because 8) Less overhead.
of ACKs).
9) More powerful. 9) Less powerful.
2 Attempt any four of the following 16
a) Define the following 4M
i) Baud rate
ii) Data transmission rate
iii) Bandwidth
iv) Bits per rate

Page 5 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

Ans i) Baud rate: The baud rate is the number of times the signal level
changes in a channel per second. Each
definitio
ii) Data Transmission Rate: The data transmission rate is the n 1M
volume of data transmitted over a transmission channel or via a data
interface within a specified unit of time. The units used for this are
baud or bits/s.

iii) Bandwidth: It is defined as a range within a band of frequencies


or wavelengths. Bandwidth is also the amount of data that can be
transmitted in a fixed amount of time.
For digital devices, the bandwidth is usually expressed in bits per
second(bps) or bytes per second. For analog devices, the bandwidth is
expressed in cycles per second, or Hertz (Hz).

iv) Bits per rate: This is the number of bits transmitted per second in
a channel.
b) Compare Analog signal and Digital Signal. 4M
Ans ANALOG SIGNAL DIGITAL SIGNAL
An analog signal has infinitely A digital signal has only a
many levels of intensity over a limited number of values Any
period of time. along its value. four
correct
compari
sons 1M
each

Analog signals are higher Digital signals are lower


density. density.
Loss and Distortion is high. Loss and Distortion is low.
Analog signals are less secure Digital signals are more
as compare with Digital signal. secure
Less bandwidth is require for High bandwidth is requiring
transmission for transmission.
Synchronization not present Synchronization present.

Page 6 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

c) Draw construction of co-axial cable and give any three 4M


characteristics of co-axial cable.
Ans Diagra
m1M

Characteristics of Coaxial Cable are the following:


1. It offers higher bandwidth as compared to twisted pair cable and Any 3
can span longer distances. characte
2. It can be used for both analog and digital transmission. ristics
3. Because of better shielding in coaxial cable, loss of signal or 1M each
attenuation is less.
4. Better shielding also offers good noise immunity.
5. It is relatively inexpensive as compared to optical fibers.
6. It has lower error rates as compared to twisted pair.
7. It is not as easy to tap as twisted pair because copper wire is
contained in plastic jacket.

d) Define standards. List various standards organizations. 4M


Ans 1) Standards are essential in creating and maintaining an open and
competitive market for equipment Manufacturers and in guaranteeing Definiti
national and international interoperability of data and on 2M
telecommunication technology and processes.

2) They provide guidelines to manufacturers, Vendors, govt. agencies


and other service providers to ensure the kind of interconnectivity
necessary in today’s market place and in international
communication.

Page 7 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

Standard organizations Any two


organiza
1) International standard organization (ISO) tions
1M each
2) American National Standard institute (ANSI)
3) Institute of electrical & electronics engineers (IEEE)
4) The Electronics Industries Association. (EIA)

e) Draw OSI reference model. Explain working of data link layer. 4M


Ans Diagram of OSI Reference Model.

Diagra
m 2M

Working of Data Link Layer: Workin


g of
Data link layer is responsible for transmitting group of bits between Data
the adjacent nodes. The group of bits is called as frame. The network Link
layer passes a data unit to the data link layer. Header and trailer is Layer
added to the data unit by data link layer. This data unit is passed to 2M
the physical layer. Data link layer is responsible for moving frames

Page 8 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
from one node to the next.

Functions of data link layer are:


1) Framing
2) Physical addressing
3) Flow control
4) Error control
5) Media access control
6) Node to node delivery

f) Describe virtual LAN with neat diagram. 4M


Ans A virtual local area network (VLAN) is a logical group of
workstations, servers and network devices that appear to be on the
same LAN despite their geographical distribution.
A VLAN allows a network of computers and users to communicate in
a simulated environment as if they exist in a single LAN and are
Descript
sharing a single broadcast and multicast domain.
ion 2M
VLANs are implemented to achieve scalability, security and ease of
network management and can quickly adapt to changes in network
requirements and relocation of workstations and server nodes.
Higher-end switches allow the functionality and implementation of
VLANs.
The purpose of implementing a VLAN is to improve the performance
of a network or apply appropriate security features.
Diagram Of Virtual LAN

Diagra
m 2M

Page 9 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

3 a) Attempt any four of the following 16


Compare UTP and STP (04 points) 4M
Ans UTP STP
UTP (Unshielded twisted pair) is STP (Shielded twisted pair) is a
a cable with wires that are twisted pair cable enclosed in Any
twisted together foil or mesh shield four
UTP cables are unshielded STP cables are shielded points
Susceptible to noise and Less susceptible to noise and 1M each
crosstalk crosstalk
Grounding cable is not required Grounding cable necessary
required
Installation of cable is easy Installation of cable is difficult
Cheaper and does not require Moderately expensive
much maintenance
Data rate is slow High data rate
UTP is the more prevalent and STP is commonly used by large
popular cabling that is used in scale companies in high-end
most homes, offices, and even in applications that require the
large scale businesses due to its maximum bandwidth
lower cost
b) State advantages & disadvantages of repeater. 4M
Ans Advantages of repeater:
Any 2
1. A repeater is used to regenerate the signal. advanta
2. It can be used to connect two segments. ges &
3. A repeater allows extending the physical length of a network. disadva
4. A repeater is used to boost the weak signal when the signal loses ntages
the strength as it passes along the cable. 2M each
5. A repeater does not have filtering capacity; It forwards every
frame.
6. Repeaters are cheaper when compared to other networking devices.

Disadvantages of repeater:

1. Repeaters cannot connect different network architectures.


2. Repeaters do not reduce network traffic.
3. The number of repeaters must be limited.

Page 10 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

4. Repeaters do not segment the network.


5. Too many repeaters on a network create noise on the wire and
increase the likelihood of packet collisions.
6. Devices that are separated only by a repeater are part of the same
collision domain.

c) Define 4M
i) Wi-fi ii) Wi-Max
Ans i) Wi-Fi
Wi-Fi is the name of a popular wireless networking technology that Wi-Fi
uses radio waves to provide a wireless high-speed Internet and 2M
network connection Wi-Fi is simply a trademarked phrase that means
IEEE 802.11. IEEE 802.11 wireless LAN: The 802.11 architecture
define two types of services and three different types of stations.
802.11 services:

The two types of services are


1) Basic services set (BSS)
2) Extended services set (ESS)

ii) Wi-Max
i) Wi- Max is worldwide interoperability for Microwave Access. It is a Wi-Max
wireless communication standard which can provide data rates up to 2M
1. Gbps: It is refers to interoperable implementation of IEEE 802.16
family of standards.

Uses and Application:


1) To provides portable mobile broadband connectivity.
2) It can be used as an alternative to cable, digital subscriber line
(DSL) for providing a broad band access.
3) To provide services such as voice on VIP (VOIP)
4) For providing a source of internet connectivity.
d) List out IP address classes. Explain any one. 4M
Ans IP address classes
 Class A
 Class B Listing
 Class C 1M
 Class D

Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

 Class E Explana
Class A: tion of
Class A range for first byte is 0-127. Class A type of IP addresses any one
have First byte consisting of Network address with first bit as 0 and class
the next 3 bytes with host id. Hence, number of hosts are more when 3M
compared to number of networks. The default subnet masks for class
A networks is 255.0.0.0. Class A networks have their network
addresses from 1.0.0.0 to 126.0.0.0, with the zero's being replaced by
node addresses.

Class B:
Class B range for first byte is 128-191. This type has first two bytes
specifying network ID with starting two bits as 10 and last two bytes
referring to host ID. The default subnet masks for class B is
255.255.0.0. Network addresses for these ranges from 128.0.0.0 to
191.0.0.0.

Class C:
Class C range for first byte is 192-223. This class has first three bytes
referring to network with starting bits as 110 and last byte signifies
Host ID. Here, number of networks are more when compared to
number of hosts in each network. The default subnet masks for class
C is 255.255.255.0 . The network IP addresses for these range from
192.0.0.0 to 223.0.0.0.
Class D:
Class D range for first byte is 224-239 Class D is used for
multicasting and its starting bits are 1110

Class E:
Class E range for first byte is 240-255 .Class E is reserved for future
use and its starting bits are 1111

e) Explain IEEE 802.3 standard 4M


Ans
 IEEE 802.3 is a working group and a collection of Institute of
Explana
Electrical and Electronic Engineers (IEEE) standards produced by
tion 4M
the working group defining the physical layer and data link
layer media access control (MAC) of wired Ethernet.
 This is generally a local area network (LAN) technology with

Page 12 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
some wide area network(WAN) applications.
 Physical connections are made between nodes and/or
infrastructure devices (hubs, switches, routers) by various types of
copper or fiber cable.
 802.3 is a technology that supports the IEEE 802.1 network
architecture.
 802.3 also define LAN access method using CSMA/CD.
f) Give name of layer from OSI model where following networking 4M
devices are operating.
i) Router ii) Bridge iii)Hub iv) Gateway Each
Ans i) Router: term
Operates on Network layer of OSI model. 1M

ii) Bridge:
Works on Physical & Data link layer of OSI model.

iii) Hub:
Works on physical layer.

v) Gateway:
Operates on all seven layers of OSI model.
4 Attempt any four of the following 16
a) Enlist and explain functions of application layer of OSI model. 4M
Ans Function of application layer List
1) Network Abstraction 1M
2) File access and transfer
3) Mail Services Explana
4) Remote Login tion
5) Directory Services 3M
6) WWW (World Wide Web)
 The application layer is the top-most layer of OSI model. It
provides services directly to user applications.
 It provides user interfaces and support for services such as email,
remote file access and transfer, shared database management and
other types of distributed information services.
 Network Abstraction: The application layer provides an
abstraction of the underline network to an end user and an

Page 13 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
application.

 File Access Transfer: It allows a user to access, retrieve and


manage files in a remote computer.
 Mail services: It provides the basis for email forwarding and
storage facilities.
 Directory services: It provides distributes database sources and
access for global information about various objects and services.
 Remote Login: It allows the logging in the host, which is remote.
 WWW: Accessing web pages is also part of this layer.

b) Define multiplexing. Give its types. 4M


Ans  Multiplexing divides the physical line or a medium into logical
segments called channels. Definiti
 In multiplexing, different channels carry data simultaneously over on 2M
the same physical medium.
 Hardware equipment called multiplexer (or mux in short)
combines (or multiplexes) the inputs from different sources, and
loads them on different channels of a medium.
 The combined data traverses over the medium simultaneously.
 At the destination, a demultiplexer (also called demux) separates
(or demultiplexes) the signals meant for different destinations.
 The demultiplexer sends these separated signals appropriately to
the different destinations. This is depicted in fig. Diagra
m 1M

Types of Multiplexing: Types


There are basically two ways in which multiplexing and 1M
demultiplexing can be achieved.

1 Frequency Division Multiplexing (FDM)


2 Time Division Multiplexing (TDM).

Page 14 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

3 Wave Division Multiplexing(WDM)

c) Describe working of token ring with neat sketch and give its two 4M
advantages.
Ans The Token Ring standard is based on the idea of a circulating token. Workin
A host that processes the token can transmit, others cannot. This g 2M
avoids contentions and collisions in the network. A host that does not
possess the token must wait even if it has data to be sent out. A host
that gets the token either can send a frame and forward the token to
the next host. If it has nothing to send, it simply forwards the token to
the next host.

Diagra
m 1M

Advantages Any two


 Reduced chances of data collision as each node release a data Advanta
packet after receiving the token. ges 1M
 Token passing makes ring topology perform better than bus
topology under heavy traffic
 No need of server to control connectivity among the nodes
 Equal access to the resources.

d) Define LAN. Explain its advantages. 4M


Ans A LAN is confined to a small area, usually within a single building. A
local area network (LAN) is usually privately owned and links the Correct
devices in a single office, building, or campus. Depending on the definitio
needs of an organization and the type of technology used, a LAN can n 2M
be as simple as two PCs and a printer in someone's home office; or it
can extend throughout a company and include audio and video
peripherals. A line (bus) topology is the cheapest in terms of cabling

Page 15 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
costs.

Any 2
Advanta
Advantages of LAN: ges 2M
 Can connect existing machines together e.g. connect machines of
different departments for better interoperability.
 Price is to performance ratio is very good. Mainframes and
minicomputers are much costlier as compare to performances.
 Incremental growth: you can add machines to existing network as
and when needed.
 Files can be stored on a central computer (the file server) allowing
data to be shared throughout an organization.
 Files can be backed up more easily when they are all on a central
file server rather than when they are scattered across a number of
independent workstations.
 Networks also allow security to be established, ensuring that the
network users may only have access to certain files and
applications.
 Software and resources can be centrally managed.
 Network versions of software often allow for their speedy
installation on Workstations from the file server.
 Expensive devices such as laser printers or scanners can be shared.
 Users can access their files from any workstation

e) Describe ICMP datagram. 4M
Ans  The Internet Control Message Protocol (ICMP) is a supporting
protocol in the Internet protocol suite. It is used by network Descript
devices, including routers, to send error messages and operational ion 2M
information indicating, for example, that a requested service is not
available or that a host or router could not be reached.

Page 16 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

 One of the main responsibilities of ICMP is to report errors. Five


types of errors are handled: destination unreachable, packet too
big, time exceeded parameter problems, and redirection.
 The checksum for ICMP is calculated by using both the header and
the data fields of the ICMP message.
 Packet InterNet Groper (ping) is an application program that uses
the services of ICMP to test the reachability of a host.
 ICMP messages are divided into two broad categories: error
reporting messages and query messages
 The error reporting messages report problems that router or a host
may encounter when it processes an IP packet.
 The query messages, which occur in pairs, help a host or a network
manager get specific information from a router or another host.
 Host can discover and learn about routers on their network. The
message format of ICMP is as given below.

Diagra
m 2M

Fig: ICMP datagram

f) Explain Time Division Multiplexing in detail. 4M


Ans  TDM divides a channel by allocating a time period for each
channel. Explana
 TDM is applied primarily on digital signals but can be applied on tion 2M
analog signals as well.
 In TDM the shared channel is divided among its user by means of
time slot. Each user can transmit data within the provided time slot
only.
 Digital signals are divided in frames, equivalent to time slot i.e.

Page 17 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
frame of an optimal size which can be transmitted in given time
slot.
 TDM works in synchronized mode. Both ends, i.e. Multiplexer and
De-multiplexer are timely synchronized and both switch to next
channel simultaneously.
 The time domain is divided into several recurrent time slots of
fixed length, one for each sub-channel.
 A sample byte or data block of sub-channel 1 is transmitted during
time slot 1, sub-channel 2 during time slot 2, etc.
 One TDM frame consists of one time slot per sub-channel plus a
synchronization channel and sometimes error correction channel
before the synchronization. After the last sub-channel, error
correction, and synchronization, the cycle starts all over again with
a new frame, starting with the second sample, byte or data block
from sub-channel 1, etc.

Diagra
m 2M

5 Attempt any four of the following 16


a) Give names of layer where following protocols are related to 4M
i) SMTP ii) TCP-UDP iii) IP iv)ARP Each
Ans i) SMTP – APPLICATION LAYER protocol
ii) TCP-UDP – TRANSPORT LAYER 1M
iii) IP – NETWORK LAYER / INTERNET LAYER
iv) ARP – DATA LINK LAYER/ LINK LAYER

b) Explain leased line with neat diagram 4M


Ans  A leased line is a dedicated, fixed-bandwidth, symmetric data
connection. Explana
 A permanent. Telephone connection between two points set up by tion 2M
Page 18 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
a telecommunications common carrier.

 Typically, leased lines are used by businesses to connect


geographically distant offices.

Diagra
m 2M

 Unlike normal dial-up connections, a leased line is always active.


The fee for the connection is a fixed monthly rate.
 The primary factors affecting the monthly fee are distance between
end points and the speed of the circuit. Because the connection
doesn't carry anybody else's communications, the carrier can
assure a given level of quality.
 Telephone companies & ISP‟s have come up with the option of
offering more BW from their premises & let the organizations
divide it internally the way they want.
 Leased lines are used to link two locations together. The first
location is typically a corporate office. The second location is
typically another corporate office, a data center that’s connected to
the Internet or a data center that’s connected to the company’s
existing Wide Area Network.

c) Explain RARP with neat sketch 4M


Ans RARP (Reverse Address Resolution Protocol)
1) Reverse address resolution protocol is a network protocol used to Explana
resolve a data link layer address to the corresponding network layer tion 2M

Page 19 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
address.

Diagra
m 2M

2) RARP designed for diskless workstations that have no means of


permanently storing their TCP/IP configuration information or TCP/
IP settings.

3) RARP does the opposite of ARP. While ARP broadcasts an IP


address in an effort to discover its equivalent hardware address,
RARP broadcasts the systems hardware address.

4) RARP server responds by transmitting the IP address assigned to


that client computer. RARP can supply IP address to all the systems
on a network segment.

d) Compare circuit switching and packet switching. (04 points) 4M


Note: Circuit switching and any one of the packet switching shall
be considered.

Page 20 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

Ans Circuit Switching Packet Switching Packet Switching Any


(Datagram) (Virtual Circuit) Four
Dedicated path No Dedicated path No Dedicated path Compar
Path is established Route is established Route is established ison
for entire for each Packet for entire 1M each
conversation conversation
Call setup delay Packet transmission call setup delay as
delay well as packet
transmission delay
Overload may block Overload increases Overload may block
call setup packet delay call setup and
increases packet
delay
Fixed bandwidth Dynamic bandwidth Dynamic bandwidth
No overhead bits overhead bits in overhead bits in
after call setup each packet each packet

e) Differentiate between MAN and WAN (04 points) 4M


Ans
BASIS OF Any
MAN WAN four
COMPARISON
points
Metropolitan Area
Wide Area Network 1M each
Network
It spans large locality and
It covers relatively
connects countries
Meaning large region such as
together. Example
cities, towns.
Internet.
Ownership of
Private or Public Private or Public
Network
Design and
Difficult Difficult
maintenance
Propagation
Moderate Long
Delay
Speed Moderate Low

Page 21 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

Fault Tolerance Less Tolerant Less Tolerant


Moderate Moderate high
The range of MAN is
Range/ Area lower than WAN (100 WAN has the highest
Covered KM). range (beyond 100 KM)

Set up cost is lower It is the most expensive


Cost
than WAN. network to set up.
f) Describe FTP and TFTP. 4M
Ans FTP: (File Transfer Protocol) FTP is a high level application layer Descript
protocol that is aimed at providing a very simple interface for any ion of
user of the internet to transfer files. FTP presents the user with a FTP &
prompt and allows entering of various commands for accessing and TFTP
downloading files that physically exists on a remote compute. The 2M each
user identifies a remote computer and instructs FTP to establish a
connection with it. FTP contacts the remote computer using the
TCP/IP software. Once the connection is established, the user can
choose to download a file from the remote computer or the user can
send the file from the user end to be stored on remote computer.

Page 22 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

FTP uses two connections between a client and server.


1. Data transfer
2. Control information – for commands and responses
This makes FTP more efficient

The client has three components


i. User interface
ii. Client control process
iii. Client data transfer process

TFTP:- TFTP(Trivial File Transfer Protocol) is used for file transfer


similar to FTP but it uses UDP for data transfer .This protocol is
purely designed for data transfer i.e. it does not permits changing or
accessing directory of remote computer .TFTP is used in situations
where simply file transfer is require likewise diskless station .TFTP
requires TFTP client software for downloading file from server . This
software will download file from server .TFTP does not provides
facility of authentication .Sender sends data in size of 512 byte &
receiver needs to authenticate each block until sender will not send
next block.

6 Attempt any four of the following 16


a) Describe following. 4M
i) Bridge
ii) Gateway
Ans i) Bridge
Bridge operate in physical layer of the OSI model. Bridge enables the Each
communication between smaller segments of network. Bridges send descripti
Page 23 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
the data frames only to the concerned segment thus preventing excess on 2M
traffic.
Bridges serve following purposes:
1. Unwanted traffic is minimized thus network congestion can also be
minimized to the maximum extent possible.
2. Bridge device inspect incoming network traffic and determine
whether to forward or discard it according to its intended destination.
3. Busy links or links in error can be identified and isolated.
4. Security features or access controls can be implemented.
5. Bridges can also work as repeaters in addition to network
segmenting

ii) Gateway
1. Gateway is protocol converter.
2. Gateway enables communication between different network
architecture and environments.
3. Gateway connects two systems that do not use the same protocol,
data format, language and architecture.
4. It works at all layers of OSI model.
5. Convert commonly used protocols (e.g. TCP/IP) to a specialized
protocol (for example, an SNA: System Network Architecture).
6. Convert message formats from one format to another.
7. Translate different addressing schemes.
b) Describe internal architecture of ISP with diagram. 4M
Ans Internal Architecture of ISP consists of
1. Set of Modems Explana
2. Remote Access Server tion 2M
3. SMTP Server
4. Web Server
5. Routers

Page 24 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

Diagra
m 2M

1. Set of Modems
i. Convert Analog signal on the line to the Digital.
ii. Connect ISP to the Subscriber.
2. Remote Access Server
i. All subscribers are connected to RAS through set of modems
ii. Maintains database of valid user id and password.
iii. It also verifies user id and password
3. SMTP Server
i. It is Simple Message Transfer Protocol
ii. It stores subscribers e-mails until the subscriber connects to the
internet
iii. It sends and receives mails on behalf of its subscriber
4. Web Server
i. Subscribers can create their own web pages To provide value
added services such as News update, Weather information,
Technical updates, Sports updates, Chat facilities

Page 25 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

5. Routers
i. It maintains routing tables
ii. Subscribers may be connected to the Internet through Routers

c) Define scatternet and explain with diagram. 4M


Ans Scatternet: Piconets can be combined to form what is called a
scatternet. A secondary station in one piconet can be the primary in Descript
another piconet. This station can receive messages from the primary ion 2M
in the piconet (as a secondary) and, acting as a primary, deliver them
to secondaries in the second piconet. A station can be member of two
piconets. The fig. below illustrate the scatterenet

Diagra
m 2M

d) Differentiate between serial and parallel communication (04 4M


points)

Page 26 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

Ans Any
Charact Serial Parallel four
eristics Communication Communication points
1M each
In serial communication a In parallel communication
Data word of eight bits in length the eight bits are
Transfer is sent sequentially, and is transferred in
received after all eight bits corresponding 8 channels,
are sent, one at a time. The every channel transmits a
bits are then assembled back bit, and a byte of data is
into one byte which is the received simultaneously.
initial communication.
A serial communication Parallel communication is
Speed device sends data in bits, Faster because parallel
and at the end the bits device transmits an 8
harmonize to form a byte of
bits at a time.
data and are thus slower.

Serial communication uses Parallel communication


Connect fewer Connections and uses More wires to allow
ion cables. the transfer of data
simultaneously
The use of fewer wires in The use of many wires
Quality serial communication makes causes the signals to
of its signals clearer, thus become distorted, making
Signal making it suitable for long parallel communication
distance communication. unsuitable for long
distance transmission.

e) Describe cable modem with neat diagram. 4M


Ans transmission.
1. Cable modems are one of the ways of accessing the internet.
2. It provides the internet access to a home user along with cable
television access. Descript
3. As the capacity of the coaxial cable is huge, the unused capacity is ion 2M
utilized to carry internet traffic.
4. The architecture of internet access via cable modem is shown in

Page 27 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430
figure given below.

5. When a user wants to access the internet, he invokes the computer


browser.
6. The browser’s request reach the Network Interface Card (NIC) of
the computer.
7. A device called splitter is fitted inside the premises of a cable TV
user.
8. The splitter is a device that splits the signals inside a coaxial cable
into two parts.
9. One part of the signal is the television signal and the other part of
the signal carries the internet data.
10. Two separate parts of the signal arrives in separate wires. One
wire goes to television set and the other wire carrying the IP packets
is connected to the cable modem.
11. The cable modem converts a computer’s digital data into analog
signals that the wire can carry and vice versa.
12. The cable company serves each town through a number of central
nodes. Each node serves about 500 customers
13. Many such central nodes are connected via high speed optical
fiber links into a single head end.
14. The head end receives television signals from satellites and
internet access via high speed connections with NAPs.
Diagra
m 2M

f) List and explain functions of session layer 4M


Ans The session layer provides the following functions:
1. Dialog Control List 1M
2. Token Management

Page 28 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2018 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Networking Subject Code: 17430

3. Synchronization

1. Dialog Control : This layer allows two systems to start Explana


communication with each other in half-duplex or full-duplex. The tion of
session layer in a network model allows two systems to enter into any two
a dialog. It allows the communication between two processes to function
take place in either half-duplex (one way at a time) or full-duplex 3M
(two ways at a time) mode.
2. Token Management: This layer prevents two parties from
attempting the same critical operation at the same time.
3. Synchronization : This layer allows a process to add checkpoints
which are considered as synchronization points into stream of data.
Example: If a system is sending a file of 800 pages, adding
checkpoints after every 50 pages is recommended. This ensures
that 50 page unit is successfully received and acknowledged. This
is beneficial at the time of crash as if a crash happens at page
number 110; there is no need to retransmit 1 to100 pages.

Page 29 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.

Q. Sub Answers Marking


No. Q. Scheme
N.

1. A) Attempt any six: (6x2= 12 )

a) Differentiate between computer Network and human Network. 2M

Ans: Computer Network Human Network (Any two


points: 1
1.Computer network is a 1. Human Network is a network of human mark
interconnections of two or more beings.
each)
computers

2.It consist of computers & 2.It consist of individuals ,organizations,


connecting devices like as Hub or schools, hospitals, work places etc
printer etc

3.Example : Internet 3.Example: 1.Family network, Peer


Network, Restaurant Network, Contact
Network

Page 1 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) State any two advantages of Bus topology. 2M

Ans: Advantages of bus topology: ( Any two


 It works well when you have a small network. advantag
 Easiest network topology for connecting computers or peripherals in a linear fashion. es: 1
 It is easy to set-up and extend bus network. mark
 Cable length required for this topology is the least compared to other networks. each)
 Bus topology costs very less.

c) Describe the types of hubs. 2M

Ans: Types of hubs: (Any two


1) Passive 2) Active 3) Intelligent types:1
Passive Hubs: A passive hubs simply combines the signals of a network segments. There is mark
no signal processing or regeneration. A passive hub reduces the cabling distance by half each)
because it does not boost the signals and in fact absorbs some of the signal. With the passive
hub each computer receives the signal sent from all the other computers connected to the
hub.
Active hubs: They are like passive hubs but have electronic components for regeneration
and amplification of signals. by using active hubs the distance between devices can be
increased. The main drawback of active hubs is that the amplify noise along with the signals.
They are also much expensive than passive hubs.
Intelligent hubs: in addition to signal regeneration, intelligent hubs perform some network
management and intelligent path selection. One advantage to this is that all transmission
media segment can be connected permanently because each segment will be used only when
a signal is sent to a device using that segment.

d) Define following terms: 2M


a) Static router
b) Dynamic router
Ans: Static Router: (
Static router is a device in which the system network administrator would manually Definition
configure network routers with all the information necessary for successful packet of Static
Router
forwarding.
and
Dynamic Router: dynamic
Dynamic router is a networking device which enables routers to select paths according to router : 1
real-time logical network layout changes. In dynamic routing, the routing protocol operating mark
on the router is responsible for the creation, maintenance and updating of the dynamic each)
routing table.

Page 2 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
e) State three advantages of optical fiber cable. 2M

Ans: Optical fibre advantages: ( Any


 Higher bandwidth : Fiber-optic cable can support dramatically higher bandwidths (and three
hence data rates) than either twisted-pair or coaxial cable advantag
 Less signal attenuation: Fiber-optic transmission distance is significantly greater than es: 2
that of other guided media. A signal can run for 50 km without requiring regeneration.
marks)
 Immunity to electromagnetic interference: Electromagnetic noise cannot affect fiber-
optic cables.
 Resistance to corrosive materials: Glass is more resistant to corrosive materials than
copper.
 Light weight: Fiber-optic cables are much lighter than copper cables.
 Greater immunity to tapping: Fiber-optic cables are more immune to tapping than
copper cables. Copper cables create antenna effects that can easily be tapped.
 Lesser number of repeaters
 Electrical isolation: - Optical fibres are fabricated from glass or plastic polymers which
are electrical insulators. Hence they do not exhibit earth loop.
 Signal security: - The light from Optical fibre does not radiate significantly & therefore
they provide a high degree of signal security.
f) State the need of computer network. 2M

Ans: Need for computer network: (Any two


• File/Folder Sharing need: 1
• Hardware Sharing (Resource sharing) mark
• Application sharing (Saving Cost) each)
• User Communication (Email, Remote Access)

g) Define the following term: Roaming. 2M

Ans: Roaming: It is the ability for a cellular customer to automatically make and receive voice (Correct
calls, send and receive data, or access other services, including home data services, when Definition
travelling outside the geographical coverage area of the home network, by means of using a :2
visited network. marks)

h) State the names of two sublayers of data link layer. 2M

Ans:  Logic Link Control Sublayer (1 mark


 Media Access Control Sublayer each for
two
correct
names)

Page 3 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
B) Attempt any two: (2x4=8)

a) State whether bus is active or passive network. Justify. 4M

Ans: Bus is a passive network. (Passive


The bus topology is usually used when a network installation is small, simple or temporary. network:
In bus network, the cable is just one or more wires, with no active electronics to amplify the 1 mark,
Justificati
signal or pass it along from computer to computer. This makes the bus a passive network.
on:3
OR marks)
In the bus topology the major component is the backbone cable. The communication takes
place through it and this backbone does not do any amplification or correction of signals
passed through that’s why bus can be called as passive network

b) State and explain network features. 4M

Ans: Network features: (Enlisting


1. File Sharing of
2. Printer Sharing network
3. Application Services features:
4. E-mail Services 1 mark,
5. Remote access Explanati
6. Internet & Intranet on of any
three: 1
1) File sharing: File sharing is the primary feature of network. Due to use of networks, the mark
sharing of files becomes easier. File sharing requires a shared directory or disk drive to each)
which many users can access over the network. When many users are accessing the same file
on the network, more than one person can make changes to a file at the same time. They
might both making conflicting changes simultaneously.
2) Printer sharing: Printer sharing is beneficial to many users as they can share costly &
higher quality printers. Printer sharing can be done in several different ways on network. The
most common way is to use printer queues on server. The printer queue holds print job until
any currently running print jobs are finished & then automatically send the waiting jobs to
the printer i.e. printer connected to server. Another way to share printer on a network is that
each workstations accesses the printer directly.
3) Application services: You can also share application on a network. For example you can
have a shared copy of Microsoft office or some other application & keep it on the network
server. Another application services you can have on the network is shared installation i.e.
contents of CD-ROM copy to the server, then run the installation the installing application
mush faster & more convenient.
4) E- mail services: E-mail is extremely valuable & important feature for communication
within organization or outside the people in world. E-mail service can be used by user in two
different ways: 1. File based 2.Client File based e-mail system requires gateway server for

Page 4 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
connecting or handling the e-mail interface between the two systems using gateway software
that is part of the file-based e-mail system. A client-server e-mail system is one where an e-
mail server containing the messages & handles all incoming & outgoing mail. It is more
secure & powerful than file based e-mail system.
5) Remote access: Using this feature user can access their file & e-mail, when they are
travelling or working on remote location. It enables users to access to centralized application,
stored private or shared files on LAN.
6) Internet & Intranet: Internet: It is public network. This consists of thousands of
individual networks & millions of computers located around the world. Internets have many
different types of services available such as e-mail, the web & Usenet newsgroups.
Intranet: It is private network or it is company’s own network. Company use this feature for
internal use. For example: company establish its own web server, for placing documents
such as employee handbooks, purchases form or other information that company publishes
for internal use. It also has internet services such as FTP servers or Usenet servers.
c) State the functions of: 4M
1) Hub
2) Repeater
3) Bridge
4) Router
Ans: 1)Hub: (Two
 Hub connects all nodes in star topology. Hub is broadcasting device. Functions
 It sends packets to all nodes in the network. of Each
compone
 It works at Physical Layer of OSI model.
nt - ½
2) Repeater: marks
 Repeaters are used to take the distorted, weak and corrupt input signal and regenerate this each)
signal at its output.
 It ensures that the signals are not distorted or weak before it reaches the destination.
 It increases the signal strength.
3)Bridge:
 A bridge device filters data traffic at a network boundary.
 Bridges reduces the amount of traffic on a LAN by dividing it into two segments.
 It inspects incoming traffic and decides whether to forward or discard it.
 It sends packets between two networks of same type.
4)Router:
 Router chooses the best path for packet forwarding.
 Router read complex network address in packet.
 It works at Network Layer of OSI model
 Efficiently direct packets from one network to another, reducing excessive traffic.
 Join neighbouring or distant network
 Connect dissimilar networks.
 Prevent network bottlenecks by isolating portions of a network.
Page 5 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
2. Attempt any four of the following: (4x4=16)

a) Draw and explain the working of star topology. 4M

Ans: (Diagram
: 2 Mark,
Descripti
on: 2
marks)

Star Topology:
• In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub.
• The devices are not directly linked to one another.
• A star topology does not allow direct traffic between devices.
• The controller acts as an exchange.
• If one device wants to send data to another, it sends the data to the controller, which then
relays the data to the other connected device.
• A star topology is less expensive than a mesh topology.
• In a star, each device needs only one link and one I/O port to connect it to any number of
others. This factor also makes it easy to install and reconfigure.
 Far less cabling needs to be housed, and additions, moves, and deletions involve only
one connection: between that device and the hub.
• Other advantages include robustness. If one link fails, only that link is affected. All other
links remain active. This factor also lends itself to easy fault identification and fault isolation.
• As long as the hub is working, it can be used to monitor link problems and bypass defective
links.
• One big disadvantage of a star topology is the dependency of the whole topology on one
single point, the hub. If the hub goes down, the whole system is dead.
• Although a star requires far less cable than a mesh, each node must be linked to a central
hub.
• The star topology is used in local-area networks (LANs). High-speed LANs often use a star
topology with a central hub.

Page 6 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) Describe role of modem in Networking. 4M

Ans: (Diagram
: 1 mark,
Explanati
on: 3
marks)

ROLE OF MODEM: A modem, which stands for modulator-demodulator, is the device we


use to translate analog signals into digital signals for purposes of computer communications.
It serves as a bridge of sorts between the input and output of data. A modem is a device or
program that enables a computer to transmit data over, for example, telephone or cable
lines. Computer information is stored digitally, whereas information transmitted over
telephone lines is transmitted in the form of analog waves. A modem converts between these
two forms. Fortunately, there is one standard interface for connecting external modems to
computers called RS-232. Consequently, any external modem can be attached to any
computer that has an RS-232 port which almost all personal computers have. There are also
modems that come as an expansion board that you can insert into a vacant expansion slot.
These are sometimes called onboard modems or internal modems.
Functions of modems:
1. Take the data from the RS-232 interface.
2. Convert the binary data into analog signal or data.
3. Perform the line control and signaling to the other end of phone line.
4. Send dialing signals.
c) Draw and explain twisted pair cable. 4M

Ans: (Diagram
 A twisted pair consists of two copper wires about 1 mm thick. : 2 marks,
 These two wires are individually contained in a plastic insulation and are twisted Explanati
together in a helical form. Polyethylene, polyvinyl chloride, flour polymer resin and on: 2
Teflon(r) are some of the substances that are used for insulation purposes. marks)

Page 7 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429

 Purpose of twisting the wire is to reduce the electrical interference from the similar
pairs in surroundings. The performance of the wire improves with the increase in the
number of twist per foot.
 If the two wires are parallel, then the electromagnetic interference from the devices
such as motor can create a noise or interferences.
 Inferences on the wire that is closer to the source of noise. These results in high
voltage level in one wire than the other This further leads to uneven load and
damaged signal and there will be difference at the receiver side.
 If two wires are twisted, then the cumulative effect of the interference on both the
wires is equal.
 In such a way, each wire is closer to the noise source for half of the time and farther
away for the other half i.e. in one twist one wire is closer to the noise source and the
other is farther; in next twist the reverse is true.
 In this way, there will be no difference at the receiver side as unwanted signals are
cancelled out.
 Twisted pair is distance limited. As distance between network element increases,
attenuation increases and quality decreases at a given frequency.
 Twisted pair is an insecure transmission medium. It is relatively simple to place
physical taps.
 Twisted pair cables are of two types namely, Shielded (STP) and Unshielded (UTP)
based on the shield provided to cover it.

Page 8 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
d) Describe any four situations in which server based networks are more superior to peer 4M
to peer network.

Ans: 1. Centralization: Servers help in administering the whole set-up. Access rights and (Any four
resource allocation is done by Servers. correct
2. Proper Management: All the files are stored at the same place. Also it becomes easier to situation:
find files.
1 mark
3. Back-up and Recovery possible: As all the data is stored on server it’s easy to make a
back-up of it. each)
4. Up-gradation and Scalability in Client-server set-up: Changes can be made easily by
just upgrading the server. Also new resources and systems can be added by making
necessary changes in server.
5. Accessibility: From various platforms in the network, server can be accessed remotely.
6. Security: Rules defining security and access rights can be defined at the time of set-up of
server.

e) Give the function of data link layer. 4M

Ans: Functions of data link layer are: ( Any


 Link establishment and termination: establishes and terminates the logical link between four
two nodes. correct
 Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are functions:
available. 1 mark
 Frame sequencing: transmits/receives frames sequentially. each)
 Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers
from errors that occur in the physical layer by retransmitting non acknowledged frames
and handling duplicate frame receipt.
 Frame delimiting: creates and recognizes frame boundaries.
 Frame error checking: checks received frames for integrity.
 Media access management: determines when the node "has the right" to use the physical
medium.
f) State the limitation of IPV4. 4M

Ans:  Source and destination addresses are 32 bits (4 bytes) in length. (Any four
 Security is another aspect where IPv4 had a push back. With all devices not accessing the limitation
Internet, there needs to be some security mechanism to protect the data and perform : 1 mark
cryptography services etc. each)
 No identification of payload for QoS handling by routers is present within the IPv4
header.
 The routing tables will become large. A separate routing table entry is needed for each
network resulting in a large number of routing table entries.
 IPv4 addresses are either configured manually or automatically using the DHCP
(Dynamic Host Configuration Protocol). These days as almost all devices are IP enabled,

Page 9 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
we should have simpler means to configure rather have these devices configured
automatically without majorly relying on some administration.
3. Attempt any four: (4x4=16)

a) Compare TCP and UDP. 4M

Ans: TCP and UDP Comparison: (Any 4


comparis
Characteristics TCP UDP ons: each
1mark)
Complexity TCP is more complex UDP is less complex

Connection TCP is connection oriented UDP is connection less


protocol
protocol

Reliability It provides reliable delivery It provides unreliable delivery


of messages of messages

Function As a message makes its way By using this protocol one


across the internet from one program can send a load of
computer to another. This is packets to another and that
connection based. would be the end of the
relationship.

Flow controlling TCP has flow control UDP has no flow control

Overhead Overhead is low Overhead is very low

Which is powerful TCP is more powerful. UDP is less powerful

Speed Slower Faster

Data transmission TCP gives guarantee that the No guarantee of the data
order order of the data at the transmission order
receiving end is the same as
the sending end

Acknowledgment TCP acknowledges the data UDP has no acknowledgment


reception section

Application Used where reliability is Used where time sensitivity is


important more important.

Page 10 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) Explain the service provided by network layer of the OSI model. 4M

Ans: Services provided by Network layer of OSI model: (Any 4: 1


mark
 It is responsible for routing the packets with in the subnet i.e. from source to destination each)
 It ensures that packet is delivered from point of origin to destination error free.
 Defines the most optimum path the packet should take from the source to the destination
 Defines logical addressing so that any endpoint can be identified.
 Handles congestion in the network.
 Facilitates interconnection between heterogeneous networks (Internetworking).
 The network layer also defines how to fragment a packet into smaller packets to
accommodate different media.
 Also provides Accounting and billing.
 Address transformation is also done by the network layer.
c) Describe the Various IP address classes with suitable example. 4M

Ans: IP address classes with example (Class


A,B,C
Different IP address classes in IPv4:- Class A, Class B, Class C, Class D, Class E. each:
Class A : 1mark,
Class A IP address format is given below: D&E :
1mark)

1 2 3 4 5 6 7 8 2nd Byte 3rd Byte 4th Byte

0 Network ID Host ID Host ID Host ID

In this, the first bit is ‘0’. The next 7 bits are used indicate network id. Rest of the 3 bytes are
used to indicate host id. Thus the First Byte in Class A type of IP address will have a range
from 0 to 126.
Example : 10.1.2.1
In this, the first byte ‘10’ has first bit 0, and hence it belongs to class A IP address.

Class B :
Class B IP address format is given below:

1 2 3 4 5 6 7 8 2nd Byte 3rd Byte 4th Byte

1 0 Network ID Network ID Host ID Host ID

In this, the first two bits are ‘1 0’. The next 14 bits are used indicate network id. Rest of the 2
bytes are used to indicate host id. Thus, the first byte of class B type of IP address has a
range from 128 to 191.
Page 11 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Example : 187.4.5.1
In this address, the first byte ‘187’ has first two bits as 10.
Class C :
Class C IP address format is given below:

1 2 3 4 5 6 7 8 2nd Byte 3rd Byte 4th Byte

1 1 0 Network ID Network ID Network ID Host ID

In this, the first three bits are ‘1 1 0’. The next 21 bits are used indicate network id. Rest of
the One byte is used to indicate host id. Thus the first byte of the IP address in class C has
range from 192 to 223.
Example : 192.168.1.2
In this the first three bits are 110, which represents the Class C type IP address.
Class D:
Class D IP address format is given below:

1 2 3 4 5 6 7 8 2nd Byte 3rd Byte 4th Byte

1 1 1 0 Multicast Address

If first 4 bits are ‘1 1 1 0’ the IP address belongs to class D. The IPv4 networking standard
defines Class D addresses as reserved for multicast. Multicast is a mechanism for defining
groups of nodes and sending IP messages to that group rather than to every node on the LAN
(broadcast) or just one other node (unicast). Multicast is mainly used on research networks.
As with Class E, Class D addresses should not be used by ordinary nodes on the Internet.
The range for first byte of class D starts from 224 till 239.

Example: 225.25.2.1
Here, the first 4 bits are 1110.

Class E:
Class E IP address format is given below:

1 2 3 4 5 6 7 8 2nd Byte 3rd Byte 4th Byte

1 1 1 1 0 Reserved for future use

If first 5 bits are ‘1 1 1 1 0’ the IP address belongs to class E. For class E minimum value for
reserved address is 240.0.0.0 to 255.255.255.255. These are used for research work in IP
addresses.

Page 12 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Example: 245.5.6.2
Here, the first 5 bits are 11110.

d) Classify networks on the basis of their geography and define. 4M

Ans: Classification of networks based on geography ( listing; 1


mark, for
 LAN - Local Area Network explanati
 MAN - Metropolitan Area Network on: 3
 WAN - Wide Area Network marks,
 CAN - Campus Area Network any 3
 PAN - Personal Area Network explanati
on)
PAN:
1. A PAN is personal area network is used for communication among computer devices
close to one’s person.
2. Wireless networking or Bluetooth technologies are the some examples of PAN. The
communication network established for the purpose of connecting computer devices of
personal use is known as the PAN.

CAN:
1. CAN is a Campus Area Network is used to connect buildings across campuses of colleges
or Universities.
2. A CAN is actually a type of LAN.
3. It is larger than a LAN but smaller than MAN.CAN is a network that connects two or
more LANs but that is limited to a specific and contiguous geographical area such as a
college campus, industrial complex or military base.

LAN:
1. LAN is local area network. LAN is privately-owned networks covering a small geographic
area(less than 1 km), like a home, office, building or group of buildings.
2. LAN transmits data with a speed of several megabits per second.

MAN:
1. A Metropolitan Area Network (MAN) is a large computer network that spans a
metropolitan area or campus.
2. A MAN typically covers an area up to 10 kms (city). The best example of MAN is the
cable Television network, available in many cities.
3. For an organization, the common use of a MAN is to extend their LAN connectivity
between buildings/offices that are within the same city or urban area (hence the name
Metropolitan Area Network).
4. The organization can pass their Ethernet frames to the service provider MAN; the service
provider will carry their frames across the MAN; and then deliver the frames to the
destination site.
5. From the customer's point of view, the MAN looks like one big (long) Ethernet link

Page 13 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
between their offices.
6. The different sites could belong to the same IP subnet, and from the customer's viewpoint,
no routing is required between their sites.

WAN:
1. WAN is wide area network.
2. WAN is a long-distance communication network that covers a wide geographic area, such
as state or country.
3. The most common example is internet.
4. A WAN provides long-distance transmission of data, voice, image and video information
over larger geographical areas that may comprise a country or even whole world.

e) Describe any four physical characteristics of fiber optic cable.

Ans: Physical characteristics of Optical Cable: (Any 4


character
1. Core - Thin glass center of the fiber where the light travels. istics:
2. Cladding - Outer optical material surrounding the core that reflects the light back into the 1mark
core. each)
3. Buffer coating - Plastic coating that protects the fiber from damage and moisture.
Hundreds or thousands of these optical fibers are arranged in bundles in optical cables. The
bundles are protected by the cable's outer covering, called a jacket.
4. Strengthening fibers: These components help protect the core against crushing forces and
exercise tension during installation.
5. Cable jacket: This is the outer layer of any cable. Most fiber optic cables have an orange
jacket, although some types can have black or yellow jackets
6. Single-mode fibers - Used to transmit one signal per fiber (used in telephones and cable
TV)
7. Multi-mode fibers - Used to transmit many signals per fiber (used in computer networks,
local
area networks)
8. Material used: Some optical fibers can be made from plastic. These fibers have a large
core (0.04 inches or 1 mm diameter) and transmit visible red light from LEDs.

f) Explain tree topology with neat diagram.

Ans: {{**Note: Any other diagram showing central hub and other connection may also be (Diagram
considered**}} :2 marks,
Explanati
Tree Topology: on: 2
A tree topology is variation of star. As in a star, nodes in a tree are linked to a central hub marks)
head end that controls the traffic to a network. However, not every computer plugs into the
central hub, majority of them are connected to a secondary hub which in turn is connected to
the central hub as shown in fig.

Page 14 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429

Figure: Tree Topology


The central hub contains a repeater, which looks at the incoming bits and 99regenerates them
afresh as full blown signals for 0 or 1 as per case. This allows the digital signals to traverse
over longer distances. Therefore, the central hub is also called active hub. The tree topology
also contains many secondary hubs, which may be active hubs or passive hubs
4. Attempt any four : (4x4=16)

a) State the reason of implementing network. 4M

Ans: Reason for implementing network: (Any 4


reasons:
1. File Sharing : Networking allows file sharing and remote file access. A person sitting at 1mark
one workstation which is connected to a network can easily see files present on another each)
workstation, provided he/she is authorized to do so.
2. Resource (Printer or modem) Sharing : Network provides a cheaper alternative by the
provision of resource sharing. All the computers can be interconnected using a network
and just one modem & printer can efficiently provide the services to all users.
3. Application Services: Networking allows sharing applications and managing them
through centralized management which provides easy and fast maintenance of software
installed in the systems.
4. E-mail Services : E-mail is extremely valuable & important feature for communication
within organization or outside the people in world. Networking allows file based or client
based systems for communication.
5. Centralized Management- Networking allows the management of various resources in
the organization, centrally through architectures such as client server architecture.
6. Backing up data : Creating backup files and restoring them becomes much easier by
implementing networks.
7. Internet and Intranet : Use of Intranet within the area as well as internet which is
global network helps in communication to the external networks.

Page 15 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) Compare star bus with star-ring topology. 4M

Ans: Any other comparison can also be considered. (Any 4


comparis
Comparison of Star bus with Star ring topology ons:
1mark
Characteristics Star Bus Topology Star Ring Topology
each)
Connection The hubs are connected in cascade The hubs are connected in
(bus topology) which in turn are cascade in ring topology which
connected to the computers in star in turn are connected to the
topology. computers in star topology.

Backbone Bus topology is the backbone. Ring topology is the backbone.

Diagram

Network If any one hub fails, the computers If any one hub fails, the whole
Failure connected to other hubs in networks network collapses.
still can communicate.

Ease of network Easy to add computers in star Easy to add computers in star
expansion topology and easy to add hubs in topology and difficult to add
bus topology. hubs in ring topology.

c) State name of protocol used at different layers of OSI model. 4M

Ans: Protocols at different layers of OSI model: (Two


Protocols
1. Physical Layer: Bluetooth, PON, OTN, DSL, IEEE.802.11, IEEE.802.3, L431 and TIA of Each
449. Layer - ½
2. Data Link Layer: ARP, CSLIP, HDLC, IEEE.802.3, PPP, X-25, SLIP, ATM, SDLS and marks
PLIP. each (Any
3. Network Layer: Internet Protocol (IPv4), Internet Protocol (IPv6), IPX, AppleTalk, Four
ICMP, IPSec and IGMP. Layer)
4. Transport Layer: Transmission Control Protocol (TCP), UDP, SPX, DCCP and SCTP.
5. Session Layer: PPTP, SAP, L2TP and NetBIOS.

Page 16 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
6. Presentation Layer: XDR, TLS, SSL and MIME.
7. Application Layer: HTTP, SMTP, DHCP, FTP, Telnet, SNMP and SMPP.

d) Explain the factors to be considered while selecting a cable to establish a network. 4M

Ans: Factors to be considered while selecting a cable: (Any 4


factors : 1
1. Bandwidth: It refers to the data carrying capacity of a channel or medium. Higher mark
bandwidth communication channels support higher data rates. each)
2. Flexibility: In order to expand network, the need for extra equipment or devices.
3. Reliability: The consistency of transmission media (effect of weather conditions).
4. Radiation: It refers to the leakage of signal from the medium due to undesirable
electrical characteristics of the medium.
5. Noise Absorption: It refers to the susceptibility of the media to external electrical noise
that can cause distortion of data signal.
6. Attenuation: It refers to loss of energy as signal propagates outwards. The amount of
energy lost depends on frequency.
7. Number of receivers. The number of users to be connected.
8. Transmission Rate: This refers to the speed or data transmission rate.
9. Cost and Ease of Installation
10. Distance between each device
e) Compare IPV4 and IPV6. 4M

Ans: IPv4 IPv6 (Any four


comparis
on: 1
mark
Source and destination addresses are Source and destination addresses are 128 each)
32 bits (4 bytes) in length.
Bits (16 bytes) in length.

No. addresses are limited to number of Larger addressing area.


bits (32 bits)

Uses broadcast addresses to send There are no IPv6 broadcast addresses.

traffic to all nodes on a subnet. Instead, multicast scoped addresses are

used.

Page 17 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Fragmentation is supported at Fragmentation is not supported at routers. It is
only supported at the originating host.
Originating hosts and intermediate

routers.

IP header includes a checksum. IP header does not include a checksum.

IP header includes options. All optional data is moved to IPv6

extension headers.

IPv4 has classfull addressing scheme, Classless addressing scheme.


includes classes like A,B,C,D and E.

Uses decimal dotted notation Uses hexadecimal notation

f) Describe the architecture of client-server network with its advantages and 4M


disadvantages.

Ans: Client server Architecture consists of Client computers or nodes, which are connected to (2
centralized server. The servers stores all the network's shared files and applications marks;
programs, such as word processor documents, compilers, database applications, Explanati
spreadsheets, and the network operating system. Client will send request to access on:
information from the server based on the request server will send the required information to 1mark;
the client. Advantag
es (Any
two) :
1mark;
Disadvant
ages (Any
two) :
1mark)

Figure: Client Server Architecture

Advantages of Client Server Network:


1. It has the centralized control. i.e. centralized user accounts, security, and access to
simplify network administration.
2. It does not slow down with heavy use.
3. The size of the network can be expanded to any size.
4. Proper Management in which all files are stored at the same place. In this way,

Page 18 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
management of files becomes easy. Also it becomes easier to find files.
5. As all the data is stored on server it’s easy to make a back-up of it.
6. Reduces Data duplication by storing data stored on the servers instead of each client, so it
reduces the amount of data duplication for the application.
Disadvantages of Client Server Network:
1. Server failure leads to whole network failure.
2. It is very expensive to install and manage as dedicated hardware (server) and special
software is required.
3. A Professional IT person is required to maintain the servers and other technical details of
network.
5. Attempt any four: (4x4=16)

a) Explain registered and unregistered IP address. 4M

Ans: Registered IP: (2 marks


1. A public address that is visible on the Internet. Contrast with an "unregistered IP" for each
address, which is private and not exposed to anyone outside of the company or home explanati
network. Except for very large companies, registered IPs are allocated to the Internet on)
service provider (ISP), which assigns them to its customers.

Unregistered IP:
1. An Internet Protocol (IP) address set aside for use within a LAN, intranet, or other
private network and not for use in a public network such as the Internet.
2. An IP address within three ranges of numbers that are set aside for the computers in
local networks. Typically assigned to the machines by a DHCP server, these private
addresses are not routed over the Internet. In order to gain access to the Internet, the
private addresses are converted to a public IP address that is exposed to the Internet
by a network address translation (NAT) service.
b) Describe carrier sense multiple access with collision detection. 4M

Ans: 1. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is the LAN access (4 marks:
method used in Ethernet. Relevant
2. When a device wants to gain access to the network, it checks to see if the network is free. explanati
3. If the network is not free, the device waits a random amount of time before retrying. on)
4. If the network is free and two devices access the line at exactly the same time, their
signals collide.
5. When the collision is detected, they both back off and wait a random amount of time
before retrying.
6. CSMA/CD is a type of contention protocol. Networks using the CSMA/CD procedure
are simple to implement but do not have deterministic transmission characteristics. The
CSMA/CD method is internationally standardized in IEEE 802.3 and ISO 8802.3.

Page 19 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
c) Explain horizontal and vertical communication. 4M

Ans: Horizontal communication (2


marks:
Horizont
al
Commun
ication; 2
marks:
Vertical
Commun
ication;
(1 mark
for each
diagram)
)

1) The horizontal communication is the logical connection between the layers, there is no
direct communication between them.

2) Information included in each protocol header by the transmitting system is a message that
will be carried to the same protocol in the destination system.

3) For two computers to communicate over a n/w, the protocol used at each layer of the OSI
model in the transmitting system must be duplicated at the receiving system.

4) The packet travels up through the protocol stack and each successive header is stripped of
by the appropriate protocol & processed.

5) When the packet arrived at its destination, the process by which the headers are applied at
the source is repeated in server.

Page 20 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429

Vertical communication:

1) In addition to communicating horizontally with the same protocol in the other system, the
header information also enables each layer to communicate with the layer above & below it.

2) Eg. The network layer will communicate with the data link layer & transport layer.

3) This interlayer communication is called communication vertical.

4) When a system receives a packet & passes it up through various layers the data link layer
protocol header includes a field which specifies the name of network layer protocol to be
used to process the packet.

5) The network layer protocol header will specify the name of transport layer protocol to be
used to process the packet.

d) Compare wire and wireless transmission. 4M

Ans: Wired Transmission Wireless Transmission (Any 4


points : 1
It is also called as guided or bounded It is also called as unguided or unbounded mark
media media. each)
Point to point connection i.e. signal Used for radio broadcasting in all
travelling is directed directions i.e. signal travelling is
undirected

Transport signal in electric current or Transport signal in the form of

Page 21 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429

light/ beam electromagnetic waves

Unidirectional, not broadcast Broadcast

Installation is costly and time consuming Installation needs less time and money

Wired media leads to discrete network Wireless media leads to continuous


topologies network topologies

Attenuation depends exponentially on the Attenuation is proportional to square of


distance the distance

Example: Twisted Pair cable, Coaxial Example: Radio, Infrared light,


cable, Fiber optic cable Microwave
e) What is NIC? State three functions of NIC. 4M

Ans: NIC (Network interface card / network adapter): It physically makes the connection, works (1 Mark:-
as interface between computer and network cable. What is
NIC; 3
Functions of NIC: marks:-
1. Establishes and manages the computer’s network connection. any 3
2. Translates digital computer data into signals (appropriate for the networking medium) relevant
for outgoing messages, and translates signals into digital computer data for incoming functions)
messages
3. Provide physical link or connectivity between computer and the network physical
medium.
4. Creates, sends, and receives frames – Frame: fundamental unit of data for network
transmission and reception.
5. Manages access to medium.
6. Control flow of data between computer and physical medium.
7. Acts as gatekeeper (permits inbound communications aimed only at its computer (or
broadcast) to pass through NIC and on to CPU)
– Each card has a unique MAC address in ROM
– Promiscuous mode disables gatekeeper functions

Page 22 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
f) Compare peer to peer and client-server network. 4M

Ans: ( any 4
Peer to peer Network Client Server Network
point: 1
1. It is much like company uses 1. It is much like company uses mark
decentralized management centralized management. each)

2.In this each machine has same power 2. In this server has more power & client
has less power.

3. Uses less expensive computer 3. It is hardware intensive.


hardware.

4. Easy to setup & administrator. 4. Complex to setup & require


professional administrator.

5.Less secure 5.Very secure

6.Network O.S not required 6.Network O.S required

7.It support small Network 7.It support large Network

8.Might hurt user's performance 8.Better performance

6. Attempt any two: (8x2=16)

a) Explain protocol used in internet layer in TCP/IP. 8M

Ans: The Internet Layer Of TCP/IP Is Responsible For Addressing, Packaging, And Routing ( any 4
Functions. The Core Protocols Of The Internet Layer Are IP, ARP, ICMP, And IGMP. protocols
1) The Internet Protocol (IP) 2 marks
each)
a. It Is A Routable Protocol Responsible For IP Addressing, Routing, And The
Fragmentation And Reassembly Of Packets.
b. It Has The Task Of Delivering Packets From The Source Host To The Destination
Host Solely Based On The IP Address In The Packet Headers.
c. For This Purpose, IP Defines Packet Structures That Encapsulate The Data To Be
Delivered.
d. It Also Defines Addressing Methods That Are Used To Label The Datagram With
Source And Destination Information.

2) The Address Resolution Protocol (ARP)


a. It Is Responsible For The Resolution Of The Internet Layer Address To The Network
Interface Layer Address Such As A Hardware Address.
b. ARP Was Defined By RFC 826 In 1982.

Page 23 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
c. ARP Is Used For Mapping A Network Address (E.G. An Ipv4 Address) To A
Physical Address Like An Ethernet Address (Also Named A MAC Address).
d. ARP Has Been Implemented With Many Combinations Of Network And Data Link
Layer Technologies

3) The Internet Control Message Protocol (ICMP)


a. It Is Responsible For Providing Diagnostic Functions And Reporting Errors Due To
The Unsuccessful Delivery Of IP Packets.
b. It Is Used By Network Devices, Like Routers, To Send Error Messages Indicating,
For Example, That A Requested Service Is Not Available Or That A Host Or Router
Could Not Be Reached. ICMP Can Also Be Used To Relay Query Messages.

4) The Internet Group Management Protocol (IGMP)


a. It Is Responsible For The Management Of IP Multicast Groups.
b. It Is Used By Hosts And Adjacent Routers On Ipv4 Networks To Establish Multicast
Group Memberships.
c. IGMP Is An Integral Part Of IP Multicast.
d. IGMP Can Be Used For One-To-Many Networking Applications Such As Online
Streaming Video And Gaming, And Allows More Efficient Use Of Resources When
Supporting These Types Of Applications.
e. IGMP Is Used On Ipv4 Networks.

b) Explain OSI model with neat diagram. Which layer of OSI model packages raw data 8M
bit into data frames? Describe bit stuffing with one example.

Ans: OSI model (open system interconnection) model was developed by ISO (international (OSI
standard organization) diagram -
Function of OSI model 1mark;
1) It provides way to understand how internetwork operates. Explanati
2) It gives guideline for creating network standard. on-3
marks;
OSI model has 7 layers as shown in the figure. Identifica
tion of
correct
layer: 1
mark; Bit
stuffing
explanati
on-2
marks;
Page 24 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
example-
1 mark)

1) Physical layer:
It co-ordinates the functions required to transmit bit stream over physical medium.
It deals with mechanical and electrical specifications of interface and transmission medium.
For transmission it defines procedures and functions that devices and transmission
medium has to perform.
a. Physical characteristics of interfaces and media.
b. Representation of bits:
c. Data rate(transmission rate).
d. Synchronization of bits.
e. Line configuration: Point to point or multipoint configuration should be used.
f.
2) Data link layer:
It is responsible for transmitting group of bits between the adjacent nodes. The group of bits
is called as frame. The network layer passes a data unit to the data link layer. Header
and trailer is added to the data unit by data link layer. This data unit is passed to the
physical layer.
Data link layer is responsible for moving frames from one node to the next.

Functions of data link layer are:


a. Framing
b. Physical addressing
c. Flow control
d. Error control
e. Media access control
f. Node to node delivery

3) Network layer:
It is responsible for routing the packets within the subnet i.e. from source to destination. It is
responsible for source e to destination delivery of individual packets across multiple
Page 25 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
networks. It ensures that packet is delivered from point of origin to destination.
Functions of network layer:
a. logical addressing
b. Routing.
c. Congestion control
d. Accounting and billing
e. Address transformation
f. Source host to destination host error free delivery of packet.

4) Transport layer:
Responsibility of process to process delivery of message Ensure that whole message arrives
in order.
a. Service point addressing
b. Segmentation and reassembly
c. Connection control
d. Flow control: Flow control is performed end to end
e. Error control

5) Session layer:
Establishes, maintains, synchronizes the interaction among communication systems It is
responsible for dialog control and synchronization
a. Dialog control
b. Synchronization, session and sub session
c. Session closure

6) Presentation layer:
It is concerned with syntax, semantics of information exchanged between the two systems.
Functions:
a. Translation,
b. encryption,
c. compression

7) Application layer:
It enables user to access the network. It provides user interfaces and support for services like
email, remote file access.
Functions:
a. network virtual terminal,
b. file transfer access and management,
c. mail services

Page 26 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
d. directory services

Data link layer of OSI model packages raw data bit into data frames.

Bit stuffing:
Bit stuffing is the process of adding one extra 0 whenever five consecutive 1‟s in the data,
so that the receiver does not mistake the pattern 0111110 or a flag. At sender side the bit is
stuffed and at receiver side stuffed bit is removed. As shown in following

Example:

Sequence 011111111000 becomes 0111110111000.


This extra bit is inserted regardless of sixth bit 0 or 1.

c) How cross cable is created? Draw figure and explain. Give its use. 8M

How cross cable is created: (how


cross
cable is
1. A crossover cable is a type of cable installation that is used for the interconnection of
two similar devices. It is enabled by reversing the transmission and receiving pins at created:3
both ends, so that output from one computer becomes input to the other, and vice marks,
versa. diagram:
2. Here, One end of the cable is crimped in the same way as straight cable, on the other 3 marks,
end the following change has to be done, Use: 2
1-White and 3 Orange- white are to be connected 2 – Green and 6 - Orange are to be marks)
connected as shown in the fig below.

Page 27 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429

Uses:
a. While connecting one computer to another without going through router, switch or
hub, the crossover cables are used.
b. These are also used when connecting one computer to a device directly, without any
other connecting device.
c. Cross cable is used for connecting similar level (Homogenous) devices.
For example: two computers or connecting computer with hub since all are level 1
device.

Page 28 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 19 EXAMINATION
Subject Name: Data Communication and Network

Model Answer

Subject Code: 22414


Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in
the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may vary.
The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s
answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based
on equivalent concept.

Q. Sub Answer Marking


No. Q. Scheme
N.
1. Attempt any Five of the following: 10M
a Define bit rate and baud rate. 2M
Ans Bit Rate: Bit rate is simply the number of bits (i.e., 0's and 1's) transmitted per 1M-Bit rate
unit time. 1M-Baud Rate
Baud Rate: Baud rate is the number of signal units transmitted per unit time that
is needed to represent those bits.
b List different characteristics of data communication system.(Any two) 2M
Ans 1. Delivery 1 M for 1
2. Accuracy characteristic
3. Timeliness
4. Jitter
c Define guided and unguided communication media. 2M
Ans Guided communication media: Guided transmission media are known as the 1M-Guided
wired communication. The electromagnetic signals travel between the media
communicating devices through a physical medium/conductor. 1M-Unguided
Unguided communication media: The unguided media is also called wireless media
communication. It does not require any physical medium to transmit
electromagnetic signals. In unguided media, the electromagnetic signals are
broadcasted through air to everyone.

1|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

d Classify mobile generations. 2M

Ans First Generation (1G) All


Second Generation (2G) generations to
Third Generation (3G) be mentioned-
Fourth Generation (4G) or LTE 2M
Fifth Generation (5G)
e Compare LRC and CRC(Any two points each) 2M
Ans 2 M for any
LRC CRC relevant 2
Longitudinal Redundancy Cyclic Redundancy Check points
Check (LRC)is a method in (CRC) is one of the most
which a block of bits is common and powerful error
organized in table(rows and detecting codes in which a
columns)calculate the parity sequence of redundant bits,
called the CRC is appended to
bit for each column and the the end of the unit so that the
set of this parity bit is also resulting data unit become
sending with original data. exactly divisible by a second,
From the block of parity we predetermined binary number.
can check the redundancy
LRC of n bits can easily CRC is more powerful than
detect
Burst error of n bits. VRC and LRC in detecting
errors.
A longitudinal redundancy CRC is based on binary
check (LRC) is an error- division.
detection method based on
binary addition
f State different types of Network topologies. 2M
Ans 1. Mesh Topology Mention of all
2. Star Topology Topologies-
3. Bus Topology 2M
4. Ring Topology
5. Hybrid Topology
g List classes of IP addressing with their IP address range. 2M
Ans An IP address is an address used to uniquely identify a device on an IP List1M,correct
network. range 1M
Classes and range:
Class A- 1.0.0.1 to 126.255.255.254
Class B - 128.1.0.1 to 191.255.255.254
Class C - 192.0.1.1 to 223.255.254.254
Class D- 224.0.0.0 to 239.255.255.255
Class E - 240.0.0.0 to 254.255.255.254

2|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

2. Attempt any Three of the following: 12M


a Differentiate between synchronous and asynchronous 4M
communication.(Any four points)
Ans
Synchronous communication Asynchronous communication 1M for 1
In Synchronous Transmission, data is In Asynchronous Transmission, point
sent in form of blocks or frames. data is sent in form of byte or
character.
Sender and Receiver use the same clock Does not need clock signal
signal between the sender and the
receiver

It is more efficient and more reliable In this transmission start bits and
than asynchronous transmission to stop bits are added with data.
transfer the large amount of data.

Synchronous transmission is fast. Asynchronous transmission is


slow.
In Synchronous transmission, time In asynchronous transmission,
interval of transmission is constant. time interval of transmission is
not constant, it is random.
b Draw and explain fiber optic cable. 4M
Ans 2 M Labelled
Diagram,2 M
explanation

Fiber optic cable:


 A fiber-optic cable is made up of glass or plastic.
 It transmits signals in the form of light.
 The outer jacket is made up of PVC or Teflon.
 Kevlar strands are placed inside the jacket to strengthen the cable.
 Below the Kevlar strands, there is another plastic coating which acts as a
cushion.
 The fiber is at the center of the cable, and it consists of cladding and glass core.
 The density of the cladding is less than that of the core.

3|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Optical fibers use the principle of ‘reflection’ to pass light through a channel.
c Explain wireless LAN 802.17 architecture. 4M
Ans Consider
Wireless LAN 802.11: IEEE 802.11
The IEEE 802.11 standard defines the physical layer and media access control instead of
(MAC) layer for a wireless local area network. Wireless LANs transmit and 802.17
receive data over the atmosphere, using radio frequency (RF) or infrared optical
technology, thereby; eliminating the need for fixed wired connections.
802.11 Architecture: BSS diagram
1M,
The 802.11architecture defines two types of services: Explanation -
1M-
1. Basic services set (BSS) ESS diagram
1M,
2. Extended Service Set (ESS) Explanation -
1M
1. Basic Services Set (BSS)

• The basic services set contain stationary or mobile wireless stations and a *Note:
central base station called access point (AP). If student
• The use of access point is optional. attempted to
• If the access point is not present, it is known as stand-alone network. Such a solve the
BSS cannot send data to other BSSs. This type of architecture is known as adhoc answer give
architecture. appropriate
• The BSS in which an access point is present is known as an infrastructure marks.
network.

2. Extend Service Set (ESS)


An extended service set is created by joining two or more basic service sets (BSS)
having access points (APs).

4|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

These extended networks are created by joining the access points of basic services
sets through a wired LAN known as distribution system.

There are two types of stations in ESS:

(i) Mobile stations: These are normal stations inside a BSS.

(ii) Stationary stations: These are AP stations that are part of a wired LAN.

d State the functions of any two layers of OSI Model 4M


Ans The functions of the physical layer are : Functions of
each layer-
1. Bit synchronization: The physical layer provides the synchronization of
2M
the bits by providing a clock. This clock controls both sender and receiver
thus providing synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e.
the number of bits sent per second.
3. Physical topologies: Physical layer specifies the way in which the
different, devices/nodes are arranged in a network i.e. bus, star or mesh
topology.
4. Transmission mode: Physical layer also defines the way in which the data
flows between the two connected devices. The various transmission modes
possible are: Simplex, half-duplex and full-duplex.

5|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Functions of data link layer:

 Framing: Data-link layer takes packets from Network Layer and


encapsulates them into Frames. Then, it sends each frame bit-by-bit on
the hardware. At receiver’ end, data link layer picks up signals from
hardware and assembles them into frames.
 Addressing: Data-link layer provides layer-2 hardware addressing
mechanism. Hardware address is assumed to be unique on the link. It is
encoded into hardware at the time of manufacturing.
 Synchronization: When data frames are sent on the link, both machines
must be synchronized in order to transfer to take place.
 Error Control: Sometimes signals may have encountered problem in
transition and the bits are flipped. These errors are detected and
attempted to recover actual data bits. It also provides error reporting
mechanism to the sender.
 Flow Control: Stations on same link may have different speed or
capacity. Data-link layer ensures flow control that enables both
machines to exchange data on same speed.
 Multi-Access: When host on the shared link tries to transfer the data, it
has a high probability of collision. Data-link layer provides mechanism
such as CSMA/CD to equip capability of accessing a shared media
among multiple Systems.
Functions of the Network layer are as follows:
 It is responsible for routing packets from the source host to the
destination host. The routes can be based upon static tables that are rarely
changed, or they can be automatically updated depending upon network
conditions.
 The data link layer assigns the physical address locally. When the data
packets are routed to remote locations, a logical addressing scheme is
required to differentiate between the source system and the destination
system. This is provided by the network layer.
 This layer also provides mechanisms for congestion control.
 The network layer tackles issues like transmission delays, transmission
time, avoidance of jitters, etc.
Functions of Transport Layer

 Service Point Addressing: Transport Layer header includes service


point address which is port address. This layer gets the message to the
correct process on the computer unlike Network Layer, which gets each
packet to the correct computer.
 Segmentation and Reassembling: A message is divided into segments;
each segment contains sequence number, which enables this layer in
reassembling the message. Message is reassembled correctly upon

6|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

arrival at the destination and replaces packets which were lost in


transmission.
 Connection Control: It includes 2 types:
 Connectionless Transport Layer: Each segment is considered as an
independent packet and delivered to the transport layer at the destination
machine.
 Connection Oriented Transport Layer: Before delivering packets,
connection is made with transport layer at the destination machine.
 Flow Control: In this layer, flow control is performed end to end.
 Error Control: Error Control is performed end to end in this layer to
ensure that the complete message arrives at the receiving transport layer
without any error. Error Correction is done through retransmission.

The functions of the Session layer are :


1. Session establishment, maintenance and termination: The layer allows
the two processes to establish, use and terminate a connection.
2. Synchronization: This layer allows a process to add checkpoints which
are considered as synchronization points into the data. These
synchronization point help to identify the error so that the data is re-
synchronized properly, and ends of the messages are not cut prematurely
and data loss is avoided.
3. Dialog Controller: The session layer allows two systems to start
communication with each other in half-duplex or full-duplex.
The functions of the presentation layer are :
1. Translation: For example, ASCII to EBCDIC.
2. Encryption/ Decryption: Data encryption translates the data into another
form or code. The encrypted data is known as the cipher text and the
decrypted data is known as plain text. A key value is used for encrypting
as well as decrypting data.
3. Compression: Reduces the number of bits that need to be transmitted on
the network.
The functions of the Application layer are :
1. Network Virtual Terminal
2. FTAM-File transfer access and management
3. Mail Services
4. Directory Services

3. Attempt any Three of the following: 12M


a State the two advantages and disadvantages of unguided media 4M
Ans Advantages: 2M
advantages
1 .Use for long distance communication.

7|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

2. High speed data transmission. 1 mark for


each
3. Many receiver stations can receive signals from same sender station advantage
2M
Disadvantages :1..Radio waves travel through Lowest portion of atmosphere
Disadvantages
which can have lot of noise and interfering signals
1mark for
2. Radio wave communication through unguided media is an insecure each
communication. disadvantage

3.Radio wave propagation is susceptible to weather effects like rain, thunder and
storm etc.
b Draw and explain block diagram of communication system. 4M
Ans 1 M diagram.
3M
explanation

Considering the communication between two computers , the communication


system is as shown in above diagram

It has following five components:

1. Message
2. Sender
3. Medium
4. Receiver
5. Protocol

Message:

 Message is the information or data which is to be sent from sender to the


receiver
 A message can be in the form of sound, text, picture, video or
combination of them(multimedia)

Sender: Sender is device such as host, camera, workstation, telephone etc.


which sends the message over medium

Medium: The message originated from sender needs a path over which it can
travel to the receiver. Such path is called as medium or channel

8|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Receiver: It is the device which receives the message and reproduces it. A
receiver can be host, camera, workstation, telephone etc.

Protocol: A protocol is defined as set of rules agreed by sender and receiver.


Protocol governs the exchange of data in true sense.
c Describe different connecting devices used in computer network. 4M
Ans Network Connecting devices are: Any 4 devices.
1 M each
1. Repeater
2. Hub

3. Switch
4. Bridge
5. Router
6. Gateway
7. Modem

Repeater:

It is used to take the distorted, weak and corrupt input signal and regenerate
this signal at its output.

It ensures that the signals are not distorted or weak before it reaches the
destination.

It recreates the bit pattern of the signal, and puts this regenerated signal back
on to the transmission medium

It works in the physical layer with no intelligent function.

Hub:

It is also known as multiport repeater.

It is normally used for connecting stations in a physical star topology.

It is the broadcasting device.

It sends packets to all nodes in the network.

Switch: It is used to connect multiple computers in which it can direct a


transmission toits specific destination. (Unicast the signals).

9|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

It is a unicasting device.

It avoids unnecessary network traffic.

It operates in both the physical and the data link layer.

Bridge:

It is a device which connects two or more segment of a network.

A bridge filters data traffic at a network boundary.

Bridges reduces the amount of traffic on a LAN by dividing it into two


segments.

It inspects incoming traffic and decides whether to forward or discard it.

It sends packets between two networks of same type.

A bridge operates in both the physical and the data link layer.

Gateway:

It is a node in a computer network, a key stopping point for data on its way to
or from other networks.

Gateway is protocol converter.

Gateway enables communication between different network architecture and


environments.

It works at all layers of OSI model.

Router:

It is a device that helps in determining the best and shortest path out of the
available paths, for a particular transmission.

Routers use logical and physical addressing to connect two or more logically
separate networks.

Router read complex network address in packet and efficiently directs packets
from one network to another, reducing excessive traffic.

It works at Physical, Data-Link and Network Layer of OSI model

It Connect dissimilar networks.

Modem:

10 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Modem works as modulator as well as demodulator.

It is the device used to converts digital signals generated by the computer into
analog signals which can be transmitted over a telephone or cable line
transforms incoming analog signals into their digital equivalents.

A two way communication is established.


d Draw and explain OSI reference model. 4M
Ans OSI model (Open System Interconnection) model was developed by ISO
(international standard organization) which provides way to understand how
internetwork operates. It gives guidelines for creating network standard.
OSI model has 7 layers as shown in the figure. 1 M diagram

Application Layer, Presentation Layer ,Session Layer, Transport Layer and 3 M


,Network Layer ,Data link Layer and Physical Layer
explanation
Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical
impulse, light or radio signal — through the network at the electrical and
mechanical level. It provides the hardware means of sending and receiving data
on a carrier, including defining cables, cards and physical aspects.
Data Link (Layer 2) At OSI Model, Layer 2, data packets are encoded and
decoded into bits. It furnishes transmission protocol knowledge and
management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media
Access Control (MAC) layer and the Logical Link Control (LLC) layer. The
MAC sub layer controls how a computer on the network gains access to the data
and permission to transmit it. The LLC layer controls frame synchronization,
flow control and error checking.

Network (Layer 3) Layer 3 provides switching and routing technologies,


creating logical paths, known as virtual circuits, for transmitting data from node
to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and packet
sequencing.
Transport (Layer 4) Layer 4, provides transparent transfer of data between end
systems, or hosts, and is responsible for end-to-end error recovery and flow
control. It ensures complete data transfer from source to destination.
Session (Layer 5) This layer establishes, manages and terminates connections
between applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at each end.
It deals with session and connection coordination

11 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Presentation (Layer 6) This layer provides independence from differences in


data representation (e.g., encryption) by translating from application to network
format, and vice versa. The presentation layer works to transform data into the
form that the application layer can accept. This layer formats and encrypts data
to be sent across a network, providing freedom from compatibility problems. It
is sometimes called the syntax & semantics.
Application (Layer 7) OSI Model, Layer 7, supports application and end-user
processes. Everything at this layer is application-specific. This layer provides
application services for file.

4. Attempt any Three of the following: 12M


a Describe Multiplexing techniques 4M
Ans Multiplexing is a technique by which different analog and digital streams of 2 M each
transmission can be simultaneously processed over a shared link. Multiplexing technique
divides the high capacity medium into low capacity logical medium which is explanation
then shared by different streams. Communication is possible over the air (radio
frequency), using a physical media (cable), and light (optical fiber). All
mediums are capable of multiplexing. When multiple senders try to send over a
single medium, a device called Multiplexer divides the physical channel and
allocates one to each. On the other end of communication, a De-multiplexer
receives data from a single medium, identifies each, and sends to different
receivers.

Different multiplexing techniques are

1.Frequency Division multiplexing

2.Time division multiplexing

Frequency Division Multiplexing: When the carrier is frequency, FDM is


used. FDM is an analog technology. FDM divides the spectrum or carrier

12 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

bandwidth in logical channels and allocates one user to each channel. Each user
can use the channel frequency independently and has exclusive access of it. All
channels are divided in such a way that they do not overlap with each other.
Channels are separated by guard bands. Guard band is a frequency which is not
used by either channel.

Time Division Multiplexing: TDM is applied primarily on digital signals but


can be applied on analog signals as well. In TDM the shared channel is divided
among its user by means of time slot. Each user can transmit data within the
provided time slot only. Digital signals are divided in frames, equivalent to time
slot i.e. frame of an optimal size which can be transmitted in given time slot.
TDM works in synchronized mode. Both ends, i.e. Multiplexer and De-
multiplexer are timely synchronized and both switch to next channel
simultaneously.

When channel A transmits its frame at one end, the De-multiplexer provides
media to channel A on the other end. As soon as the channel A’s time slot
expires, this side switches to channel B. On the other end, the De-multiplexer

13 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

works in a synchronized manner and provides media to channel B. Signals from


different channels travel the path in interleaved manner

b Compare IPV4 and IPV6 (any four point) 4M


Ans Any 4 correct
IPV4 IPv6 points1M each

Source and destination Source and destination


addresses are 32 bits (4 bytes) addresses are 128Bits (16
in length. bytes) in length.

No. addresses are limited to Larger addressing area


number of bits (32 bits)

Uses broadcast addresses to There are no IPv6 broadcast


send traffic to all nodes on a addresses. Instead, multicast
subnet. scoped addresses aroused

Fragmentation is supported at Fragmentation is not


Originating hosts and supported at routers. It is only
intermediate routers. supported at the originating
host

IP header includes a IP header does not include a


checksum checksum.

IP header includes options All optional data is moved to


IPv6extension headers

IPv4 has classful addressing Classless addressing scheme.


scheme, includes classes like
A,B,C,D and E.

Uses decimal dotted notation Uses hexadecimal notation

c Explain circuit switching networks with neat sketch. 4M


Ans Circuit switching is a connection-oriented network switching technique. Here, a 1 M for
dedicated route is established between the source and the destination and the diagram.
entire message is transferred through it. 3 M for
explaination
Phases of Circuit Switch Connection:

 Circuit Establishment: In this phase, a dedicated circuit is established


from the source to the destination through a number of intermediate
switching centers. The sender and receiver transmits communication
signals to request and acknowledge establishment of circuits.

14 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Data Transfer: Once the circuit has been established, data and voice are
transferred from the source to the destination. The dedicated connection
remains as long as the end parties communicate.
 Circuit Disconnection: When data transfer is complete, the connection
is relinquished. The disconnection is initiated by any one of the user.
Disconnection involves removal of all intermediate links from the sender
to the receiver.

The diagram represents circuit established between two telephones


connected by circuit switched connection. The blue boxes represent the
switching offices and their connection with other switching offices. The
black lines connecting the switching offices represent the permanent link
between the offices.
d Draw and explain TCP/IP model. 4M
Ans TCP/IP that is Transmission Control Protocol and Internet Protocol has 1 M for
following features diagram.
3 M for
●Support for a flexible architecture. Adding more machines to a network was explaination
easy.
●The network is robust, and connections remained intact until the source and
destination machines were functioning. The main idea was to allow one
application on one computer to talk to (send data packets) another application
running on different computer.

Different Layers of TCP/IP Reference Model Below:

15 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Fig: TCP/IP reference model

Layer 1: Host-to-network Layer

1. Lowest layer of the all.

2. Protocol is used to connect to the host, so that the packets can be sent over it.

3. Varies from host to host and network to network.

Layer 2: Internet layer

1. Selection of a packet switching network which is based on a connectionless


internetwork layer is called a internet layer.

2. It is the layer which holds the whole architecture together.

3. It helps the packet to travel independently to the destination.

4. Order in which packets are received is different from the way they are sent.

5. IP (Internet Protocol) is used in this layer.

6. The various functions performed by the Internet Layer are:

o Delivering IP packets
o Performing routing
o Avoiding congestion

Layer 3: Transport Layer

16 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

1. It decides if data transmission should be on parallel path or single path.

2. Functions such as multiplexing, segmenting or splitting on the data is done


by transport layer.

3. The applications can read and write to the transport layer.

4. Transport layer adds header information to the data.

5. Transport layer breaks the message (data) into small units so that they are
handled more efficiently by the network layer.

6.Transport layer also arrange the packets to be sent, in sequence

Layer 4: Application Layer

The TCP/IP specifications described a lot of applications that were at the top of
the protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
1. Telnets a two-way communication protocol which allows connecting to a
remote machine and run applications on it.

2. FTP (File Transfer Protocol) is protocol that allows File transfer amongst
computer users connected over a network. It is reliable, simple and efficient.
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to
transport electronic mail between a source and destination, directed via a route.
4. DNS (Domain Name Server) resolves an IP address into a textual address for
Hosts connected over a network.

5. It allows peer entities to carry conversation.6.It defines two end-to-end


protocols: TCP and UDP.
e Explain various IEEE communication standards. 4M
Ans A set of network standards developed by the IEEE. They include: 1 M for 1
standard each
 IEEE 802.1: Standards related to network management.
 IEEE 802.2: General standard for the data link layer in the OSI
Reference Model. The IEEE divides this layer into two sublayers -- the
logical link control (LLC) layer and the media access control (MAC)
layer. The MAC layer varies for different network types and is defined
by standards IEEE 802.3 through IEEE 802.5.
 IEEE 802.3: Defines the MAC layer for bus networks that use
CSMA/CD. This is the basis of the Ethernet standard.
IEEE 802.4: Defines the MAC layer for bus networks that use a token
passing mechanism (token bus networks).

17 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 IEEE 802.5: Defines the MAC layer for token-ring networks.


 IEEE 802.6: Standard for Metropolitan Area Networks (MANs).
 IEEE 802.11 Wireless Network Standards: 802.11 is the collection of
standards setup for wireless networking.

5. Attempt any Two of the following: 12M


a Explain simplex, half duplex and full duplex modes in data 6M
communication.
Ans Transmission mode refers to the mechanism of transferring of data between two for each mode
devices connected over a network. It is also called Communication Mode. These 1M for
modes direct the direction of flow of information. There are three types of diagram 1M
transmission modes. for
explanation
They are:

 Simplex Mode
 Half duplex Mode
 Full duplex Mode
1. In Simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit; the other can
only receive. The simplex mode can use the entire capacity of the
channel to send data in one direction.
Keyboards, traditional monitors and printers are examples of simplex devices.

2. In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of the
channel can be utilized for each direction
-for example: Walkie-talkies.

3. In full-duplex mode both stations can transmit and receive data


simultaneously. The transmission medium sharing can occur in two ways,

18 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

namely, either the link must contain two physically separate transmission
paths or the capacity of the channel is divided between signals traveling in
both directions .One common example of full-duplex communication is the
telephone network. When two people are communicating by a telephone
line, both can talk and listen at the same time.

b Describe the principles of packet switching and circuit switching 6M


techniques with neat diagram.
Ans Circuit Switching: When two nodes communicate with each other over a Circuit
dedicated communication path, it is called circuit switching. There 'is a need of switching-3M
pre-specified route from which data will travels and no other data is permitted. 1 M –diagram,
In circuit switching, to transfer the data, circuit must be established so that the 2M
data transfer can take place. explanation:
Packet
Circuits can be permanent or temporary. Applications which use circuit
switching-3 M
switching may have to go through three phases:
1M- diagram,
 Establish a circuit 2M
explanation
 Transfer the data
 Disconnect the circuit

19 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Circuit switching was designed for voice applications. Telephone is the best
suitable example of circuit switching. Before a user can make a call, a virtual
path between callers and called is established over the network.

Packet Switching: The entire message is broken down into smaller chunks
called packets. The switching information is added in the header of each packet
and transmitted independently.
It is easier for intermediate networking devices to store small size packets and
they do not take much resource either on carrier path or in the internal memory
of switches.

Packet switching enhances line efficiency as packets from multiple applications


can be multiplexed over the carrier. The internet uses packet switching
technique. Packet switching enables the user to differentiate data streams based
on priorities. Packets are stored and forwarded according to their priority to
provide quality of service.
c Explain configuration of TCP/IP protocol in network. 6M
Ans Before beginning configuration procedure, the following are the prerequisites. Step by step
 Network hardware is installed and cabled. . procedure -6M
 TCP/IP software is installed.
To configure your TCP/IP network, the following steps are followed:
 Read TCP/IP protocols for the basic organization of TCP/IP.

20 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Minimally configure each host machine on the network.


This means adding a network adapter, assigning an IP address, and assigning a
host name to each host, as well as defining a default route to your network. For
background information on these tasks, refer to TCP/IP network
interfaces, TCP/IP addressing, and Naming hosts on your network.

 Configure and start the intend daemon on each host machine on the
network. Read TCP/IP daemons and then follow the instructions
in Configuring the intend daemon.
 Configure each host machine to perform either local name resolution or to
use a name server. If a hierarchical Domain Name networks being set up,
configure at least one host to function as a name server.

 If the network needs to communicate with any remote networks, configure


at least one host to function as a gateway. The gateway can use static routes
or a routing daemon to perform inters network routing.

 Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in Client network
services if you wish to make a particular service unavailable.

 Decide which hosts on the network will be servers, and which services a
particular server will provide.Follow the instructions in Server network
services to start the server daemons you wish to run.

 Configure any remote print servers that are needed.


 Optional: If desired, configure a host to use or to serve as the master time
server for the network.

6. Attempt any Three of the following: 12M


a Describe Bluetooth architecture technologies. 6M
Ans Piconet 3M
Bluetooth Architecture
(1M diagram,
Bluetooth architecture defines two types of networks: 2M for
1. Piconet explanation);
Scatternet-
2. Scatternet
3M(1M
1. Piconet diagram, 2M
• Piconet is a Bluetooth network that consists of one primary (master) node and for
seven active secondary (slave) nodes. explanation
• Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or
stations within the distance of 10 meters.
• There can be only one primary or master station in each piconet.

21 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

• The communication between the primary and the secondary can be one-to-one
or one-to-many.

• All communication is between master and a slave. Salve-slave communication


is not possible.
• In addition to seven active slave station, a piconet can have upto 255 parked
nodes. These parked nodes are secondary or slave stations and cannot take part
in communication until it is moved from parked state to active state.
2. Scatternet
• Scattemet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station or node can receive messages from the master in the first piconet
and deliver the message to its slaves in other piconet where it is acting as master.
This node is also called bridge slave.
• Thus a station can be a member of two piconets.
• A station cannot be a master in two piconets.

b Explain the process of DHCP server configuration. 6M

22 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Ans Step by step


procedure- 6M
Configuring the DHCP Server

To configure the DHCP server:

1. From the Control Panel, go to Administrative Tools >> Computer


Management >> Services and Application >> DHCP.

2. From the Action menu, select New Scope.

The New Scope wizard is displayed.

3. Enter the following information as prompted:

 Scope name and description:


 IP address range (for example, 192.168.0.170 to 192.168.0.171)
 Subnet mask (for example, 255.255.255.0)
 Add exclusions (do not exclude any IP addresses)
 Lease duration (accept the default of 8 days)
 Router (default gateway) of your subnet (for
example, 192.168.0.1)
 Domain name, WINS server (these are not needed)
 Activate Scope? (select “Yes, I want to activate this scope now”)

4. Click Finish to exit the wizard.

The contents of the DHCP server are listed.

5. Right-click Scope [iPad dress] scope-name and select Properties.

6. In the Scope Properties box, click the Advanced tab.

7. Select BOOTP only, set the lease duration to Unlimited, and click OK.

8. Right-click Reservations.

The Controller A Properties box is displayed.

9. Enter the IP address and the MAC address for Controller A. Click
Add.

The Controller B Properties box is displayed.

23 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

10. Enter the IP address and the MAC address for Controller B. Click
Add.

The controllers are added to the right of the Reservations listing.

11. Right-click Scope [iPad dress] scope-name to disable the scope.

12. Click Yes to confirm disabling of the scope.

13. Right-click Scope and select Activate.


c Describe wireless infrastructure components in detail. 6M

Ans 4 components-
Wireless Network Infrastructures
11/2M each
The infrastructure of a wireless network interconnects wireless users and end
systems. The infrastructure might consist of base stations, access controllers,
application connectivity software, and a distribution system. These components
enhance wireless communications and fulfill important functions necessary for
specific applications.
1. Base Stations
The base station is a common infrastructure component that interfaces the
wireless communications signals traveling through the air medium to a wired
network? Often referred to as a distribution system. Therefore, a base station
enables users to access a wide range of network services, such as web browsing,
e-mail access, and database applications. A base station often contains a wireless
NIC that implements the same technology in operation by the user's wireless
NIC.
Residential gateways and routers are more advanced forms of base stations that
enable additional network functions.
As show in Figure a base station might support point-to-point or point-to-
multipoint communications.

24 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Base Stations Support Different Configurations

Access Controllers
In the absence of adequate security, quality of service (QoS), and roaming
mechanisms in wireless network standards, companies offer access-control
solutions to strengthen wireless systems. The key component to these solutions
is an access controller, which is typically hardware that resides on the wired
portion of the network between the access points and the protected side of the
network. Access controllers provide centralized intelligence behind the access
points to regulate traffic between the open wireless network and important
resources. In some cases, the access point contains the access control function.
Application Connectivity Software
Web surfing and e-mail generally perform well over wireless networks. All it
takes is a browser and e-mail software on the client device. Users might lose a
wireless connection from time to time, but the protocols in use for these
relatively simple applications are resilient under most conditions.
Special application connectivity software is necessary as an interface between
a user's computer device and the end system hosting the application's software
or database.

25 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Distribution System
A wireless network is seldom entirely free of wires. The distribution system,
which often includes wiring, is generally necessary to tie together the access
points, access controllers, and servers. In most cases, the common Ethernet
comprises the distribution system.

26 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 19 EXAMINATION
Subject Name: Data Communication Network Model Answer Subject Code: 22414

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given
in the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may
vary. The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the
assumed constant values may vary and there may be some difference in the
candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner
of relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program
based on equivalent concept.

Q. Sub Answer Marking


No. Q. Scheme
N.
Q.1 Attempt any five of the following: 10 M

a Define Computer Network and state its types. 2M


Ans Definition: 1M
A computer network is a group of computer systems and other computing hardware definition
devices that are linked together through communication channels to facilitate , 1M for
communication and resource sharing among a wide range of users. types

Types of Computer Networks:

 Local Area Networks (LAN)


 Personal Area Networks (PAN)
 Home Area Networks (HAN)
 Wide Area Networks (WAN)
 Metropolitan Area Networks (MAN)
 The Internet

b State various Computer Network applications 2M


Ans Computer Network Applications: Any
1. File Sharing Four- 1/2

Page No: 1 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

2. Printer Sharing M each


3. Application Services
4. E-mail Services
5. Remote access
6. Internet & Intranet

C List any four Unguided Transmission Media. 2M


Ans Unguided Media or Wireless media: ½ M each

(a) Radio wave

(b) Microwave

(c) infrared

(d) Satellite

d State types of Errors


Ans Content Error 1 M each

Flow Integrity error

e List IEEE 802 X standards for networks 2M


Ans 1. 802.3: Ethernet 1/2 M
each
2. 802.4:Token Bus

3. 802.5:Token Ring

4. 802.11:Wi Fi(Wireless Fidelity)

f Compare Router and Repeater. 2M


Ans Router Repeater any 2
points 1
A router is a device like a Repeater regenerates the M each
switch that routes data packets signal over the same
based on their IP addresses. network before the signal
becomes too weak or
corrupted so as to extend the
length to which the signal
can be transmitted over the
same network.
Router is mainly a Network A repeater operates at the
Layer device. physical layer.

Page No: 2 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

g State functions of Network layer 2M


Ans Functions of network layer: 1/2M
each
1. logical addressing

2. Routing.

3. Congestion control

4. Accounting and billing

5. Address transformation

6. Source host to destination host error free delivery of packet.

Q2 Attempt any THREE of the following : 12 M


a Classify the network based on geographical area and transmission technology 4M
Ans Classification of networks based on geography: 2 M for
geographi
LAN - Local Area Network cal area
and 2 M
MAN - Metropolitan Area Network for
transmiss
WAN - Wide Area Network ion
technolog
CAN - Campus Area Network
y.
PAN - Personal Area Network Explanati
on
LAN: LAN is local area network. LAN is privately-owned networks covering a optional
small geographic area(less than 1 km), like a home, office, building or group of
buildings. LAN transmits data with a speed of several megabits per second.

MAN: A Metropolitan Area Network (MAN) is a large computer network that


spans a metropolitan area or campus. 2. A MAN typically covers an area up to 10
kms (city). The best example of MAN is the cable Television network, available in
many cities.

Page No: 3 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WAN: WAN is wide area network. WAN is a long-distance communication


network that covers a wide geographic area, such as state or country. The most
common example is internet.

The transmission technology can be categorized broadly into two types:

1. Broadcast networks

Broadcast networks have a single communication channel that is shared or used by


all the machines on the network. Short messages called packets sent by any
machine are received by all the others. Broadcast systems generally use a special
code in the address field for addressing a packet to all the concerned computers.
This mode of operation is called broadcasting.

2. Point-to-point networks
Point to point networks consists of many connections between individual pairs of
machines. To go from the source to the destination a packet on these types of
network may have to go through intermediate computers before they reach the
desired computer.

b Draw structural diagram of fiber optic cable and write its functions 4M
Ans 2 M for
diagram
and 2 M
for
functions

Fig. Structural diagram for Fibre Optic Cable

Functions of Optical Cable:

1. Single-mode fibers - Used to transmit one signal per fiber (used in telephones
and cable TV)

2. Multi-mode fibers - Used to transmit many signals per fiber (used in computer

Page No: 4 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

networks, local area networks)

c Describe various IEEE standards for network topologies. 4M


Ans A set of network standards developed by the IEEE. They include: 1 Mark
for 1
standard
 IEEE 802.1: Standards related to network management. each
 IEEE 802.2: General standard for the data link layer in the OSI Reference
Model. The IEEE divides this layer into two sublayers -- the logical link
control (LLC) layer and the media access control (MAC) layer. The MAC
layer varies for different network types and is defined by standards IEEE
802.3 through IEEE 802.5.
 IEEE 802.3: Defines the MAC layer for bus networks that use CSMA/CD.
This is the basis of the Ethernet standard.
 EEE 802.4: Defines the MAC layer for bus networks that use a token-
passing mechanism (token bus networks).
 IEEE 802.5: Defines the MAC layer for token-ring networks.
 IEEE 802.6: Standard for Metropolitan Area Networks (MANs).
 IEEE 802.11 Wireless Network Standards: 802.11 is the collection of
standards setup for wireless networking.

d Draw and explain layered architecture of OSI model. 4M


Ans OSI model (Open System Interconnection) model was developed by ISO 1M
(international standard organization) which provides way to understand how diagram
internetwork operates. It gives guidelines for creating network standard. and 3 M
explanati
OSI model has 7 layers as shown in the figure. Application Layer, Presentation on
Layer ,Session Layer ,Transport Layer ,Network Layer ,Data link Layer and
Physical Layer

Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical impulse,
light or radio signal — through the network at the electrical and mechanical level.
It provides the hardware means of sending and receiving data on a carrier,
including defining cables, cards and physical aspects.

Data Link (Layer 2) At OSI Model, Layer 2, data packets are encoded and
decoded into bits. It furnishes transmission protocol knowledge and management
and handles errors in the physical layer, flow control and frame synchronization.
The data link layer is divided into two sub layers: The Media Access Control
(MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer
controls how a computer on the network gains access to the data and permission to
transmit it. The LLC layer controls frame synchronization, flow control and error

Page No: 5 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

checking.

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data link Layer

Physical Layer

OSI Model

Network (Layer 3) Layer 3 provides switching and routing technologies, creating


logical paths, known as virtual circuits, for transmitting data from node to node.
Routing and forwarding are functions of this layer, as well as addressing,
internetworking, error handling, congestion control and packet sequencing.

Transport (Layer 4) Model, Layer 4, provides transparent transfer of data


between end systems, or hosts, and is responsible for end-to-end error recovery and
flow control. It ensures complete data transfer from source to destination.

Session (Layer 5) This layer establishes, manages and terminates connections


between applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at each end. It
deals with session and connection coordination.

Presentation (Layer 6) This layer provides independence from differences in data


representation (e.g., encryption) by translating from application to network format,
and vice versa. The presentation layer works to transform data into the form that
the application layer can accept. This layer formats and encrypts data to be sent
across a network, providing freedom from compatibility problems. It is sometimes
called the syntax & semantics.

Application (Layer 7) OSI Model, Layer 7, supports application and end-user


processes. Everything at this layer is application-specific. This layer provides

Page No: 6 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

application services for file.

Q3 Attempt any THREE of the following : 12 M


a What advantages does TDM have over FDM in a circuit switched network? 4M
Ans In TDM, each signal uses all of the bandwidth some of the time, while for FDM, consider
each signal uses a small portion of the bandwidth all of the time. 4 points
for 4 M
TDM uses the entire frequency range but dynamically allocates time, certain jobs
might require less or more time, which TDM can offer but FDM is unable to as it
cannot change the width of the allocated frequency.

TDM provides much better flexibility compared to FDM.

TDM offers efficient utilization of bandwidth

Low interference of signal and minimizes cross talk

b Compare Analog and Digital signal 4M


Ans Analog signal Digital signal 1 M for
An analog signal is a continuous A digital signal is a discrete wave that each
wave that changes over a time carries information in binary form. differenc
period. e
Consider
An analog signal is represented by a A digital signal is represented by square any 4
sine wave. waves. valid
Analog signal has no fixed range. Digital signal has a finite numbers i.e. 0 points
and 1.
An analog signal is described by the A digital signal is described by bit rate
amplitude, period or frequency, and and bit intervals.
phase.
An analog signal is more prone to A digital signal is less prone to distortion.
distortion.
An analog signal transmits data in A digital signal carries data in the binary
the form of a wave. form i.e. 0 and 1.

c With suitable diagram describe


Ans (i) STAR Topology (ii) RING Topology 2M star
topology-
Star topology is a network topology where each individual piece of a network is 1M for

Page No: 7 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

attached to a central node (often called a hub or switch). The attachment of these diagram
network pieces to the central component is visually represented in a form similar to and 1
a star. mark for
descriptio
The hub and hosts, and the transmission lines between them, form a graph with n ,2M
the topology of a star. Data on a star network passes through the hub before ring
topology-
continuing to its destination. The hub manages and controls all functions of the
1 M for
network. It also acts as a repeater for the data flow. diagram
and 1
Mark for
descriptio
n

Fig a: Star topology

The star network is one of the most common computer network topologies.

(ii)RING Topology

A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node - a
ring.

Data travels from node to node, with each node along the way handling every
packet.

Page No: 8 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Fig b: Ring Topology

Ring topology refers to a specific kind of network setup in which devices are
connected in a ring and pass information to or from each other according to their
adjacent proximity in the ring structure. This type of topology is highly efficient
and handles heavier loads better than bus topology.

d Describe the major functions of network layer in TCP/IP protocol suite


Ans Internetworking: This is the main duty of network layer. It provides the logical 1 M for
connection between different types of networks. each
function
Addressing: Addressing is necessary to identify each device on the internet
uniquely. This is similar to telephone system. The address used in the network
layer should uniquely and universally define the connection of a computer.
Routing: In a network, there are multiple roots available from a source to a
destination and one of them is to be chosen. The network layer decides the root to
be taken. This is called as routing.
Packetizing: The network layer encapsulates the packets received from upper layer
protocol and makes new packets. This is called as packetizing. It is done by a
network layer protocol called IP (Internetworking Protocol).

Q4 Attempt any Five of the following: 12 M


a Draw and describe architecture for network using tree topology for an office 4M
in 3-storeys building.
Ans A tree topology is a special type of structure in which many connected elements are Explain
arranged like the branches of a tree 1M
,Diagram
Here in the diagram the main switch is connected with three separate switches.
3M
For each floor separate switch is connected with multiple terminals.

Page No: 9 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

b Describe the functions of physical and data link layer of OSI model 4M
ans Functions of Physical Layer 2M for
Physical
 Physical layer is the actual carrier of information between computers layer
 Communication between computers happens due to physical layer Function
and 2 M
 Data is actually carried between every adjacent node for Data
(computers/routers) by transmission of electromagnetic/optical signals at link
the physical layer over wired/wireless media layer)(4

Page No: 10 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Physical layer therefore encompasses the set of all protocols/standards used functions
in different types of Wired/Wireless interfaces and the telecommunication each)
links connecting them
 It also includes the mechanical, electrical and timing specifications for
different network interfaces
Functions of Data Link Layer
 Data link layer receives the data from the network layer & divide it into
manageable units called frames.
 It then provides the addressing information by adding header to each
frame.
 Physical addresses of source & destination machines are added to each
frame.
 It provides flow control mechanism to ensure that sender is not sending the
data at the speed that the receiver cannot process.
 It also provide error control mechanism to detect & retransmit damaged,
duplicate, or lost frame, thus adding reliability to physical layer.
 Another function of data link layer is access control. When two or more
devices are attached to the same link, data link layer protocols determine
which device has control over the link at any given time.

c Differentiate between FDM and TDM 4M


ans Frequency Division Multiplexing Time division Multiplexing 1M for
each
FDM divides the channel into two TDM divides and allocates certain differenc
or more frequency ranges that do time periods to each channel in an e
not overlap alternating manner
Frequency is shared Times scale is shared
Used with Analog signals Used with both Digital signals and
analog signals
Interference is high Interference is Low or negligible
Utilization is Ineffective Efficiently used

d Describe types of IP address classes. 4M


ans Class A: Explain 4
Class A range for first byte is 0-127. Class A type of IP addresses have First byte M

Page No: 11 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

consisting of Network address with first bit as 0 and the next 3 bytes with host id.
Hence, number of hosts are more when compared to number of networks. The
default subnet masks for class A networks is 255.0.0.0. Class A networks have
their network addresses from 1.0.0.0 to 126.0.0.0, with the zero's being replaced by
node addresses.

Class B: Class B range for first byte is 128-191. This type has first two bytes
specifying network ID with starting two bits as 10 and last two bytes referring to
host ID. The default subnet masks for class B is 255.255.0.0. Network addresses
for these ranges from 128.0.0.0 to 191.0.0.0.

Class C: Class C range for first byte is 192-223. This class has first three bytes
referring to network with starting bits as 110 and last byte signifies Host ID. Here,
number of networks is more when compared to number of hosts in each network.
The default subnet masks for class C is 255.255.255.0 The network IP addresses
for these range from 192.0.0.0 to 223.0.0.0.
Class D: Class D range for first byte is 224-239 Class D is used for multicasting
and its starting bits are 1110

Class E: Class E range for first byte is 240-255 .Class E is reserved for future use
and its starting bits are 1111

Fig : IP address classes

e Design suitable network layout for an organization with five department 4M

Page No: 12 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

ans ten users


each)
(Correct
dia 4M)
Consider
any
suitable
diagram

Q5 Attempt any TWO of the following: 12 M


a Describe the process of data communication in various modes 6M
ans Transmission mode refers to the mechanism of transferring of data between two mode
devices connected over a network. It is also called Communication Mode. These explanati
modes direct the direction of flow of information. There are three types of on 1 M
each &
transmission modes.
diagram
They are: 1 M each

 Simplex Mode
 Half duplex Mode
 Full duplex Mode
a. In Simplex mode, the communication is unidirectional, as on a one-way street.
Only one of the two devices on a link can transmit; the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one
direction.
-Keyboards, traditional monitors and printers are examples of simplex
devices.

Page No: 13 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

a. In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of
the channel can be utilized for each direction
-for example :Walkie-talkies.

b. In full-duplex mode both stations can transmit and receive data


simultaneously. The transmission medium sharing can occur in two ways,
namely, either the link must contain two physically separate transmission
paths or the capacity of the channel is divided between signals traveling in
both directions.
-One common example of full-duplex communication is the telephone
network. When two people are communicating by a telephone line, both can
talk and listen at the same time.

b Why is circuit switching preferred over packet switching in voice 6M


communication?
ans Switching is a mechanism by which data/information sent from source towards Any six
destination which are not directly connected. Networks have interconnecting points 1
devices, which receives data from directly connected sources, stores data, analyse it M each
and then forwards to the next interconnecting device closest to the destination.
Switching can be categorized as:
 Circuit switching
 Packet switching

Page No: 14 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Message switching
Circuit switching is preferred over packet switching in voice communication
because:
 In circuit switching, a dedicated path is established between sender and
receiver which is maintained for entire duration of conversation.
 It provides continuous and guaranteed delivery of data.
 During the data transfer phase, no addressing is needed.
 Delays are small.
 It uses connection oriented service.
 Message received in order to the destination

c Your company has the network id 165.130.0.0. You are responsible for 6M
creating subnets on the network, and each subnet must provide at least 1000
host ids. What subnet mask meets the requirement for the minimum number
of host ids and provides the highest number of subnets?
ans The given network id 165.130.0.0 is class B (Range of class B is 128.0.0.0 to Explanati
191.255.255.255) with subnet mask of 255.255.252.0 creates 62 subnets with 1022 on 6 M
host each.

In binary format subnet mask reads:

11111111.11111111.11111100.00000000.

To calculate the number of host ids available for each subnet is based on the
number of digits remaining in the network address.

The number of possible host ids in each subnet ranges from 00000001 through
11111110.

So, in the network 165.130.0.0/22, host addresses can range from 165.130.0.1
through 165.130.254

Q6 Attempt any TWO of the following:


a A system uses CRC on a block of 8 bytes. How many redundant bits are sent 6M
per block? What is the ratio of useful bits to total bits?
ans CRC is one of the most common and powerful error detecting code which can be Descripti
describe as follows. The polynomial code also known as CRC with co-efficient of on 6 M
0s and 1s. In this method the sender and receiver must agree upon generator *The
polynomial g(x) in advance. Both the high and low order bits of the generator student
(divisor) must be 1. To compute the checksum for some frame (data) with m bits, may
the frame must be longer than generator polynomial. The idea is to append assume a
checksum to the end of frame in such a way that the polynomial represented by the polynomi
checksum frame is divisible by g(x). When the receiver gets the checksum frame it al or a

Page No: 15 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

tries dividing it by g(x). If there is remainder there has been a transmission error divisor
and zero remainder means no error in the transmission. r is degree of g(x) and do
polynomial. the
Step by step procedure: problem.
1. Append a string of r zero bits to the lower order end of data word(m) where r is Full
less than the number of bits pre-decided divisor by 1 bit i.e. if divisor = 5 bits then r
marks
= 4 zeros. Now data word contains m+r bits has to be
2. Divide the newly generated data unit in step 1 by the divisor. It is module – 2 given
division even if
3. The remainder obtained after division is the r bit CRC. they
4. This CRC will replace the r zeros appended to the data unit to get the code word explain
to be transmitted. the
method
NOTE: The polynomial code for calculation of redundant bits is not given .hence or do the
the data given is insufficient for calculating redundant bits and the ratio of useful problem
bits to total bits. with
assumpti
ons’.
b Describe the process of DHCP server configuration. 6M
ans DHCP (Dynamic Host Configuration Protocol) is a client-server protocol that uses Diagram
DHCP servers and DHCP clients. A DHCP server is a machine that runs a service 2M,
Explanati
that can lease out IP addresses and other TCP/IP information to any client that
on 4 M
requests them. The DHCP server typically has a pool of IP addresses that it is
allowed to distribute to clients, and these clients lease an IP address from the pool
for a specific period of time, usually several days. Once the lease is ready to expire,
the client contacts the server to arrange for renewal. DHCP clients are client
machines that run special DHCP client software enabling them to communicate
with DHCP server.

DHCP clients obtain a DHCP lease for an IP address, a subnet mask, and various
DHCP options from DHCP servers in a four-step process:

DHCP DISCOVER: The client broadcasts a request for a DHCP server.

DHCPOFFER: DHCP servers on the network offer an address to the client.

DHCPREQUEST: The client broadcasts a request to lease an address from one of

Page No: 16 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

the offering DHCP servers.

DHCPACK: The DHCP server that the client responds to acknowledges the client,
assigns it any configured DHCP options, and updates its DHCP database. The
client then initializes and binds its TCP/IP protocol stack and can begin network
communication.
c What is the MAC protocol used in TOKEN ring LAN’s? What happens if the 6M
token is lost?
ans Token ring local area network (LAN) network is a communication protocol for Descripti
local area networks.it uses special three-byte frame called a “token” that travels
on of
MAC
around a logical ring of workstations or servers. This token passing is a channel
protocol
access method providing fair access for all stations, and eliminating the collision
4 M,
of contention-based access methods. Explanati
on of
Introduced by IBM in 1984, it was then standardized with protocol IEEE 802.5
token lost
and was fairly successful, particularly in the corporate environments, but 2 M
gradually eclipsed by the later versions of Ethernet.

The IEEE 802.5 Token ring technology provides for data transfer rates of either 4
or 16 Mbps.

It works in the following manner:

1. Empty information frames are continuously circulated on the ring.

2. When a computer has a message to send, it inserts a token in an empty frame


(simply changing a 0 to a 1 in the token bit part of the frame) and a message
and a destination identifier in the frame.

3. The frame is the examined by each successive workstation. If workstation


sees that it is the destination of the message, it copies the message from the
frame and changes the token back to 0.

4. When the frame gets back to originator, it sees that message has been copied
and received.

The Fibre Distributed Data Interface (FDDI) also uses a Token ring protocol.

If one device does not receive a token within a specified period, it can issue an
alarm. The alarm alerts the network administrator to the problem and its location.
Then, network administrator generates a new , free token

OR

Page No: 17 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

· There are two error conditions that could cause the token ring to break down.

 One is the lost token in which case there is no token in the ring.
 Other is the busy token that circulates endlessly.

To overcome these problems, the IEEE 802 standard specifies that one of the
stations must be designated as “active monitor”. The monitor detects the lost
condition using a timer by time-out mechanism and recovers by using a new
free token

Page No: 18 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
1

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess
the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any
equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi and Bilingual
(English + Marathi) medium is introduced at first year of AICTE diploma Programme from academic
year 2021-2022. Hence if the students in first year (first and second semesters) write answers in
Marathi or bilingual language (English +Marathi), the Examiner shall consider the same and assess the
answer based on matching of concepts with model answer.

Q. Sub Answers Marki


No. Q. ng
N. Schem
e

1 (A) Attempt any FIVE of the following: 10-


Total
Marks

(a) Define Bit rate and Baud rate 2M

Ans: bit rate : It is defined as the number of bits transmitted per second. 1M
baud rate : It is defined as the number of signal units per second. each

Page 1/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
2

(b) Classify networks on the basis of transmission technologies. 2M

Ans: Classification of networks on the basis of transmission technologies 1M


1. Broadcast Network Each
2. Point-to-Point Network
(c) State the function of transport layer in TCP/IP protocol suite 2M

Ans: Function of transport layer in TCP/ IP protocol suite Any


two
1. Process to process delivery
2. End-to-end Connection between hosts valid
3. Multiplexing and Demultiplexing functi
4. Congestion Control on 1M
5. Data integrity and Error correction
each
6. Flow control

(d) Name the layer of the OSI model that is responsible for moving of data in and out of 2M
physical link in network. State its functions.

Ans: Physical layer is responsible for moving of data in and out of physical link in network. Name
of
Function of Physical layer
layer
1. It defines the physical characteristics and functions of the physical devices and interfaces 1M
so that transmission can occur.
2. It defines the procedure of encoding of the bits. Any
3. It states the data transmission rate and the duration of a bit.
one
4. It defines the topology.
5. It also states the direction of transmission valid
functi
on 1M

e) State the application of infrared waves 2M

Page 2/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
3

Ans: Application of infrared waves Any 2


1. Remote Control applic
2. Optical Fibres
ation
3. Thermal Imaging Cameras
4. Infrared Cookers 1M
5. Electric Heaters
each
6. Infrared Lamps

f) State the application of firewall. 2M

Ans: Application of firewall Any


one
 A fire wall is a network security device,either hardware or software-based,which
monitors all incoming and out going traffic and based on a defined set of security rules it Valid
accepts ,rejects or drops that specific traffic.
applic
 A fire wall establishes a barrier between secured internal networks and outside untrusted
network, such as the Internet ation
 A fire wall is a part of computer system or network that is designed to block point
unauthorized access while permitting authorized communication 2M
 A firewall is placed at the entry/exit point of the network
each

g) State the need for IPv6. 2M

Ans: Need for IPv6 2M

The Internet has experienced a phenomenal increase of devices accessing the Internet.
Because of this increase, IPv4 addresses are running out.Traditional model of classful
addressing does not allow the address space to be used to its maximum potential.The solution
is IPv6 which can accommodate the increased demand by providing a much larger
address space IPv6 has 128-bit address space or 4 times more address bits compared to
IPv4's 32-bit address space. This large address space will provide enough address
space for many decades to come.

Page 3/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
4

Q. Sub Answers Marking


No. Q. Scheme
N.

2 Attempt any THREE of the following: 12-


Total
Marks

a) Name the components of data communication system . State the function of each 4M
component.

Ans: Following are the building blocks (components) of Data Communication System: 2M
1. Message:The message is the information (data) to be communicated. Popular forms
Explana
of information include text, numbers, pictures, audio, and video.
tion
2. Sender:The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
3. Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, etc
4. Transmission medium: the transmission medium is the physical path by which a
message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fibre-optic cable, and radio waves.

5. Protocol: A protocol is a set of rules that governs data communication.

b) Explain the terms Synchronous, and Asynchronous transmission of data with a neat 4M
diagram

Ans: Synchronous Data Transmission: 2M


each for
Synchro
nous &
Asynch
ronous

Page 4/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
5

Fig. : Synchronous Data Transmission Data


Transm
 Synchronous data transmission is a data transfer method in which is a continuous
stream of data signals accompanied by timing signals. ission

 Synchronous transmission needs synchronization between transmitter and receiver in with


order to allow communication between the two. The transmitter and receiver share Diagra
a common clock pulse so as to have synchronization in communication. This means
data will be transmitted between the transmitter and receiver only after a constant time m
interval.
 It allows the transmission of data in the form of frames or blocks. Thus, a huge data
amount can be transmitted between transmitter and receiver once the clock pulse is sent

Asynchronous Data Transmission:

Fig.:Asynchronous Data Transmission

 Asynchronous transmission is a type of serial transmission that follows a non-


synchronized form of communication. Thus start and stop bits are required in order
to intimate the receiver about the beginning and end of the data stream.
 It does not use a clock to synchronize data between the source and destination.
 This transmission method sends one character time. In this method, before the
transmission process begins, each character sends the start bit. After sending the
character, it also sends the stop bit Thus it is also known as start stop transmission

c) State the functions performed by the Network layer and application layer in a TCP/I 4M
protocol.

Ans: Functions of Network Layer: 2M


(i) Subnet Traffic Control: Network layer routers (network layer intermediate systems) can each for
instruct a sending station to "throttle back" its frame transmission when the router's buffer fills Functio

Page 5/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
6

up. ns of
(ii) Logical-physical Address Mapping: It translates logical addresses, or names, into Networ
physical addresses. k Layer
(iii) Subnet Usage Accounting: It has accounting functions to keep track of frames forwarded &
by subnet intermediate systems.
Applica
(iv) Internetworking: One of the main responsibilities of network layer is to provide
tion
internetworking between different networks. It provides logical connection between different
Layer
types of network. It is because of this layer, we can combine various different networks to
form a bigger network.
(v) Logical Addressing: Large number of different networks can be combined together to
from bigger networks or internetwork. In order to identify each device on internetwork
uniquely, network layer defines an addressing scheme. Such an address distinguishes each
device uniquely and universally.
(vi) Routing: When independent networks or links are combined together to create internet
works, multiple routes are possible from source machine to destination machine. The network
layer protocols determine which route or path is best from source to destination. This function
of network layer is known as routing. Routes frames among networks.
(vii) Packetizing: The network layer receives the data from the upper layers and creates its
own packets by encapsulating these packets. The process is known as packetizing. This
packetizing in done by Internet Protocol (IP) that defines its own packet format.
(viii) Fragmentation: Fragmentation means dividing the larger packets into small fragments.
The maximum size for a transportable packet in defined by physical layer protocol. For this,
network layer divides the large packets into fragments so that they can be easily sent on the
physical medium. If it determines that a downstream router's maximum transmission unit
(MTU) size is less than the frame size, a router can fragment a frame for transmission and
reassembly at the destination station.

Functions Application Layer:


(i) Network Virtual Terminal: It allows a user to log on to a remote host.
(ii) File Transfer, Access and Management (FTAM): This application allows a user to
access files in remote computer (to make changes or read data), to retrieve files from a remote
computer, and to manage or control files in a remote computer.

Page 6/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
7

(iii) Mail Service: This application provides the basis for e-mail forwarding and storage.
(iv) Remote Logins: This layer allows logging into a host which is remote.
(v) Network Abstraction: Provides an abstraction of the underlying network to an end user
and an application.
(vi) Directory Services: This application provides distributed database sources and access for
global information about various objects and services.

d) Explain checksum error detection mechanism with a suitable example. 4M

Ans: Checksum: 2M
Explan
1.Checksum is an error-detecting technique in data communication that can be applied to a
message of any length. In the Internet, this technique is mostly used at the network and ation
transport layer rather than the data link layer. and
2.In checksum error detection scheme, the data is divided into k segments each of m bits. In the 2M
sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum Examp
is complemented to get the checksum.
3.The checksum segment is sent along with the data segments. At the receiver’s end, all le
received segments are added using 1’s complement arithmetic to get the sum. The sum is
complemented. If the result is zero, the received data is accepted; otherwise discarded.

Page 7/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
8

Q. Sub Answers Marking


No. Q. N. Scheme

a) Name the layer of the OSI model that perform the following functions 4M
i) Bitrate control
ii) Framing
iii) Logical Addressing
iv) Encryption / Decryption

Ans: i) Bitrate control : Physical layer 1M For


ii) Framing : data link layer each
iii) Logical Addressing : network layer correct
iv) Encryption / Decryption : presentation layer answer

b) Calculate the CRC for the frame of data to be transmitted in 100100 and the generator 4M
3 2
polynomial is x + x + 1. Generate the Codeword for the transmitted frame.

Correc
t
divisor
1M &
Correc
t
calcula
tion of
CRC
code
word is
3M

Page 8/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
9

c) On which layer of the O.S.I. model do the following devices work. 4M

i) Bridge
ii) Routes
iii) Gateway
iv) Hub

Ans: i) Bridge: A bridge operates at the data link layer. 1M


ii) Routes : The router is mainly a Network Layer device. For
iii) Gateway : it can operate at any network layer each
iv) Hub : A hub operates at the physical layer

d) Compare classless and classful addressing. State the disadvantages of classful addressing. 4M

Ans: Difference between Classful Addressing and Classless Addressing Any 3


valid
Sr. differe
No. Parameter Classful Addressing Classless Addressing
nces
3M
Classless addressing
came to replace the
classful addressing and 1M for
In Classful addressing IP to handle the issue of any
addresses are allocated rapid exhaustion of IP
1. Basics according to the classes- A to E. addresses. one
valid
2. Practical It is less practical. It is more practical. disadv
antage
The changes in the Network ID There is no such
Network ID and Host and Host ID depend on the restriction of class in
3. ID class. classless addressing.

Page 9/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
10

It supports the Variable


It does not support the Variable Length Subnet Mask
4. VLSM Length Subnet Mask (VLSM). (VLSM).

Classful addressing requires It requires less


more bandwidth. As a result, it bandwidth. Thus, fast and
becomes slower and more less expensive as
expensive as compared to compared to classful
5. Bandwidth classless addressing. addressing.

It supports Classless
It does not support Classless Inter-Domain Routing
6. CIDR Inter-Domain Routing (CIDR). (CIDR).

7. Updates Regular or periodic updates Triggered Updates

Troubleshooting and problem


detection are easy than classless
addressing because of the
Troubleshooting and division of network, host and It is not as easy compared
8. Problem detection subnet parts in the address. to classful addressing.

 Network
 Host  Host
9. Division of Address  Subnet  Subnet

Disadvantage of Classful Addressing:


1. Class A with a mask of 255.0.0.0 can support 128 Network, 16,777,216 addresses per
network and a total of 2,147,483,648 addresses.
2. Class B with a mask of 255.255.0.0 can support 16,384 Network, 65,536 addresses per
network and a total of 1,073,741,824 addresses.
3. Class C with a mask of 255.255.255.0 can support 2,097,152 Network, 256 addresses per
network and a total of 536,870,912 addresses.

Page 10/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
11

Q. Sub Answers Marking


No. Q. N. Scheme

4 Attempt any THREE of the following: 12-


Total
Marks

(a) Explain the principle of working of TDM with suitable diagram 4M

Time Division Multiplexing (TDM): 2M


1.In Time-division multiplexing all signals operate with same frequency at different times. Diagra
2.TDM is the digital multiplexing technique. In TDM, the channel/link is not divided on the m and
basis of frequency but on the basis of time. Total time available in the channel is divided 2M
between several users.
Explan
3.Each user is allotted a particular a time interval called time slot or time slice during which the
ation
data is transmitted by that user. Thus each sending device takes control of entire bandwidth of
the channel for fixed amount of time. In TDM the data rate capacity of the transmission
medium should be greater than the data rate required by sending or receiving devices.
4. In TDM all the signals to be transmitted are not transmitted simultaneously. Instead, they are
transmitted one-by-one. Thus, each signal will be transmitted for a very short time. One cycle or
frame is said to be complete when all the signals are transmitted once on the transmission
channel.
5.The TDM system can be used to multiplex analog or digital signals, however it is more
suitable for the digital signal multiplexing. The TDM signal in the form of frames is transmitted
on the common communication medium.

Fig.: Time Division Multiplexing (TDM)

Page 11/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
12

(b) Explain stop and wait protocol used in flow control. 4M

Ans: 1. One bit sliding window uses Stop and Wait protocol for delivery of data frames. 2M
2.The sender and receiver’s windows size is 1 and the frames are alternately numbered Diagra
3.One bit sliding window uses Stop and Wait protocol
m&
.4.Sender transmit a frame with sequence number and waits for acknowledgment from the
receiver. 2M
5.Receiver send back an acknowledgement with sequence number. Explan
6.If sequence number of acknowledgement matches with sequence number of frame.
ation
7.Sender transmit the next frame.
8.Else sender re-transmit the previous frame.
9.Its bidirectional protocol.(full duplex communication)

Normal Operation:In normal operation thesender sends a frame and waits for
acknowledgement from receiver .The acknowledgement should be received before the timer for
the frame expires.The sequence number of acknowledgement should match the sequence
number of next frame to be transmitted.If it matches the next frame is transmitted otherwise
previous frame is transmitted
Lost or Damaged frame :.When the receiver receives a damaged frame it discards it which
means the frame is lost .The receiver remains silent about the lost frame .After the timer
expires for that frame the sender retransmits the same frame .
Lost or Delayed acknowledgement:In case of lost or delayed acknowledgement after the timer
for the frame expires the sender retransmits the frame .The receiver takes care of
discarding duplicate copy

Page 12/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
13

(c) With neat diagram explain the concept of datagram approach of switching. 4M

Ans: Datagram Packet Switching: 2M


Diagra
In a datagram network, each packet is treated independently of all others.
Datagram switching is normally done at the network layer. m
Figure shows how the datagram approach is used to deliver four packets from station A to station &2M
X.
The switches in a datagram network are traditionally referred to as routers. Explan
 In this example, all four packets (or datagrams) belong to the same message, may travel ation
different paths to reach their destination. This is so because the links may be involved in
carrying packets from other sources and do not have the necessary bandwidth available to
carry all the packets from A to X.
 This approach can cause the datagrams of a transmission to arrive at their
destination out of order with different delays between the packets.
 In most protocols, it is the responsibility of an upper-layer protocol to reorder the datagrams
or ask for lost datagrams before passing them on to the application.
 The datagram networks are sometimes referred to as connectionless networks. The term
connectionless here means that the switch (packet switch) does not keep information about
the connection state. There are no setup or teardown phases.
 Datagrams can contain the full destination address rather than using some number
 There is no set up phase required for the datagram circuits. This means that no resources
are consumed.
 If any fault or loss occurs on a communication line, the datagrams circuits are capable of
compensating for it.

Fig.: Datagram Packet Switching

Page 13/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
14

(d) Explain the concept of FTP with neat diagram. 4M

Ans: FTP (File Transfer Protocol) :FTP is a standard mechanism provided by the Internet for 2M
copying a file from one host to the other It uses the services of TCP Concep
User Interface :Most operating systems provide user interface to to access the services t & 2M
of FTP. The interface prompts user for appropriate input Archite
Control Connection :The well known port 21 is used for control connection . It is
cture
opened once and maintained during entire FTP session
Data Connection :The well known port 20 is used for data connection .The connection can be and
opened and closed multiple times. Diagra
The data connection in FTP means one of the following
m of
1) A file can be copied from server to client under the supervision of RETR command
2) A file is transferred from client to server under the supervision of STOR command FTP
3) A list of directory or filename is sent to the client under the supervision of LIST command
For communication over data connection client must define the type of file , structure of data
and transmission mode
Architecture of FTP:

(e) Compare coaxial cable and twisted pair cable on the basis of- 4M
i) Bandwidth
ii) Electromagnetic interference
iii) Construction
iv) applications

Page 14/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
15

Ans: Parametes coaxial cable Twisted pair cable 1M


each
Bandwidth Bandwidth is high which is Bandwidth is low which is 3
300 to 400 MHz. to 4 MHz. for
correct
Electromagnetic Less affected by EMI and Affected by EMI and noise.
compa
interference noise.
rison

Construction point

applications 1. The use of coaxial cable 1. TP cables are used in


started in analog telephone telephone lines to provide
networks where a single voice and data channels.
coaxial network could carry 2. The line that connects
10,000 voice signals. subscribers to the central
2. Later it was used in digital telephone office is most
telephone networks where a commonly UTP cable.
single coaxial cable could 3. The DSL lines that are
carry digital data up to 600 used by the telephone
Mbps. companies to provide high
3. Most common use is in data rate connections
cable TV. also use high bandwidth
4. Coaxial cabling is often capability UTP cable.
used in heavy industrial 4. Local Area Network
environments where motors
(LAN) also uses twisted-pair
and generators
produce a lot of cable.
electromagnetic interference
(EMI), and where more
expensive fiber-optic
cabling is unnecessary
because of the slow data
rates needed.

Page 15/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
16

Q. Sub Answers Marking


No. Q. N. Scheme

5. Attempt any TWO of the following: 12-


Total
Marks

a) Draw a diagram and describe the following topologies stating their applications. 6M
i) Hybrid
ii) Bus

Ans: Figure Illustrate the diagram for following topologies 3M

Hybrid Topology
 A hybrid topology is a kind of network topology that is a combination of two or more
network topologies, such as Mesh topology, Bus topology, and Ring topology.
 Its usage and choice are dependent on its deployments and requirements like the
performance of the desired network, and the number of computers, their locations
 This topology presents a blend of characteristics of all basic types. In this type,
whole Computer Network is divided into Network Segments. Each Network
Segments connects with Network Backbone

Diagra
m 1m

explain
ation

Page 16/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
17

Application of Hybrid Topology 1M


 Automated Industry
1M for
 Banks
 Multi National Offices any 2
 Educational Institute applica
 Research Organization tion of
each
Bus Topology
topolog
 Computers and peripherals are called nodes and are each connected to a single cable on
which data can be sent. y
 A bus network topology has a terminator on each end. These are needed to ensure that
the network functions correctly.

Bus Topology Application

 A bus topology is used to connect two floors using a single line.


 A bus topology is used by an Ethernet network
 In this type of network topology, one computer works like a server whereas the other
works as a client.
 The main function of the server is to exchange information between different client
computers.
 Bus topology network is used to add the printers, I/O devices in the offices or home.

b) Draw the seven layered architecture of the OSI model and explain. 6M

Page 17/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
18

Ans:

2M for
diagra
m

The working of the 7 Layers of the OSI Model are as following

Physical Layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It Provides physical interface for transmission of information. . It Defines rules by
which bits are passed from one system to another on a physical communication medium.
It Covers all -mechanical, electrical, functional and procedural -aspects for physical 4m for

Page 18/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
19

communication. Explai
n-ation
Data Link Layer: The data link layer is responsible for moving frames from one hop (node) to
the next. It Breaks the outgoing data into frames and re-assemble the received frames. It Handle
errors by implementing an acknowledgement and retransmission scheme.
Network Layer: The network layer is responsible for receiving frames from the data link layer,
and delivering them to their intended destinations among based on the addresses contained
inside the frame. The network layer finds the destination by using logical addresses, such as IP
(internet protocol). At this layer, routers are a important component used to route information
where it needs to go between networks.
Transport Layer: The transport layer manages the delivery and error checking of data packets.
It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts.
One of the most common examples of the transport layer is TCP or the Transmission Control
Protocol.
Session Layer: The session layer controls the conversations between different computers. A
session or connection between devices is set up, managed, and terminated at layer 5. Session
layer services also include authentication and reconnections.
Presentation Layer: The presentation layer formats or translates data for the application layer
based on the syntax or semantics that the application accepts. Because of this, it at times also
called the syntax layer. This layer can also handle the encryption and decryption required by the
application layer.
Application Layer: The application layer is used by end-user software such as web browsers
and email clients. It provides protocols that allow software to send and receive information and
present meaningful data to users. A few examples of application layer protocols are
the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol
(POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS).
c) Draw the labeled construction of Fibre optic cable. State four advantages compared to 6M
copper cables.

Ans: Figure shows the labeled diagram for Fiber Optic Cable 2M for
Diagra
m

Page 19/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
20

1M
each
for any
4
applica
tions
)

Advantages of fibre optic cable over copper cables

 These are not affected by electromagnetic interference, so noise and distortion is very
less.
 Optical fiber cable are often made cheaper than equivalent lengths of copper wire.
 Used for both analog and digital signals
 Highly secured
 Provides high quality transmission of signals at very high speed (bandwidth 2 Gbps
 Smaller size and light weight
 Less power loss and allows data transmission for extended distances
 Bandwidth is high

Q. Sub Answers Marking


No. Q. N. Scheme

6. Attempt any TWO of the following : 12-


Total
Marks

a) Draw and describe architecture for a network using star topology to establish a 6M

Page 20/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
21

laboratory with 10 computers

Ans: The architecture for a network using star topology is as shown in the figure

3M for
Diagra
m

3 M for
descrip
tion

 A star topology is a topology where every node in the network is connected to one
central switch. Every device in the network is directly connected to the switch and
indirectly connected to every other node.
 The relationship between these elements is that the central network hub is a server and
other devices are treated as clients.
 The central node has the responsibility of managing data transmissions across the whole
network and acts as a repeater.
 With star topologies, computers are connected with a coaxial cable, twisted pair, or

Page 21/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
22

optical fiber cable.


 In terms of physical network structure, star topologies require fewer cables than other
topology types. This makes them simple to set up and manage over the long-term.
 The simplicity of the overall network design makes it much easier for administrators to
run troubleshooting when dealing with network performance faults.
b) With suitable diagram explain selective repeat ARQ protocol 6M

Ans: Selective Repeat ARQ

In this method the size of sender and receiver window is same
In selective repeat ARQ only damaged frames are resent
This method uses negative acknowledgement to report sequence number of damaged frame 3M for
before timer expires Diagra
Selective repeat uses both positive and negative acknowledgement m

Normal Operation : Frames 0 and 1 are accepted when received because they are in the
receiver window range.The sender’s window shifts toward right and transmits frames 2 and 3
.The receiver accepts frame 3 as it is in receiver’s window . The receiver sends NAK2 to show
that frame 2 is lost .The sender then sends only frame 2
Lost and delayed acknowledgement and NAK (Negative Acknowledgement)
If the window capacity is reached and acknowledgements are not received because of delay or
loss within the time period the sender retransmits every frame in the window Similarly if NAK
are lost or delayed the sender retransmits all the frames after last acknowledged frame

Page 22/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
23

3M on
explain
ation

c) Draw the block diagram of Symmetric Key Cryptography and state the function of 6M
various components. Compare symmetric and Asymmetric Key Cryptography

Ans: Figure illustrating the block diagram of Symmetric Key Cryptography 2M for
Symmetric key encryption also termed as shared -key ,single-key, secret-key in this type both diagra
the sender and receiver share same key which is used to both encrypt and decrypt messages
mm
There are five main components of a symmetric cryptography system: plaintext, encryption
algorithm, secret key, ciphertext, and the decryption algorithm. 2M for
Explai
nation

2 M for
any 2
valid
points
of

Page 23/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
24

compa
rison

1. Plaintext
The term plaintext refers to the original message to be sent for encryption . Here the original
message, referred to as plaintext, is converted into apparently random nonsense, referred to as
cipher text. The security depends on several factor.
2. Encryption Algorithm
The encryption algorithm takes the plaintext and converts it into an unreadable format. The
encryption process s consists of an algorithm and a key. The key is a value independent of the
plaintext. Changing the key changes the output of the algorithm. Once the cipher text is
produced, it may be.
3. Key
Think of the key as a decoder ring: the secret of the scrambled text cannot be read without the
key. The key holds the information on all the switches and substitutions made to the original
plain text.
In symmetric encryption, the key is actually bundled with the algorithm; in this sense, the
decoder ring is not universal. The changes and substitutions depend on the key, and vice versa
because the sender and recipient share the key.
4. Ciphertext
The ciphertext is the text that is now scrambled and ready to be sent. It may look like a random
stream of data, and is unreadable.
5. Decryption Algorithm
In the decryption algorithm, the secret key is applied to the ciphertext. It converts it back to
plaintext, basically performing the encryption in reverse. .. Upon reception, the cipher text can

Page 24/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
25

be transformed back to the original plaintext by using a decryption algorithm and the same key
that was used for encryption.
Comparison of Symmetric and Asymmetric Key Cryptography is given as

Page 25/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
SUMMER – 2022 EXAMINATION
Subject Name:Data Communication & Computer Network Model Answer Subject Code: 22414
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in the model
XXXXX
answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to
assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance
(Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the
figure. The figures drawn by candidate and model answer may vary. The examiner may give
credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant
values may vary and there may be some difference in the candidate’s answers and model
answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant
answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi and
Bilingual (English + Marathi) medium is introduced at first year of AICTE diploma Programme
from academic year 2021-2022. Hence if the students in first year (first and second semesters)
write answers in Marathi or bilingual language (English +Marathi), the Examiner shall consider
the same and assess the answer based on matching of concepts with model answer.

Q. Sub Answer Marking


No. Q. Scheme
N.

1 Attempt any FIVE of the following: 10 M

a) Define computer Network. 2M

Ans A computer network is a system that connects various independent computers in order to Correct
share information (data) and resources. definition-2
M
OR

A computer network is a collection of two or more computer systems that are linked
together. A network connection can be established using either cable or wireless media.

OR

A computer network is defined as a system that connects two or more computing devices
for transmitting and sharing information.

b) List types of multiplexing. 2M

Page No: 1 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Ans Following are the types of multiplexing: Correct
1. Frequency-Division Multiplexing types-2 M
2. Wavelength-Division Multiplexing
3. Time-Division Multiplexing
a) Synchronous Time-Division Multiplexing
b) Asynchronous Time-Division Multiplexing
c) List different types of errors 2M

Ans Single-Bit Error: 2 types-2 M


The term single-bit error means that only 1 bit of a given data unit (such as a byte,
character, or packet) is changed from 1 to 0 or from 0 to 1.
Burst Error:
The term burst error means that 2 or more bits in the data unit have changed from 1 to 0 or
from 0 to 1.
d) List different types of network connecting devices. 2M

Ans 1. Hub Any 4


a. Passive Hubs devices-2 M
b. Active Hubs
2. Bridges
3. Two-Layer Switches
4. Routers
5. Three-Layer Switches
6. Gateway
7. Modem
8. Repeaters
e) Define: 2M

(i) Bit rate


(ii) Baud rate

Ans i. Bit rate: Correct


Bit rate is defined as the transmission of a number of bits per second. definition -1
Bit Rate cannot determine the bandwidth. M each
ii. Baud rate:
Baud rate is defined as the number of signal units per second.
Baud rate can determine the amount of bandwidth necessary to send the signal.
f) List classes of IP addresses. 2M

Ans Class A, Class B, Class C, class D and Class E Correct


types-2 M

Page No: 2 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

g) Define following terms: - 2M


(i) Protocol
(ii) Bandwidth

Ans i) Protocol: Correct


A protocol is a set of rules that govern data communications. It represents an definition- 1
agreement between the communicating devices. Without a protocol, two devices M each
may be connected but not communicating, just as a person speaking French cannot
be understood by a person who speaks only Japanese.

ii) Bandwidth:
The bandwidth of a composite signal is the difference between the highest and the
lowest frequencies contained in that signal.
For example, if a composite signal contains frequencies between 1000 and 5000, its
bandwidth is 5000 - 1000, or 4000.

2. Attempt any THREE of the following: 12 M

a) Describe modes of communication. 4M

Ans o The way in which data is transmitted from one device to another device is known List-1M
as transmission mode. All 3 modes
o The transmission mode is also known as the communication mode. Explanation
with figure-
3M
The Transmission mode is divided into three categories:
o Simplex mode
o Half-duplex mode
o Full-duplex mode

Simplex mode

Page No: 3 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
o In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction.
o A device can only send the data but cannot receive it or it can receive the data but
cannot send the data.
o This transmission mode is not very popular as mainly communications require the
two-way exchange of data. The simplex mode is used in the business field as in
sales that do not require any corresponding reply.
o The radio station is a simplex channel as it transmits the signal to the listeners but
never allows them to transmit back.
o Keyboard and Monitor are the examples of the simplex mode as a keyboard can
only accept the data from the user and monitor can only be used to display the data
on the screen.

Fig: Simplex mode

Half-Duplex mode

o In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and
receive the data as well.
o Messages flow in both the directions, but not at the same time.
o The entire bandwidth of the communication channel is utilized in one direction at a
time.
o In half-duplex mode, it is possible to perform the error detection, and if any error
occurs, then the receiver requests the sender to retransmit the data.
o A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party
speaks, and another party listens. After a pause, the other speaks and first party
listens. Speaking simultaneously will create the distorted sound which cannot be
understood.

Page No: 4 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Fig: Half-Duplex mode

Full-duplex mode
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in both
the directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving in one
direction, and another channel has traffic flowing in the opposite direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network. When
two people are communicating with each other by a telephone line, both can talk and
listen at the same time.

Fig: Full -Duplex mode


b) Explain 802.11 Architecture. 4M

Ans IEEE 802.11 BSS:


IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which explanation
covers the physical and data link layers with fig:2M

Architecture: ESS:
The standard defines two kinds of services: the basic service set (BSS) and the extended
explanation
service set (ESS).
with fig:2M

Basic Service Set


IEEE 802.11 defines the basic service set (BSS) as the building block of a wireless
LAN.
Page No: 5 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
A basic service set is made of stationary or mobile wireless stations and an optional
central base station, known as the access point (AP).
Figure shows two sets in this standard. The BSS without an AP is a stand-alone network
and cannot send data to other BSSs. It is called an ad hoc architecture.

In this architecture, stations can form a network without the need of an AP; they can
locate one another and agree to be part of a BSS. A BSS with an AP is sometimes
referred to as an infrastructure network.

Fig:basic service set (BSS)

Extended Service Set


An extended service set (ESS) is made up of two or more BSSs with APs. In this case,
the BSSs are connected through a distribution system, which is usually a wired LAN.
The distribution system connects the APs in the BSSs. IEEE 802.11 does not restrict the
distribution system; it can be any IEEE LAN such as an Ethernet. Note that the
extended service set uses two types of stations: mobile and stationary. The mobile
stations are normal stations inside a BSS. The stationary stations are AP stations that are
part of a wired LAN. Figure shows an ESS.

Fig: Extended service set (ESS)

When BSSs are connected, the stations within reach of one another can communicate
without the use of an AP. However, communication between two stations in two
different BSSs usually occurs via two APs. The idea is similar to communication in a
cellular network if we consider each BSS to be a cell and each AP to be a base station.
Note that a mobile station can belong to more than one BSS at the same time.
c) Explain Bluetooth Architecture. 4M

Ans Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15 Explanation
standard. of Piconet
Page No: 6 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
with
Architecture diagram-2M
Bluetooth defines two types of networks: piconet and scatternet.

Piconets: Explaination
of Scatternet
A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight
with
stations, one of which is called the primary;t the rest are called secondaries. All the
diagram-2M
secondary stations synchronize their clocks and hopping sequence with the primary. Note
that a piconet can have only one primary station. The communication between the primary
and the secondary can be one-to-one or one-to-many. Figure shows a piconet.

Fig: Piconet

Although a piconet can have a maximum of seven secondaries, an additional eight


secondaries can be in the parked state. A secondary in a parked state is synchronized
with the primary, but cannot take part in communication until it is moved from the
parked state. Because only eight stations can be active in a piconet, activating a station
from the parked state means that an active station must go to the parked state.

Scatternet:
Piconets can be combined to form what is called a scatternet. A secondary station in one
piconet can be the primary in another piconet. This station can receive messages from
the primary in the first piconet (as a secondary) and, acting as a primary, deliver them to
secondaries in the second piconet. A station can be a member of two piconets. Figure
illustrates a scatternet.

Page No: 7 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Fig: Scatternet
d) Draw a neat diagram of twisted pair cable and state its types. 4M

Ans A twisted pair consists of two conductors (normally copper), each with its own plastic Diagram with
insulation, twisted together, as shown in Figure. naming-2 m

All types -2M

Fig: Twisted pair cable

Types of Twisted–Pair Cables

There are two types of twisted pair cables −

 Unshielded Twisted Pair (UTP): These generally comprise of wires and insulators.

Unshielded twisted pair cables are classified into seven categories −

 Category 1 − UTP used in telephone lines with data rate < 0.1 Mbps
 Category 2 − UTP used in transmission lines with a data rate of 2 Mbps
 Category 3 − UTP used in LANs with a data rate of 10 Mbps
 Category 4 − UTP used in Token Ring networks with a data rate of 20 Mbps
 Category 5 − UTP used in LANs with a data rate of 100 Mbps
 Category 6 − UTP used in LANs with a data rate of 200 Mbps
 Category 7 − STP used in LANs with a data rate of 10 Mbps

 Shielded Twisted Pair ( STP ): STP cable has a metal foil or braided mesh covering
Page No: 8 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
that encases each pair of insulated conductors.

3. Attempt any THREE of the following: 12 M

a) Describe the components of data communication with neat diagram. 4M

Ans Components of data communication: - 2M for block


diagram
2M for
explanations

Figure: components of data communication.


1. Message - It is the information to be communicated. Popular forms of information
include text, pictures, audio, video etc. Text is converted to binary, number doesn’t
converted, image is converted to pixels, etc.

2. Sender - It is the device which sends the data messages. It can be a computer,
workstation, telephone handset etc.

3. Receiver - It is the device which receives the data messages. It can be a computer,
workstation, telephone handset etc.

4. Transmission Medium - It is the physical path by which a message travels from sender
to receiver. Some examples include twisted-pair wire, coaxial cable, radio waves etc.

5. Protocol - It is a set of rules that governs the data communications. It represents an


agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating.

b) Explain LRC with example. 4M

Ans Longitudinal redundancy check 2M for


explanation
 Longitudinal Redundancy Check (LRC) is the error detection method which is used and 2M for
by upper layers to detect error in data. example
 The other name for LRC is 2-D parity check. In this method, data which the users
want to send is organized into tables of rows and columns.
 To detect an error, a redundant bit is added to the whole block after addition this
block is transmitted to receiver side.
 This redundant bit is used by receiver to detect error. If there is no error, receiver
accepts the data and discards the redundant row of bits.

Page No: 9 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Example

If a block of 32 bits is to be transmitted, it is divided into matrix of four rows and eight
columns which as shown in the following figure:

Figure: LRC

In this matrix of bits, a parity bit (odd or even) is calculated for each column. It means 32
bits data plus 8 redundant bits are transmitted to receiver. Whenever data reaches at the
destination, receiver uses LRC to detect error in data.
Advantage:
LRC is used to detect burst errors.
c) Describe line of sight transmission. 4M

Ans Line of sight communication Explanation-


 Line of sight (LoS) is a type of communication that can transmit and receive data 3M
only where transmit and receive stations are in view of each other without any sort Diagram-1M
of an obstacle between them.
 Transmitting and receiving media should be in line of sight.
 In line of sight communication, very high frequency signals are transmitted in
straight lines directly from antenna to antenna.
 Antenna must be directional, facing each other, and either tall enough or close
enough together not to be effected by the curvature of earth.
 Above 30 MHz, neither ground wave nor sky wave propagation modes operate, and
communication must be by line of sight
 For satellite communication, a signal above 30 MHz is not reflected by the
ionosphere and therefore a signal can be transmitted between an earth station and a
satellite overhead that is not beyond the horizon. For ground-based communication,

Page No: 10 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
the transmitting and receiving antennas must be within an effective line of sight of
each other.

This is better understood with the help of the following diagram:

The figure depicts this mode of propagation very clearly. The line-of-sight propagation will
not be smooth if there occurs any obstacle in its transmission path. As the signal can travel
only to lesser distances in this mode, this transmission is used for infrared or microwave
transmissions.

d) Describe various mobile generations in detail. 4M

Ans 1G – First generation 1M for any


four correct
1G refers to the first generation of wireless mobile communication where analog signals generations
were used to transmit data. It was introduced in the US in early 1980s and designed along with
exclusively for voice communication. two features
Features:


Speeds up to 2.4 kbps
 Poor voice quality
 Large phones with limited battery life
 No data security
 Used analog signals
2G-Second generation

2G refers to the second generation of mobile telephony which used digital signals for the
first time. It was launched in Finland in 1991 and used GSM technology.
2G networks used digital technology.
It implemented the concept of CDMA and GSM. Provided small data services like sms and
mms.
2G capabilities are achieved by allowing multiple users on a single channel via
multiplexing.

Page No: 11 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Features:

 Data speeds up to 64 kbps


 Text and multimedia messaging possible
 Better quality than 1G
 2G requires strong digital signals to help mobile phones work. If there is no
network coverage in any specific area, digital signals would weak.
 These systems are unable to handle complex data such as Videos.
When GPRS technology was introduced, it enabled web browsing, e-mail services and fast
upload/download speeds. 2G with GPRS is also referred as 2.5G, a step short of next
mobile generation
3G- Third generations
Third generation (3G) of mobile telephony began with the start of the new millennium and
offered major advancement over previous generations.
3G has multimedia services support along with streaming. In 3G universal access and
portability across different devices types are made possible.
3G increased the efficiency of frequency spectrum by improving how audio is compressed
during a call. so more simultaneous calls can take place in same frequency range.
Like 2G, 3G evolved into 3.5G and 3.75G as more features were introduced in order to
bring about 4G.
Features:
 Data speeds of 144 kbps to 2 Mbps
 High speed web browsing
 Running web based applications like video conferencing, multimedia e-mails,
etc.
 Fast and easy transfer of audio and video files
 3D gaming
 TV Streaming/ Mobile TV/ Phone Calls MUM1 Large Capacities and
Broadband Capabilities
 Expensive fees for 3G Licenses Services

4G- Fourth generation


The main purpose of 4G is to provide high speed, high quality and high capacity to
users while improving security and lower the cost of voice and date services,
multimedia and internet over IP.

Fourth Generation (4G) mobile phones provides broadband cellular network


services and is successor to 3G mobile networks. It provides an all IP based cellular
communications. The capabilities provided adhere to IMT-Advanced specifications
as laid down by International Telecommunication Union (ITU).

Page No: 12 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Features
 It provides an all IP packet switched network for transmission of voice, data,
signals and multimedia.
 It aims to provide high quality uninterrupted services to any location at any
time.
 As laid down in IMT-Advanced specifications, 4G networks should have
peak data rates of 100Mbps for highly mobile stations like train, car etc., and
1Gbps for low mobility stations like residence etc.
 It also lays down that 4G networks should make it possible for 1 Gbps
downlink over less than 67 MHz bandwidth.
 They provide have smooth handoffs across heterogeneous network areas.

5G- Fifth generation

 5G is the 5th generation mobile network. It is a new global wireless standard after
1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to
connect virtually everyone and everything together including machines, objects, and
devices.
5G wireless technology is meant to deliver higher multi-Gbps peak data
speeds, ultra low latency, more reliability, massive network capacity, increased
availability, and a more uniform user experience to more users. Higher performance
and improved efficiency empower new user experiences and connects new
industries.
Features
 High Speed, High Capacity 5G technology providing large broadcasting of data in
Gbps.
 Multi - Media Newspapers, watch T. V pro clarity as to that of an HD Quality.
 Faster data transmission that of the previous generations.
 Large Phone Memory, Dialing Speed, clarity in Audio/Video.
 Support interactive multimedia, voice, streaming video, Internet and other
 5G is More Effective and More Attractive.

4. Attempt any THREE of the following: 12 M

a) Consider a network with 8 computers, which network architecture should be 4M


used peer to peer or Client Server? Justify the answer

Ans In the question it is given that we are supposed to consider eight computers. Both For valid
architecture can be considered depending upon the requirement. for eight explanation
computers I would like to prefer Peer to Peer network architecture. 4M : either
peer to peer
Because
or client-
Page No: 13 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
 The number of computers or devices in the network is less than 15. For peer to peer server
network less than 10 devices shows good performance.
 Data security is not the top priority
 Networking is mainly required for hardware sharing.
 Advanced sharing is not required.
 Additional networking features are not required.
 The administrator personally knows all users of the network.
 The above conditions are usually fulfilled in home and small office networks. Thus,
peer-to-peer networking is mostly used in home and small office networks.
 Less costly

Also if security is in priority and cost is not the consideration then I would prefer client
server network it will provide a stable network.

b) Compare packet switched and circuit switched network. 4M

Ans Packet switching and circuit switching comparison 1 mark for


each
Packet switching circuit switching
difference:
In-circuit switching has there are 3 phases: In Packet switching directly data transfer any
i)Connection Establishment. takes place.
ii) Data Transfer. 4 points 4 M
iii) Connection Released.
In-circuit switching, each data unit knows In Packet switching, each data unit just
the entire path address which is provided knows the final destination address
by the source. intermediate path is decided by the routers.
In Packet switching, data is processed at all
In-Circuit switching, data is processed at intermediate nodes including the source
the source system only system.
Resource reservation is the feature of
circuit switching because the path is fixed There is no resource reservation because
for data transmission. bandwidth is shared among users.
Wastage of resources is more in Circuit Less wastage of resources as compared to
Switching Circuit Switching
Transmission of the data is done not only
Transmission of the data is done by the by the source but also by the intermediate
source. routers.
Congestion can occur during the
connection establishment phase because Congestion can occur during the data
there might be a case where a request is transfer phase; a large number of packets
being made for a channel but the channel is comes in no time.
already occupied.
Circuit switching is not convenient for Packet switching is suitable for handling

Page No: 14 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
handling bilateral traffic. bilateral traffic.
In-Circuit switching, the charge depends on
time and distance, not on traffic in the In Packet switching, the charge is based on
network. the number of bytes and connection time.
Recording of packets is never possible in Recording of packets is possible in packet
circuit switching. switching.
In-Circuit Switching there is a physical In Packet Switching there is no physical
path between the source and the destination path between the source and the destination
Circuit Switching does not support store Packet Switching supports store and
and forward transmission forward transmission
No call setup is required in packet
Call setup is required in circuit switching. switching.
In-circuit switching each packet follows the In packet switching packets can follow any
same route. route.
The circuit switching network is Packet switching is implemented at the
implemented at the physical layer. datalink layer and network layer
Circuit switching requires simple protocols Packet switching requires complex
for delivery. protocols for delivery.
c) List the protocols related to all layers of OSI reference model 4M

Ans 1 M for two


protocol each
layer.
consider any
four layer in
case of all
correct.

d) Explain satellite communication. 4M

Page No: 15 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Ans 1. Satellite is a manmade system which is kept in continuous rotation around the earth 2M diagram
in a specific orbit at a specific height above the earth and with specific speed.
2M for
2. In satellite communication, signal transferring between the sender and receiver is
explanation
done with the help of satellite.
3. In this process, the signal which is basically a beam of modulated microwaves is
sent towards the satellite called UPLINK (6 GHz).
4. Then the satellite amplifies the signal and sent it back to the receiver’s antenna
present on the earth’s surface called as DOWNLINK (4Ghz), as shown in the
diagram given

5 . As the entire signal transferring is happening in space. Thus this type of communication
is known as space communication. The satellite does the functions of an antenna and the
Page No: 16 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
repeater together. If the earth along with its ground stations is revolving and the satellite is
stationery, the sending and receiving earth stations and the satellite can be out of sync over
time.

6. Therefore Geosynchronous satellites are used which move at same RPM as that of the
earth in the same direction.

7. So the relative position of the ground station with respect to the satellite never changes.

8. However 3 satellites are needed to cover earth’s surface entirely.

e) Describe the process of DHCP server configuration. 4M

Ans Configuring the DHCP Server Step by step


procedure
To configure the DHCP server: 4M

1. From the Control Panel, go to Administrative Tools >> Computer Management >>
Services and Application >> DHCP.

2. From the Action menu, select New Scope. The New Scope wizard is displayed.

3. Enter the following information as prompted:

 Scope name and description:


 IP address range (for example, 192.168.0.170 to 192.168.0.171)
 Subnet mask (for example, 255.255.255.0)
 Add exclusions (do not exclude any IP addresses)
 Lease duration (accept the default of 8 days)
 Router (default gateway) of your subnet (for example, 192.168.0.1)
 Domain name, WINS server (these are not needed)
 Activate Scope? (select “Yes, I want to activate this scope now”)
4. Click Finish to exit the wizard. The contents of the DHCP server are listed.

5. Right-click Scope [iPad dress] scope-name and select Properties.

6. In the Scope Properties box, click the Advanced tab.

7. Select BOOTP only, set the lease duration to Unlimited, and click OK.

8. Right-click Reservations. The Controller A Properties box is displayed. 9. Enter the IP


address and the MAC address for Controller A. Click Add. The Controller B Properties box
is displayed

10. Enter the IP address and the MAC address for Controller B. Click Add. The
controllers are added to the right of the Reservations listing.

Page No: 17 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
11. Right-click Scope [iPad dress] scope-name to disable the scope.

12. Click Yes to confirm disabling of the scope.

13. Right-click Scope and select Activate.

5. Attempt any TWO of the following: 12 M

a) Explain the working of hub, switch and bridge. 6M

Ans I. Hub: 2M each for


Hub, switch
Hubs are networking devices operating at a physical layer of the OSI model that are used to and Bridge
connect multiple devices in a network. They are generally used to connect computers in a
LAN.

Working:
A hub has many ports in it. A computer which intends to be connected to the network is
plugged in to one of these ports. When a data frame arrives at a port, it is broadcast to every
other port, without considering whether it is destined for a particular destination device or
not.

Features of Hubs
 A hub operates in the physical layer of the OSI model.
 A hub cannot filter data. It is a non-intelligent network device that sends message to
all ports.
 It primarily broadcasts messages. So, the collision domain of all nodes connected
through the hub stays one.
 Transmission mode is half duplex.

Page No: 18 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Fig: working of Hub

II. Switch:

Switches are networking devices operating at layer 2 or a data link layer of the OSI model.
They connect devices in a network and use packet switching to send, receive or forward
data packets or data frames over the network.

Working:
A switch has many ports, to which computers are plugged in. When a data frame arrives at
any port of a network switch, it examines the destination address, performs necessary
checks and sends the frame to the corresponding device(s). It supports unicast, multicast as
well as broadcast communications.

Page No: 19 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Fig: working of Switch

Features of Switches
 It is an intelligent network device that can be conceived as a multiport network
bridge.
 It uses MAC addresses (addresses of medium access control sublayer) to send data
packets to selected destination ports.
 It uses packet switching technique to receive and forward data packets from the
source to the destination device.
 It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-
all) communications

III. Bridge:
Bridges are used to connect similar network segments.
It combines two LANs to form an extended LAN.

Working:
A bridge accepts all the packets and amplifies all of them to the other side. The bridges are
intelligent devices that allow the passing of only selective packets from them. A bridge only
passes those packets addressed from a node in one network to another node in the other
network.

Page No: 20 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Figure – Bridge combines two LANs to form an extended LAN

b) Describe the procedure to configure the TCP/IP network layer services. 6M

Ans Before beginning configuration procedure, the following are the prerequisites. Step by step
procedure -
 Network hardware is installed and cabled. 6M
 TCP/IP software is installed.
To configure your TCP/IP network, the following steps are followed:

1) Read TCP/IP protocols for the basic organization of TCP/IP.


2) Minimally configure each host machine on the network.
This means adding a network adapter, assigning an IP address, and assigning
a
host name to each host, as well as defining a default route to your network.
For
background information on these tasks, refer to TCP/IP network
interfaces, TCP/IP addressing, and Naming hosts on your network.
3) Configure and start the intend daemon on each host machine on the network. Read
TCP/IP daemons and then follow the instructions in Configuring the intend daemon.
4) Configure each host machine to perform either local name resolution or to
use a name server. If a hierarchical Domain Name networks being set up, configure
at least one host to function as a name server.

5) If the network needs to communicate with any remote networks, configure


at least one host to function as a gateway. The gateway can use static routes or a
routing daemon to perform internetwork routing.

Page No: 21 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
6) Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in Client network
services if you wish to make a particular service unavailable.

7) Decide which hosts on the network will be servers, and which services a
particular server will provide. Follow the instructions in Server network
services to start the server daemons you wish to run.

8) Configure any remote print servers that are needed.


9) Optional: If desired, configure a host to use or to serve as the master time
server for the network.
c) Explain multiplexing techniques. 6M

Ans Multiplexing is the set of techniques that allows the simultaneous transmission of multiple 2 M for 3
signals across a single data link. multiplexing

technique

with diagram

Frequency-Division Multiplexing

Frequency-division multiplexing (FDM) is an analog technique that can be applied when


the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to
be transmitted. In FOM, signals generated by each sending device modulate different carrier
frequencies. These modulated signals are then combined into a single composite signal that
can be transported by the link. Carrier frequencies are separated by sufficient bandwidth to
accommodate the modulated signal. These bandwidth ranges are the channels through
which the various signals travel. Channels can be separated by strips of unused bandwidth-
guard bands-to prevent signals from overlapping. In addition, carrier frequencies must not
interfere with the original data frequencies.

Page No: 22 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Fig: Frequency-Division Multiplexing

In above figure, the transmission path is divided into three parts, each representing a
channel that carries one transmission.

Wavelength-Division Multiplexing

Wavelength-division multiplexing (WDM) is designed to use the high-data-rate capability


of fiber-optic cable. The optical fiber data rate is higher than the data rate of metallic
transmission cable. Using a fiber-optic cable for one single line wastes the available
bandwidth. Multiplexing allows us to combine several lines into one.

WDM is conceptually the same as FDM, except that the multiplexing and de-multiplexing
involve optical signals transmitted through fiber-optic channels. The idea is the same: We
are combining different signals of different frequencies. The difference is that the
frequencies are very high.

Fig: Wavelength-Division Multiplexing

Time-Division Multiplexing

Time-division multiplexing (TDM) is a digital process that allows several connections to


share the high bandwidth of a linle Instead of sharing a portion of the bandwidth as in FDM,
time is shared. Each connection occupies a portion of time in the link.

Figure gives a conceptual view of TDM. Note that the same link is used as in FDM; here,
however, the link is shown sectioned by time rather than by frequency. In the figure,
portions of signals 1,2,3, and 4 occupy the link sequentially.

Page No: 23 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Fig: Time-Division Multiplexing

We also need to remember that TDM is, in principle, a digital multiplexing technique.
Digital data from different sources are combined into one timeshared link. However, this
does not mean that the sources cannot produce analog data; analog data can be sampled,
changed to digital data, and then multiplexed by using TDM.

6. Attempt any TWO of the following: 12 M

a) Explain the working of following topologies: 6M

1) Bus 2) Ring 3) Tree

Ans Bus Topology: 2M each for


each
In networking, a topology that allows all network nodes to receive the same message topology
through the network cable at the same time is called as bus topology.

In this type of network topology, all the nodes of a network are connected to a common
transmission medium having two endpoints.

All the data that travels over the network is transmitted through a common transmission
medium known as the bus or the backbone of the network.

When the transmission medium has exactly two endpoints, the network topology is known
by the name, 'linear bus topology'. A network that uses a bus topology is referred to as a
“Bus Network”.

Working of Bus Topology:

Fig.shows bus topology. The central cable is the backbone of the network and is known as
Bus (thus the name). Every workstation or node communicates with the other device
through this Bus.

A signal from the source is broadcasted and it travels to all workstations connected to bus
cable. Although the message is broadcasted but only the intended recipient, whose MAC

Page No: 24 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
address or IP address matches, accepts it.

If the MAC/IP address of machine does not match with the intended address, machine
discards the signal. A terminator is added at ends of the central cable, to prevent bouncing
of signals. A barrel connector can be used to extend it.

Fig: Bus Topology

II.Ring Topology:

Ring topology is a network topology that is set-up in circular fashion. It is called ring
topology because it forms a ring as each computer is connected to another computer, with
the last one connected to the first. Exactly two neighbors for each device.
Each node in this topology contains repeater. A signal passes node to node, until it reaches
its destination. If a node receives a signal intended for another node its repeater regenerates
the signal and passes it.

Token is a special three-byte frame that travels around the ring network. It can flow
clockwise or anticlockwise. Ring topology is a point to point network.

The transmission is unidirectional, but it can be made bidirectional by having 2 connections


between each network node, it is called Dual Ring Topology.

In dual ring topology, two ring networks are formed, and data flow is in opposite direction
in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.

In a ring network, the data and the signals that pass over the network travel in a single
direction. In ring topology network arrangement, a signal is transferred sequentially using a
‘token’ from one node to the next.

Fig. shows a ring topology. The token travels along the ring until it reaches its destination.
Once, token reaches destination, receiving computer acknowledges receipt with a return
message to the sender. The sender then releases the token for the token for use by another
computer.

Page No: 25 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Fig: Ring Topology

Tree Topology:
As its name implies in this topology devices make a tree structure. Tree topology integrates
the characteristics of star and bus topology.
• In tree topology, the number of star networks are connected using Bus. This main cable
seems like a main stem of a tree, and other star networks as the branches.
• It is also called expanded star topology. Ethernet protocol is commonly used in this type
of topology.
• Fig. shows tree topology. A tree topology can also combine characteristics of linear bus
and star topologies. It consists of groups of star configure workstations connected to a linear
bus backbone cable.
• Tree topologies allow for the expansion of an existing network and enable schools to
configure a network to meet their needs.

Fig: Tree Topology

b) Explain the working of OSI model layers. 6M

Page No: 26 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Ans Layered Architecture of ISO-OSI Model: 1M for
Diagram and
1. The basic idea of a layered architecture is to divide the ISO-OSI model into small pieces. 5M for
Each layer adds to the services provided by the lower layers in such a manner that the explanation
highest layer is provided a full set of services to manage communications and run the
applications.

2. A basic principle is to ensure independence of layers by defining services provided by


each layer to the next higher layer without defining how the services are to be performed.

3. In an n-layer architecture, layer n on one machine carries on conversation with the layer n
on other machine. The rules and conventions used in this conversation are collectively
known as the layer-n protocol.

7 Layers of OSI reference Model

ISO-OSI model has 7 layered architectures.

Functions of each layer are given below

Layer1: Physical Layer

1. It activates, maintains and deactivates the physical connection.

2. It is responsible for transmission and reception of the unstructured raw data over
network.

3. Voltages and data rates needed for transmission is defined in the physical layer.

4. It converts the digital/analog bits into electrical signal or optical signals.

5. Data encoding is also done in this layer.

Page No: 27 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Layer2: Data Link Layer

1. Data link layer synchronizes the information which is to be transmitted over the physical
layer.

2. The main function of this layer is to make sure data transfer is error free from one node to
another, over the physical layer.

3. Transmitting and receiving data frames sequentially is managed by this layer.

4. This layer sends and expects acknowledgements for frames received and sent
respectively. Resending of no acknowledgement received frames is also handled by this
layer.

Layer3: The Network Layer

1. Network Layer routes the signal through different channels from one node to other.

2. It acts as a network controller. It manages the Subnet traffic.

3. It decides by which route data should take.

4. It divides the outgoing messages into packets and assembles the incoming packets into
messages for higher levels.

Layer 4: Transport Layer

1. Transport Layer decides if data transmission should be on parallel path or single path.

2. Functions such as Multiplexing, Segmenting or Splitting on the data are done by this
layer

3. It receives messages from the Session layer above it, converts the message into smaller
units and passes it on to the Network layer.

4. Transport layer can be very complex, depending upon the network requirements.

Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.

Layer 5: The Session Layer

1. Session Layer manages and synchronizes the conversation between two different
applications.

2. Transfer of data from source to destination session layer streams of data are marked and
are resynchronized properly, so that the ends of the messages are not cut prematurely and
data loss is avoided.

Page No: 28 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Layer 6: The Presentation Layer

1. Presentation Layer takes care that the data is sent in such a way that the receiver will
understand the information (data) and will be able to use the data.

2. While receiving the data, presentation layer transforms the data to be ready for the
application layer.

3. Languages(syntax) can be different of the two communicating systems. Under this


condition presentation layer plays a role of translator.

4. It performs Data compression, Data encryption, Data conversion etc.

Layer 7: Application Layer

1. Application Layer is the topmost layer.

2. Transferring of files disturbing the results to the user is also done in this layer. Mail
services, directory services, network resource etc are services provided by application layer.

3. This layer mainly holds application programs to act upon the received and to be sent data.

c) Explain ARP, subnetting and supernetting with example. 6M

Ans ARP: 2M each for


ARP,
Most of the computer programs/applications use logical address (IP address) to subnetting
send/receive messages, however, the actual communication happens over the physical and
address (MAC address) i.e from layer 2 of the OSI model. So our mission is to get the supernetting
destination MAC address which helps in communicating with other devices. This is where with example
ARP comes into the picture, its functionality is to translate IP address to physical
addresses.

ARP finds the hardware address, also known as Media Access Control (MAC) address, of
a host from its known IP address.
It is responsible to find the hardware address of a host from a know IP address there are
three basic ARP terms.
Page No: 29 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
The important terms associated with ARP are:
(i) Reverse ARP
(ii) Proxy ARP
(iii) Inverse ARP

Subnetting:

Dividing the network into smaller contiguous networks or subnets is called subnetting.
Suppose we take a network of class A. So, in class A, we have 2²⁴ hosts. So to manage
such a large number of hosts is tedious. So if we divide this large network into the smaller
network then maintaining each network would be easy.

Suppose we have a class C network having network ID as 201.10.1.0(range of class C


192–223). So the total number of hosts is 256(for class C host is defined by last octet i.e.
2⁸). But, the total usable host is 254. This is because the first IP address is for the network
ID and the last IP address is Direct Broadcast Address (for sending any packet from one
network to all other hosts of another network).

So, in subnetting we will divide these 254 hosts logically into two networks. In the above
class C network, we have 24 bits for Network ID and the last 8 bits for the Host ID.

Supernetting:

Supernetting is the opposite of Subnetting. In subnetting, a single big network is divided


into multiple smaller subnetworks. In Supernetting, multiple networks are combined into
a bigger network termed as a Supernetwork or Supernet.
Supernetting is mainly used in Route Summarization, where routes to multiple networks
with similar network prefixes are combined into a single routing entry, with the routing
entry pointing to a Super network, encompassing all the networks. This in turn
significantly reduces the size of routing tables and also the size of routing updates
exchanged by routing protocols.
More specifically, when multiple networks are combined to form a bigger network, it is
termed as super-netting
 Super netting is used in route aggregation to reduce the size of routing tables and routing
table updates
There are some points which should be kept in mind while supernetting:
1. All the IP address should be contiguous.
2. Size of all the small networks should be equal and must be in form of 2n.
3. First IP address should be exactly divisible by whole size of supernet.

For example:

Page No: 30 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________

Page No: 31 | 31

You might also like