DCN Model Answer
DCN Model Answer
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page1/ 27
Q.1.
(A) Attempt any SIX : 12
(a) Define Server. Give the name of any two types of Server.
(Definition -1 mark, any two types -1 mark)
Definition of server: The central computer which is more powerful than the clients & which
allows the clients to access its software & database is called as the server.
Types of server:
1. File server
2. Print Sever
3. Application server
4. Message server
5. Database server
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page2/ 27
(c) Write in brief any two roles of network control devices in computer network.
(1 role – 1 mark, any 2 two roles)
Two roles of network control devices in computer:
Role of repeater: Generates the original signal. Operates in the physical layer.
Role of Bridges: Bridges utilize the address protocol. They can exercise the traffic management.
They are most active in the data link layer.
Role of routers: Routers provide connections between two separate but compatible networks. It
works in the network layer.
Role of Gateways: Gateways provide translation services between incompatible networks and
works in all layers.
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page3/ 27
(a) Compare Server based network and peer-to-peer network. (Any four points)
(Each difference 1 mark, any four points)
Compare Server based network & Peer to Peer network
Server based network Peer to Peer
1. It is much like company uses centralized 1. It is much like company uses decentralized
management. management.
2.In this server has more power & client has 2.In this each machine has same power
less power.
3. It is hardware intensive. 3. Uses less expensive computer hardware.
4. Complex to setup & require professional 4. Easy to setup & administrator.
administrator.
5.Very secure 5.Less secure
6.Network O.S required 6.Network O.S not required
7.It support large Network 7.It support small Network
8.Better performance 8.Might hurt user's performance
(b) Give any four selection criteria for selecting network topology.
( 1- mark for each criteria, any four criteria)
Selection criteria for selecting network topology.
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page4/ 27
.
LAN MAN WAN
1. Area – Network within 1.Area-Network within 1.Area – Network spans a
a single building or over an entire city. large geographical area after
campus of up to a few Up to 10km a country or continent 100
kilometres in size. km …1000km country
10 … 1 Km ….continent
campus.
2. LAN network has very 2.MAN network has 2.WAN speed varies based on
high speed mainly due tolower speed compared to geographical location of the
proximity of computer LAN. servers. WAN connects
and network devices. several LANs
3. Bandwidth is low. 3. Bandwidth is 3 Bandwidth is high.
moderate.
4. Transmission media – 4.Transmission media- 4 Transmission media –
coaxial cable. cables, PSTN, optical PSTN or Satellite links.
fibre cables, wireless
5. Data rate is high. 5. Data rate is moderate. 5. Data rate is low.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page5/ 27
Coaxial cable (also called as coax) has an inner central copper conductor surrounded by an
insulating sheath, which in turn is enclosed in the metal mesh. This outer conductor (shield)
acts not only as a second conductor for completing the circuit but also acts as shield against
noise. This whole arrangement is enclosed in protective plastic cover as shown in fig.
Co-axial cables are divided into various categories depending upon the thickness & size of
the shields, insulators and the outer coating & other considerations. They are commonly used
by cable companies to carry cable transmissions. The various coaxial cable standards are RG-
8, RG-9,RG-11,RG-58 and RG-59.
Advantages of coaxial cable are:-
1.it carries signals of higher frequency ranges than twisted pair cable.
2.lower attenuation than twisted pair cable.
3. supports higher bandwidth.
d) State the factors to be considered for selecting transmission media. (Eight points)
( 1/2 marks for any eight factors)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page6/ 27
e) Discuss any four network features.(1 mark for each feature, any four features)
Discuss any four network features.
1) File sharing: File sharing is the primary feature of network. Due to use of networks, the
sharing of files becomes easier. File sharing requires a shared directory or disk drive to which
many users can access over the network. When many users are accessing the same file on the
network, more than one person can make changes to a file at the same time. They might both
making conflicting changes simultaneously.
2) Printer sharing: Printer sharing is beneficial to many users as they can share costly & higher
quality printers. Printer sharing can be done in several different ways on network. The most
common way is to use printer queues on server. The printer queue holds print job until any
currently running print jobs are finished & then automatically send the waiting jobs to the
printer i.e. printer connected to server. Another way to share printer on a network is that each
workstations accesses the printer directly.
3) Application services: You can also share application on a network. For example you can
have a shared copy of Microsoft office or some other application & keep it on the network
server.
Another application services you can have on the network is shared installation i.e. contents
of CD-ROM copy to the server, then run the installation the installing application mush faster
& more convenient.
4) E- mail services :E-mail is extremely valuable & important feature for communication within
organization or outside the people in world. E-mail service can be used by user in two
different ways : 1. File based 2.Client
File based e-mail system requires gateway server for connecting or handling the e-mail
interface between the two systems using gateway software that is part of the file-based e-mail
system.
A client-server e-mail system is one where an e-mail server containing the messages &
handles all incoming & outgoing mail. It is more secure & powerful than file based e-mail
system.
5) Remote access: Using this feature user can access their file & e-mail, when they are travelling
or working on remote location. It enables users to access to centralized application, stored
private or shared files on LAN.
6) Internet & Intranet: Internet: It is public network. This consists of thousands of individual
networks & millions of computers located around the world. Internets have many different
types of services available such as e-mail, the web & Usenet newsgroups.
Intranet: It is private network or it is company‟s own network. Company use this feature for
internal use. For example: company establish its own web server, for placing documents such
as employee handbooks, purchases form or other information that company publishes for
internal use. It also has internet services such as FTP servers or Usenet servers.
7) Network security: Internal & External
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page7/ 27
is longer than that of red color, and hence the frequency of infrared communications is
smaller than that of red color. Hence, we have the term „below red color‟ or „Infrared‟.
Infrared communication is used by military for surveillance, for vision in the darkness
at night, tracking objects, etc. We use infrared communication whenever we use our remote
controls to operate television sets, DVD players, etc. Weather forecasting & astronomy also
make use of infrared communication.
Disadvantage:
i. The major disadvantage is that the sun generates radiation in the infrared band. This
can cause a lot of interference with IR communication.
ii. Infrared signals cannot penetrate walls
iii. Large areas require multiple emitter panels, which will increase the cost of the
system.
PAN CAN
1. PAN is definitively the smallest 1. This is a network spanning multiple
type of network you can currently LANs within a limited geographical
use and the name comes from area.
Personal Area Network
2. PAN is the interconnected 2.It can connect different buildings in its
network of technologic devices campus such as various departments,
within the reach of an individual library etc.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page8/ 27
person.
b) Discuss the role of the HUB. Differentiate between Active Hub and Passive Hub.
(Role-2 marks, difference any 2 points -1 mark each)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page9/ 27
The OSI reference model is as shown in the figure.There are seven layers in the model.
Physical layer, Data link layer, Network layer, Transport layer, Session layer, Presentation
layer, Application layer. Each layer performs unique and specific task and it offers services to
the layer above it. Each computer on a network uses a series of protocols to perform the
functions assigned to each layer. At the top of the stack is the application layer and at the
bottom is the physical medium which actually connects the computers to form a network. The
figure shows the OSI model with two hosts A and B, communicating with each other
Interface: an interface defines the operations and services offered by lower layer to the upper
layer. This is an interface between each pair of adjacent layers as shown in the figure.
Peer: the entities comprising the corresponding layers on different machines are called as
peers. The communication actually takes place between the peers using the protocols.
Exchange of information: at the physical layer the communication is direct that is, machine A
sends a stream of bits to machine B. at higher layers each layer in the sending machines adds
its own information to the message it receives from the layer just above it and passes the
whole package to the layer just below it. The information added by each layer is in the form
of headers or trailers. At layer 1 the entire package is converted to a form that can be
transferred to the receiving machine.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page10/ 27
Each layer in the layered architecture provides service to the layers which are directly above
and below it. The outgoing information will travel down through the layers to the lowest
layer. While moving down on the source machine, it acquires all the control information
which is required to reach the destination machine. The control information is in the form of
headers and footers which surrounds the data received from the layer above. This process of
adding headersand footers to the data is called as data encapsulation. The headers and footers
contain control information in the individual fields. it is used to make message packet reach
the destination. The headers and footers form the envelope which carries the message to the
desired destination.
Eg:
LAYER 5 M
LAYER 4
H4 M
LAYER 3 H3 H4 M1 H3 M2
LAYER 2 H2 H3 H4 M1 T2 H2 H3 M2 T2
LAYER 1
MESSAGE+ HEADER+TAILER
H4 = LAYER 4 HEADER
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page11/ 27
H3 = LAYER 3 HEADER
H2 = LAYER 2 HEADER
T2 = LAYER 2 TAILER
LAYER 5 M
LAYER 4
H4 M
LAYER 3 H3 H4 M1 H3 M2
LAYER 2 H2 H3 H4 M1 T2 H2 H3 M2 T2
LAYER 1
MESSAGE+ HEADER+TAILER
H4 = LAYER 4 HEADER
H3 = LAYER 3 HEADER
H2 = LAYER 2 HEADER,T2 = LAYER 2 TAILER
The figure shows the example of five layer stack for data encapsulation. The fifth layer of sending machine
wants to send a message M to the fifth layer of destination machine. The message M is produced by layer 5
of machine 1 and given to layer 4 for transmission. Layer 4 adds header H4 in front of the message and pass
it to layer 3. Layer 3 breaks up the incoming message into small units as M1 and M2 and pass these packets
to layer 2. Layer 2 adds the header as well as footer to each packet obtained from layer 3 and pass it to layer
1 for physical transmission.
e) Write the name of layers that perform the following functions in OSI :
I. Data Encryption
II. Error Correction
III. File Transfer
IV. Data Encoding
(1 mark each)
1. Data Encryption-Presentation Layer
2. Error Correction-Data link layer and Transport layer
3. File Transfer-Application layer
4. Data Encoding-Presentation layer
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page12/ 27
The padding data is used to adapt the length of the frame for certain protocols.
(ii)SLIP:-SLIP means Serial Line Internet Protocol.SLIP is the result of the integration of
modem protocols prior to suite of TCP/IP protocols.
It is a simple internet link protocol conducting neither address nor error control. Data
transmission with SLIP is very simple. this protocol sends a frame composed only of data to
be sent followed by an end of transmission character(the END character, the ASCII code of
which is 192).A SLIP frame looks like:
Data to be Transmitted END
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page13/ 27
c) Draw and explain fiber optic cable.(2 marks for diagram, 2 marks for explanation)
As shown in the figure, at the center is the glass core through which the light propagates. In
multimode fibers, the core is typically 50 microns in diameter. In single mode fibers, the core
is 8 to 10 microns. The core is surrounded by a glass cladding with a lower index of
refraction than the core, to keep all the light in the core. A thin plastic jacket is used to
protect the cladding. Fibers are grouped in bundles, protected by an outer sheath.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page14/ 27
Fibers can be connected in three different ways. First they can terminate in connectors and be
plugged into fiber sockets. Connectors lose about 10 to 20 percent of the light, but they make
it easy to reconfigure systems.
Second they can be spliced mechanically. Mechanical splices just lay the two carefully – cut
ends next to each other in a special sleeve and clamp them in place. Alignment can be
improved by passing light through the junction and then making small adjustments to
maximize the signal.
Third, two pieces of fiber can be fused to form a solid connection. A fusion splice is almost
as good as a single drawn fiber.
AND
11111111.11111111.11111100.00000000 (supernet mask)
Returns
11000000.10101000.01000000.00000000
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page15/ 27
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page16/ 27
Fig:Vertical communication
Explanation:
1) HUB: Hub is a connecting device, it is also known as multiport repeater.
It is normally used for connecting stations in a physical star topology
All networks require a central location to bring media segments together.
These central locations are called hubs. A hub organizes the cables and relays signals to the
other media segments. There are three main types of hubs:
1) Passive
2) Active
3) Intelligent
Passive Hubs: A passive hubs simply combines the signals of a network segments. There is
no signal processing or regeneration. Apassive hub reduces the cabling distance by half
because it does not boost the signals and in fact absorbs some of the signal. With the passive
hub each computer receives the signal sent from all the other computers connected to the hub.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page17/ 27
Active hubs: They are like passive hubs but have electronic components for regeneration and
amplification of signals. by using active hubs the distance between devices can be increased.
The main drawback of active hubs is that the amplify noise along with the signals. They are
also much expensive than passive hubs.
Intelligent hubs: in addition to signal regeneration, intelligent hubs perform some network
management and intelligent path selection. One advantage to this is that all transmission
media segment can be connected permanently because each segment will be used only when
a signal is sent to a device using that segment.
Node 1 Node 2
HUB
Node 3 Node 4
2) ROUTER: Router is a device that connects 2 or more networks. It consist of hardware and
software .hardware includes the physical interfaces to the various networks in the
internetwork. Software in a router is OS and routing protocols management software.
1) Router use logical and physical addressing to connect two or more logically separate
networks.
2) They accomplish this connection by organizing the large network into logical network
called subnets.
3) Each of the subnet is given a logical address. This allows the network to be separate but
still access to each other and exchange data.
4) Data is grouped into packets. Each packet has physical device address and logical network
address.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page18/ 27
Modem Modem
(DCE) (DCE)
Telephone DTE
DTE
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page19/ 27
b) In star topology which device is preferable as a star device between switch and hub?
Justify.
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page20/ 27
Multimode :
Multiple beams from a light source move through the core in different paths.
How these beams move within the cable depends on the structure of the core as shown in the
fig.
In multimode step-index fiber, the density of the core remains constant from the center to the
edges.
A beam of light moves through this constant density in a straight line until it reaches the
interface of the core and the cladding.
At the interface, there is an abrupt change due to a lower density, this alters the angle of the
beam‟s motion.
The term step index refers to the suddenness of this change, which contributes to the
distortion of the signal as it passes through the fiber.
A multimode graded index fiber decreases this distortion of the signal through the cable.
In this, density is highest at the center of the core and decreases gradually to its lowest at the
edge.
Following fig shows the impact of this variable density on the propagation of light beams.
Single mode:
The single mode fiber is manufactured with a much smaller diameter than that of multimode
fiber and with substantially lower density.
The decrease in density results in a critical angle that is close enough to 900 to make the
propagation of beams almost horizontal.
In this case propagation is almost identical and delays are negligible.
All the beams arrive at the destination together and can be recombined with little distortion to
the signal.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page21/ 27
d) State the situations under which gateways are necessary in the network.
(Necessary2Marks. example2Marks)
Gateway operates at all 7 layers of the OSI model. It is a device, which connects two
different dissimilar n/w which have same function of communication. Situation where
gateways are necessary for different n/w like Ethernet, Token Ring, and FDDI etc. It can
communicate if they are using same protocol for communication like TCP/IP 08 Apple talk if
they are using different protocol from a gateway cash forward packet across different n/w s
that may also use different protocol.
Eg: if n/w A is a Token Ring network using TCP/IP & network B is a Novell Network, a
gateway can relay frames between two.
This means that a gateway has not only had, but also between different protocols. In certain
situations the only changes required are to the frame header. In other cases, the gateway must
take case of different frame sizes, data rates, format, acknowledgement schemes, and priority
schemes tec.
e) Explain connectionless and connection oriented protocol. Give the example for each
type.
(Explanation 1 mark each, any one example 1 mark for each type)
Connection less protocol:
These protocols do not establish a connection between devices. It is manually achieved by
transmitting information in one direction, from source to destination without checking to see
if the destination is still there or if it is prepared to receive the information.
Connection-oriented protocol:
It means that when devices communication they perform hand sharing to set up on end to end
connection. Usually one device begins by sending a request to open a connection, and the
other responds.
Connectionless protocols:
1) IP
2) ICMP
3) UDP
1. IP
IP is internet Protocol.
It is unreliable protocol because it does not provide any error control and flow control.
Packets in IP are called “Datagram”
2. ICMP
It is internet control message protocol.
It reports error and sends control messages.
Error reporting messages include – destination unreachable, source quench , time exceed,
parameter problem , redirection etc.
Query message includes –echo request and reply, time stamp request and reply, router
solicitation and advertisement. etc
3.UDP
UDP is user datagram protocol.
It is connectionless protocol because data is sent without establishing a connection between
sender and receiver before sending the data.
UDP is unreliable because data is delivered without acknowledgement.
UDP does not perform Auto retransmission.
UDP does not use flow control.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page22/ 27
1) TCP
TCP is transmission control protocol.
It is connection oriented protocol because connection must be establish prior to transmission
of data.
TCP is reliable protocol because data is delivered with acknowledgement.
TCP perform Auto Retransmission if the data is lost.
TCP use flow control.
TCP has low speed of transmission.
2. SLIP
SLIP is serial line internet protocol
SLIP does not perform error detection and correction.
SLIP does not provide any authentication.
SLIP is not approved internet standard.
SLIP supports only Internet protocol (IP)
SLIP supports static IP address assignment
3. PPP
PPP is point to point protocol.
PPP perform error detection
PPP provides authentication and security.
PPP is approved internet standard.
PPP supports IP and other protocols.
PPP supports Dynamic IP address assignment
4. SMTP
SMTP is simple mail transfer protocol.
It is connection oriented text based protocol in which sender communicates with receiver
using a command and supplying data over reliable TCP connection.
SMTP is standard application layer protocol for delivery of email over TCP/IP network.
SMTP establish a TCP connection between Sender And port number 25 of receiver
f) Explain following:
I. Telnet
II. FTP
(2 Marks for each)
1. Telnet:
TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual
terminal services proposed by ISO.
TELNET enables establishment of connection to a remote system in such a way that a local
terminal appears to be terminal at remote system.
TELNET is general purpose client server application program.
2. FTP.
FTP is a stranded mechanism provided by the Internet for copying a file from one host to the
other.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page23/ 27
Some of the problem in transferring files from one system to the other are as follows:
Two systems may use different file name conventions.
Two systems may represent text data in different types.
The directory structure of the two systems may be different.
FTP provides a simple solution to all these problems.
FTP established two connections between the client and server. One is for data transfer and
the other is for the control information.
The fact that FTP separates control and data makes it very efficient.
The control connection uses simple rules of communication. Only one line of command or a
line of response is transferred at a time.
But the data connection uses more complex rules due to the variety of data types being
transferred.
FTP uses port 21 for the control connection and port 20 for the data connection.
OSI model (open system interconnection) model was developed by ISO (international
standard organization)
Function of OSI model:
i. It provides way to understand how internetwork operates.
ii. It gives guideline for creating network standard.
OSI model has 7 layers as shown in the figure.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer
OSI model has following 7 layers as Physical layer, data link layer, Network layer, Transport
layer, session layer, presentation layer, application layer.
1. Physical layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It deals with mechanical and electrical specifications of interface and transmission
medium. For transmission it defines procedures and functions that devices and transmission
medium has to perform
Physical characteristics of interfaces and media.
Representation of bits: Data rate(transmission rate).
Synchronization of bits.
Line configuration: Point to point or multipoint configuration should be used.
2. Data link layer: It is responsible for transmitting group of bits between the adjacent nodes.
The group of bits is called as frame. The network layer passes a data unit to the data link
layer. Header and trailer is added to the data unit by data link layer. This data unit is passed to
the physical layer. Data link layer is responsible for moving frames from one node to the
next.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page24/ 27
3. Network layer: It is responsible for routing the packets within the subnet i.e. from
source to destination. It is responsible for source e to destination delivery of individual
packets across multiple networks. It ensures that packet is delivered from point of origin to
destination.
Functions of network layer:
1) logical addressing
2) Routing.
3) Congestion control
4) Accounting and billing
5) Address transformation
6) Source host to destination host error free delivery of packet.
4. Transport layer: Responsibility of process to process delivery of message Ensure that whole
message arrives in order.
Functions of Transport layer:
1) Service point addressing
2) Segmentation and reassembly
3) Connection control
4) Flow control: Flow control is performed end to end 5) Error control
7. Application layer: It enables user to access the network. It provides user interfaces and
support for services like email, remote file access.
Functions of Application layer:
Network virtual terminal
file transfer access and management
mail services and directory services
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page25/ 27
b) Give the name of protocols used by different layers of TCP/IP. Discuss the function of
ARP and RARP.
(4 marks for protocols, 2 marks of ARP, 2 marks of RARP)
2) Internet Layer –
This layer permits host to inject packets into network and packet travels independently to
destination.
This layer defines packet format and protocol called IP (internet Protocol)
ARP
RARP
IP
3) Transport Layer -
It has TCP and UDP.
TCP (transmission control protocol) –it is Reliable & connection oriented protocol.
UDP (User Datagram Protocol)- it is Unreliable & connectionless protocol.
4) Application Layer -
It includes virtual Terminal (TELNET), file transfer Protocol (FTP), simple Mail Transfer
Protocol (SMTP) and other protocols like HTTP, WWW, DNS.
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page26/ 27
But sometimes we have to solve a reverse problem. That means we have to obtain the IP
address corresponding to the given Ethernet address.
Such a problem can occur when booting a diskless workstation.
The problem of obtaining the IP address when an Ethernet address is given, can be solved by
using RARP(Reverse Address Resolution protocol)
The newly booted workstation is allowed to broadcast its Ethernet address. The RARP server
looks at this request. Then it looks up the Ethernet address in its configuration files and sends
back the corresponding IP address.
Using RARP is actually better than embedding an IP address in the memory image because it
allows the same image to be used on all machines.
If the IP address were buried inside the image, each workstation would need its own image.
The disadvantage of RARP is that it uses a destination address of all ls(limited broadcasting)
to reach the RARP server.
But such broadcasts are not forwarded by routers, so a RARP server is needed on each
network.
As the entire signal transferring is happening in space. Thus this type of communication is known as
space communication. The satellite does the functions of an antenna and the repeater together. If the
earth along with its ground stations is revolving and the satellite is stationery, the sending and
receiving earth stations and the satellite can be out of sync over time.
Therefore Geosynchronous satellites are used which move at same RPM as that of the earth in the
same direction.
So the relative position of the ground station with respect to the satellite never changes.
MAHARASHTRA STATEBOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Winter – 14 EXAMINATION
Subject Code: 17429 Model Answer Page27/ 27
Application of satellite:
Satellite television
digital cinema
satellite radio
satellite internet access
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Page 1 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Dedicated Links: Dedicated links guarantees that each connection can carry its own data load,
thus eliminating the traffic problems that can occur when links must be shared by multiple
devices
It is robust. If one link becomes unusable, it does not incapacitate the entire system
It is Secure. When every message travels along a dedicated line, only the intended recipient
sees it. Physical boundaries prevent other users from gaining access to messages
Point to Point Connection: Point-to-point links make fault identification and fault isolation
easy
iv) Give the names of various N/W connecting devices (Any two).
(Listing of any 2 control devices -1 Mark each)
Ans: N/W connecting device:
Repeater
Hub
Switch
Bridge
Router
Gateway
Modem
Page 2 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
5) Light weight
6) Greater immunity to tapping
7) Easily available
vii) Define „Protocol‟ with reference to computer network. What is the function of IP?
(Definition of protocol - 1 Mark, Function of IP - 1 Mark)
Ans: Protocol: - Protocol is set of rules and conventions. Sender and receiver in data communication
must agree on common set of rules before they can communicate with each other.
Protocol defines.
a) Syntax (what is to be communicated)
b) Semantics (how is it to be communicated
c) Timing (When it should be communicated)
Function of IP:
a. Addressing
b. Routing
c. Data encapsulation
d. Fragmentation & reassembly
Page 3 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
viii) List any two components which works at physical layer of OSI model.
(Listing of any 2 components – 1 Mark each)
Ans: Repeater
1) Hub
2) Network Interface card (NIC)
3) Cables
4) Connectors
Page 4 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Page 5 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
iii) Suppose you are going to implement a computer network in a small business mall. Which
topology will you use? Why?
(Determining the topology -2 Marks, Justification - 2 Marks)
STAR Topology
In star topology, each computer or node is connected to a central hub. This is more reliable than a
classical ring topology because a node failing will not bring down entire network. A bus topology
arguably is more reliable but it has poor performance.
Advantages:
1. Highly reliable
2. Adding new node is very easy
3. Failure of any node does not affect the network
4. Troubleshooting is very easy
Page 6 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
DESCRIPTION:
Application Servers: The application server often serves to connect database servers with the
end-user, thus acting as a kind of "middleware" that releases stored information requested by said
user. The server is usually responsible for properly decoding and recoding data and providing
security over connections.
Message Servers: These servers provide instant, real-time communication between users,
regardless of where a user may be. Message servers allow a wide variety of communication
methods, from simple forms such as text to more complex forms such as video, audio and
graphics.
Database Servers: These servers manage the database that is stored in that server using the SQL
database management system. A client request is sent in the form of an SQL query to the server.
That server in turn searches through the database for the requested information and sends the
results to the client.
Page 7 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Web Servers: Web servers provide access to the Internet through the HyperText Transfer
Protocol (HTTP). Files in a web server use HyperText Markup Language (HTML) to display
content on web browsers. A web server usually receives requests from a web browser and sends
back the requested HTML file and related graphic files.
5. Remote access: Set up remote access service on network operating system. Setup VPN (virtual
private network) on internet terminal services (TELNET). User can access files from remote
location. User can access centralized application or share files on LAN.
Page 8 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Page 9 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Page 10 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
4. Cables:
1. Co-axial Cable: It is made of two conductors that share a common axis. The center of the
cable is stiff solid copper wire or stranded wire encased in insulating plastic foam. The foam is
surrounded by the second conductor, a wire mesh tube which serves as a shield from EMI. A
tough insulating plastic tube forms the cover of the cable
2. Twisted Pair Cable: They are formed by twisting of two insulated copper wires. One or
more twisted pairs are combined within a common jacket. Twisting the copper wires reduces
Crosstalk.
Types:
i) Unshielded Twisted Pair Cable (UTP)
ii) Shielded Twisted Pair Cable (STP)
3. Fiber optic cable: It is made of a light-conducting glass or plastic core surrounded by more
glass called cladding, and tough outer sheath. The center core provides the light path or wave
guide while the cladding is composed of varying layers of reflective glass.
Page 11 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
f) Compare guided and unguided media used in computer network.
(Any 4 points – 1 Mark each)
Ans:
Installation is costly and time Installation needs less time and money
consuming
Wired media leads to discrete network Wireless media leads to continuous
topologies network topologies
Attenuation depends exponentially on Attenuation is proportional to square of
the distance the distance
Example: Twisted Pair cable, Coaxial Example: Radio, Infrared light,
cable, Fiber optic cable Microwave
Page 12 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
1. Peer to Peer networks do not have a central control system. There are no servers in peer
networks.
2. In this type of network users simply share disk space and resources, such as printers and
faxes.
3. Peer networks are organised into workgroups. Workgroup have very little security. There is
no central login process.
4. If the user has logged into one peer on the network he can use any resources on the network
that are not controlled by a specific password.
5. Access to individual resource can be controlled if the user who shared the resources requires a
password to access it.
6. Since there is on central security, the user will have to know individual password for each
secured shared resources he wishes to access.
The peer to peer networks are suitable/used for the following working conditions.
Page 13 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
1) Reliable : Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the functioning of rest of the
network.
2) Scalable: Its easy to increase the size of network by adding new components, without
disturbing existing architecture.
Page 14 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
1) Complexity of Design: One of the biggest drawback of hybrid topology is its design. Its
not easy to design this type of architecture and its a tough job for designers. Configuration and
installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These
hubs are different from usual hubs as they need to be intelligent enough to work with different
architectures and should be function even if a part of network is down.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a
lot of cables, cooling systems, sophisticate network devices, etc.
c) What is meant by subnet? How to use subnet masking to create two subnets?
(Explanation of subnet -2 Marks, Subnet masking explanation with any suitable example - 2
Marks)
Ans: A subnet is a logical grouping of connected network devices. Nodes on a subnet tend to be
located in close physical proximity to each other on a LAN.
Network designers employ subnets as a way to partition networks into logical segments for
greater ease of administration. When subnets are properly implemented, both the performance and
security of networks can be improved.
Page 15 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
In Internet Protocol (IP) networking, devices on a subnet share contiguous ranges of IP address
numbers. A mask (known as the subnet mask or network mask) defines the boundaries of an IP
subnet. The correspondence between subnet masks and IP address ranges follows defined
mathematical formulas. IT professionals use subnet calculators to map between masks and
addresses.
To calculate the number of subnets or nodes, use the formula (2n-2) where n = number of bits in
either field, and 2n represents 2 raised to the nth power. Multiplying the number of subnets by the
number of nodes available per subnet gives you the total number of nodes available for your class
and subnet mask. Also, note that although subnet masks with non-contiguous mask bits are
allowed, they are not recommended.
Example:
Hence
Subnet Address
number
1 140.179.64.0
2 140.179.128.0
The horizontal communication between the different layers is logical; there is no direct
communication between them. Information included in each protocol header by the
transmitting system is message that will be carried to the same protocol in the destination
system.
Page 16 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
For two computers to communicate over a network, the protocols used at each layer of the
OSI model in the transmitting system must be duplicated at the receiving system.
The packet travels up through the protocol stack and each successive header is stripped off by
the appropriate protocol and processed.
When the packet arrives as it destination, the process by which the headers are applied at the
source is respected in reverse.
The protocol operating at the various layers communicate horizontally with their counterparts
in the other system, as shown in below fig.
Vertical Communications
In addition to communicating horizontally with the same protocol in the other system, the
header information also enables each layer to communicate with the layer above and below it.
The headers applied by the different protocols implemented the specific functions carried out by
those protocols.
For Example: When a system receives a packets and passes it up through the protocol stack, the
data link layer protocol header includes afield that identifies which network-layer protocol the
system should use to process the packet.
Network –layer protocol header in tern specifies one of the transport-layer protocols and the
transport-layer protocol identifies the application for which the data is ultimately destined.
Page 17 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Vertical communication makes it possible for a computer to support multiple protocols at each
of the layers simultaneously.
Ans: Role of presentation layer in OSI model the presentation layer makes it sure that the information
is delivered in such a form that the receiving system will understand and use it.
The form and syntax (language) of the two communicating systems can be different e.g. one
system is using the ASCII code for file transfer and the other one user IBM’s EBCDIC.
Under such condition the presentation layer provider the “translation” from ASCII to EBCDIC
and vice versa.
Page 18 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
1. Some of the problem in transferring files from one system to the other are as follows:
4. FTP established two connections between the client and server. One is for data transfer and
the other is for the control information.
5. The fact that FTP separates control and data makes it very efficient.
6. The control connection uses simple rules of communication. Only one line of command or a
line of response is transferred at a time.
Page 19 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
7. But the data connection uses more complex rules due to the variety of data types being
transferred.
8. FTP uses port 21 for the control connection and port 20 for the data connection.
i. User interface
10. The Server has two components: the control process and data transfer process.
11. The control connection is maintained during the entire interactive FTP session. The data
connection is first opened, file is transferred and data connection is closed. This is closed.
This is done for transferring each file.
Control connection:
This connection is created in the same way as the other application programs
described earlier.
The IP uses minimize delay type services because this is an interactive connection
between a user and server.
Data Connection:
Page 20 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Data connection uses the port 20 at the site. This connection is opened when data
to be transferred is ready and it is closed when transfer of data is over.
Page 21 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
1. Empty Locations
2. Location containing the bytes which have been sent but not acknowledgement. These
bytes are kept in the buffer till an acknowledgement is received.
3. The locations containing the bytes to be sent by the sending TCP.
3. Bytes and segments:
Buffering is used to handle the difference between the speed of data transmission and
data consumption.
But only buffering is not enough. We need one more step before sending the data.
The IP layer, as a service provider for TCP, need to send data in the form of packets and
as a stream of bytes.
At the transport layer, TCP groups a number of bytes together into a packet called a
segment.
A header is added to each segment for the purpose of exercising control.
The segments are encapsulated in an IP datagram and then transmitted. The entire
operation is transparent to the receiving process.
The segments may be receiver out of order, lost or corrupted when it reaches the
receiving end.
4. Full duplex service:
TCP offers full duplex service where the data can flow in both the direction simultaneously.
Each TCP will then have a sending buffer and receiving buffer.
The TCP segments are sent both the directions.
5. Connection oriented service:
TCP is a connection oriented protocol. When process –I wants to communicate (send and
receive) with another process (process-2), the sequence of operations is as follows:
TCP of process -1 informs TCP of process -2 and gets its approval.
TCP of process -1 and TCP of process -2 exchange data in both the directions.
After completing the data exchange, when buffers on both sides are empty, the two TCPs
destroy their buffers.
Page 22 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
1. The type of connection in TCP is not physical, it is virtual. The TCP segment is encapsulated
in an IP datagram and can be sent out of order.
2. These segments can get lost or corrupted and have to be resent.
3. Each segment may take a different path to reach the destination.
6. Reliable services:
TCP is a reliable transport protocol. It uses an acknowledgment mechanism for checking
the safe and sound arrival of data.
7. Process to process communication:
The TCP user port numbers a transport layer addresses.
Show some well known port number used by TCP.
Note that if an application can use both UDP and TCP, the same port number is assigned to this
application.
Ans:
IPv4 IPv6
Source and destination addresses are Source and destination addresses are 128
32 bits (4 bytes) in length. bits (16 bytes) in length. For more
information.
Uses broadcast addresses to send There are no IPv6 broadcast addresses.
traffic to all nodes on a subnet. Instead, multicast scoped addresses are
used.
Fragmentation is supported at Fragmentation is not supported at routers.
originating hosts and intermediate It is only supported at the originating host.
routers.
IP header includes a checksum. IP header does not include a checksum.
IP header includes options. All optional data is moved to IPv6
extension headers.
Page 23 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
IPSec support is optional. IPSec support is required in a full IPv6
implementation.
No identification of payload for QOS Payload identification for QOS handling
handling by routers is present within by routers is included in the IPv6 header
the IPv4 header. using the Flow Label field...
Addresses must be configured either Addresses can be automatically assigned
manually or through DHCP. using stateless address auto configuration,
assigned using DHCPv6, or manually
configured.
Uses host address (A) resource records Uses host address (AAAA) resource
in the Domain Name System (DNS) to records in the Domain Name System
map host names to IPv4 addresses. (DNS) to map host names to IPv6
addresses.
Ans: Assume that there is a call going on between two parties over a voice channel.
When the mobile unit moves out of coverage area of a particular cell site the reception becomes
weak.
The system will switch the call to a new cell site without interrupting the call or changing the
user. This procedure is called as the hand off procedure or handover procedure.
Page 24 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
A hard handoff is a handoff technique used with cellular networks that requires the user's
connection to be entirely broken with an existing base station before being switched to
another base station.
The hand off is known as soft handoff if the MS starts communication with a new base station
without stopping the communication with the older base station.
In many situations, instead of one level, a two level handoff procedure is used, in order to
provide a high opportunity for a successful handoff. A hand off can be delayed if on available
cell take the call.
4. Forced handoff :
A forced handoff is defined as the off which would normally occur but prevented from
happening or a handoff that should not occur but is forced to happen.
5. Queued handoff:
In the queued handoff process, the MTSO arranges the handoff requests in a queue instead of
rejecting them, if the new cell sites are busy.
Page 25 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs
are regulated by an Internet standards body (see sidebar). The second half of a MAC address
represents the serial number assigned to the adapter by the manufacturer.
Example,
00:A0:C9:14:C8:29
ii) IP Address:
(IP address Explanation -1 Mark, Example – 1 Mark)
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network interface
identification and location addressing. Its role has been characterized as follows: "A name
indicates what we seek. An address indicates where it is. A route indicates how to get there."
1. The IP address consists of two parts namely a network identifier and a host identifier.
2. All the computers on a particular subnet will have the same network identifier but different
host identifiers
3. The internet Assigned Number Authority (IANA) assigns network identifiers to avoid any
duplication of addresses.
4. An IPv4 address consists of two parts. The first part of the of the address, called the network
number, identifies a network on the internet; the remainder, called the host ID, identifies an
individual host on that network.
Classful Addressing:
The IPv4 addresses are classified into 5 types as follows:
1. Class A
2. Class B
Page 26 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
3. Class C
4. Class D
5. Class E
e) What are the services provided by the network layer of OSI model.
(Any 4 Services – 1 Mark each)
Ans: The services provided by the network layer of OSI model as follows
1. To route the signals through various channels to the other end.
2. To act as the network controller by deciding which route data should take.
3. To divide the outgoing messages into packets and to assemble incoming packets into
messages for the higher levels.
4. The network layer is responsible for the source-to-destination delivery of a packet, possibly
across multiple networks (links)
5. Logical addressing: The physical addressing implemented by the data link layer handles the
addressing problem locally. If a packet passes the network boundary, we need another
addressing system to help distinguish the source and destination systems. The network layer
adds a header to the packet coming from the upper layer that, among other things, includes
the logical addresses of the sender and receiver.
f) Describe in brief:
i) Backing up data
ii) File sharing
The process of data backup, data from computer system is copied from the disk to some other
medium for keeping it safe.
Such backups are important because it protects the data against any unpredictable, Accidental loss
of data due to system failure, computer viruses, or human error.
But taking a backup of individual user’s data separately is a time consuming and unorganized.
Hence in a network, the users first save their important data on the central server and then the
backup can be taken from the server itself.
Page 27 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
This reduces the time and stores the backup data at a signal place only. This makes the data
retrieval easy.
We can have two or three sets of the entire backup data. This help in the event of one or two sets
getting corrupt. The Duplication of backup data becomes easily possible due to centralization
storage.
The centralization back up procedures have become easy now a day due to the advanced
technology.
The operating system will provide tools required for data backups. For example windows NT
proves a tape backup program called as backup.
Some backup Policies are as follows:
1. Full Backup.
2. Incremental Backup.
3. Differential Backup.
File sharing is the primary feature of network. Due to use of networks the sharing of files
becomes easier.
File sharing requires a shared director or disk drive to which many users can access over the
network; more than one person can make changes to a file at the same time. They might both
making conflicting change simultaneously.
Hence most of software programs don’t have ability to allow multiple changes to a single file at
the same time to resolve this type of problem that might arise.
Page 28 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Network operating systems that perform file sharing also administer the security of these shared
files and what kind of access they have. For example: Some user might have permission to view
only certain shared files, while other have permission to edit or even delete certain shared files.
Advantages:
Disadvantages:
1. Conflicting problem arises.
2. Less secure if permission not set proper.
Bit stuffing:
Bit stuffing is the process of adding one extra 0 whenever five consecutive 1‟s in the data, so
that the receiver does not mistake the pattern 0111110 or a flag.
At sender side the bit is stuffed and at receiver side stuffed bit is removed. As shown in following
Page 29 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
For example
Stuffed Bit
b) In which circumstances star topology is preferred mostly. Name the centralized device used
in star topology. Give its two advantages over Hub.
(List of circumstances - 1 Mark, Name of device - 1 Mark, Any Two advantages- 2 Marks)
Ans: star topology is preferred under following circumstances
1) When centralized management of nodes is required
2) There are more chances of adding or removing nodes in the network.
3) When there is a need of robust network. If one link fail only that node is affected.
Switch is the centralized device used in star topology.
Switch has following advantages over HUB
1) Switch is point to point networking device because switch send data to only destination node
2) Switch is intelligent device because it understands MAC address.
Page 30 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
3)Switch works at Data link layer of OSI model, where as Hub works at Physical Layer of OSI
model.
4) Switch gives full speed to all connected node, where as Hub Distributes the speed to the all
connected nodes.
c) Describe OSI model with layer structure.
(Diagram - 1 Mark, Explanation - 3 Marks)
Ans: OSI model (open system interconnection) model was developed by ISO (international standard
organization)
Function of OSI model
1) It provides way to understand how internetwork operates.
2) It gives guideline for creating network standard.
OSI model has 7 layers as shown in the figure.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Datalink Layer
Physical Layer
OSI model has following 7 layers as Physical layer, data link layer, Network layer, Transport
layer, session layer, presentation layer, application layer.
1) Physical layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It deals with mechanical and electrical specifications of interface and transmission
medium. For transmission it defines procedures and functions that devices and transmission
medium has to perform.
Page 31 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
It is responsible for transmitting group of bits between the adjacent nodes. The group of bits is
called as frame. The network layer passes a data unit to the data link layer. Header and trailer is
added to the data unit by data link layer. This data unit is passed to the physical layer.
Data link layer is responsible for moving frames from one node to the next.
1) Framing
2) Physical addressing
3) Flow control
4) Error control
5) Media access control
6) Node to node delivery
3) Network layer:
It is responsible for routing the packets within the subnet i.e. from source to destination. It is
responsible for source e to destination delivery of individual packets across multiple networks.
It ensures that packet is delivered from point of origin to destination.
Page 32 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
4) Transport layer:
Responsibility of process to process delivery of message
Ensure that whole message arrives in order.
1) Service point addressing
2) Segmentation and reassembly
3) Connection control
4) Flow control: Flow control is performed end to end
5) Error control
5) Session layer:
Establishes, maintains, synchronizes the interaction among communication systems
It is responsible for dialog control and synchronization
1) Dialog control
2) Synchronization, session and sub session
3) Session closure
6) Presentation layer: It is concerned with syntax, semantics of information exchanged
between the two systems.
Functions: Translation, encryption, compression
7) Application layer: It enables user to access the network. It provides user interfaces and
support for services like email, remote file access.
Functions: network virtual terminal, file transfer access and management, mail services and
directory services
Page 33 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Local Login
When user log in to local time sharing system it is called local login. The keystrokes accepted by
terminal driver. Terminal driver passes the character to the operating system. Operating system, in
tern interprets the combination of character and invoke the desired application or utility.
Remote login
When user wants to access the application or utility located at the remote machine ,he or she
performs remote login. Here the telnet client and server program come into use.
The user sends the keystrokes to local operating system. local operating system accept is, but do
not interpret them. The characters are send to TELNET client. TELNET client transform the
character to a universal character set called Network Virtual Terminal Character and deliver them
to the local TCP/IP stack.
Page 34 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
As shown in above figure the command/text in NVT form travel through internet, and arrive at
TCP/IP stack of remote Machine. Here the characters are delivered to the operating system and
Passed to the TELNET server. Which changes the characters to the understandable characters by
the remote computer. However characters could not directly pass to the operating system because
remote operating system is not designed to receive characters from TELNET server. The solution
is to add piece of software called Pseudo- terminal driver, which pretends that characters are
coming from terminal. The operating system passes the characters to appropriate application
program.
e) Which different classes are used for IP addressing. Describe each in brief.
(Listing of classes - 1 Mark, Explanation - 3 Marks)
Ans: IP Address is classified into 5 types as
Class A
Class B
Class C
Class D
Class E
Page 35 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Class A format
In this 7bits are used for network field and 24 bits for host field.
Class A IP address range includes 1.0.0.0 to 127.255.255.255
Class B format
In this 14 bits are used for network field and 16 bits for host field.
Class B IP address range includes 128.0.0.0 to 191.255.255.255
Class C format
In this 21 bits are used for network field and 8 bits for host field.
Class C IP address range includes 192.0.0.0 to 223.255.255.255
Class D format
Page 36 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Class E format
2) Router
Router chooses the best path for packet forwarding.
Router read complex network address in packet.
It works at Network Layer of OSI model
Page 37 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Efficiently direct packets from one network to another, reducing excessive traffic.
Join neighboring or distant network
Connect dissimilar networks.
Prevent network bottlenecks by isolating portions of a network.
3) Hub
Hub connects all nodes in star topology. Hub is broadcasting device.
It sends packets to all nodes in the network.
It works at Physical Layer Of OSI model
4) Switch
Switch connects all nodes in star topology.
Switch is point to point networking device.
Switch sends packets only to destination node.
It works at Data link layer of OSI model
Transport Layer
Internet Layer
Page 38 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Page 39 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
6 Network layer supports only Network layer support both connection
connectionless service oriented and connection less service
8 TCP/IP model not clearly distinguish OSI model clearly distinguish between
between services, interface and services, interface and protocol.
protocols
Physical Layer
Page 40 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Datagram is variable length packet with two parts –header and data
ICMP
It is internet control message protocol.
It reports error and sends control messages.
Error reporting messages include – destination unreachable, source quench , time exceed,
parameter problem , redirection etc.
Query message includes –echo request and reply, time stamp request and reply, router
solicitation and advertisement. etc
UDP
UDP is user datagram protocol.
It is connectionless protocol because data is sent without establishing a connection between
sender and receiver before sending the data.
UDP is unreliable because data is delivered without acknowledgement.
UDP does not perform Auto retransmission.
UDP does not use flow control .
UDP has high transmission speed.
Page 41 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
TCP has low speed of transmission.
SLIP
SLIP is serial line internet protocol
SLIP does not perform error detection and correction.
SLIP does not provide any authentication.
SLIP is not approved internet standard.
SLIP supports only Internet protocol (IP)
SLIP supports static IP address assignment
PPP
PPP is point to point protocol.
PPP perform error detection
PPP provides authentication and security.
PPP is approved internet standard.
PPP supports IP and other protocols.
PPP supports Dynamic IP address assignment
SMTP
Page 42 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Advantages
1) Easy to use.
2) Easy and simple to expandability.
3) Easy to install and setup.
4) No requirement of wires
Page 43 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Disadvantage
1) The range of Wi-Fi is limited
2) Security is less in Wi-Fi connections as compared with others.
3) Wi-Fi connections are highly suspect able interruption by other devices which are operating
in close proximity.
ii) Bluetooth
Bluetooth is short range wireless technology.
Range of bluetooth is 10 meters.
Bluetooth Architeture define 2 types of networks.
1)piconet 2)scatternet
Piconet
It consist of 1 master node and 7 slave nodes.
Piconet have 8 active nodes(7+1) in the range of 10 meters.
There can be only 1 master station in each piconet.
Communication is between master and slave
Slave-slave communication is not possible.
Piconet can have 255 parked nodes, that can not take part in communication
There will be 7 slaves in active state and 255 nodes in parked state.
Fig :piconet
Page 44 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 14 EXAMINATION
Subject Code: 17429 Model Answer Subject Name: Computer Network
____________________________________________________________________________________________________
Scatter net
It is formed by combining various piconets.
Slave in one piconet can act as master in other piconet.
Such a node can receive message from the master in the first piconet and deliver the message
in second piconet.
Station can be member of two piconets.
Staion can not be master of two piconet.
Fig: Scatternet
Page 45 of 45
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Page 1 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Protocol defines.
a) Syntax (what is to be communicated)
b) Semantics (how is it to be communicated
c) Timing (When it should be communicated)
b) Peer: Peers are computer systems which are connected to each other via the Internet. Files
can be shared directly between systems on the network without the need of a central server. In
other words, each computer on a Peer to Peer network becomes a file server as well as a
client.
iii) List types of network topology. Name one device used in star topology.
(Network Topology- 1 Mark, Device Used- 1 Mark)
Ans:
Network Topology refers to layout of a network. How different nodes in a network are
connected to each other and how they communicate is determined by the network's topology.
Types of Network Topology
1. Mesh Topology
2. Bus Topology
3. Star Topology
4. Ring Topology
5. Tree Topology
6. Hybrid Topology
Device used in STAR Topology: Switch, Hub
Page 2 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Ans:
HUB: Hub is amplifying & splitting device. Hub contains multiple ports & is a common
connection point for connecting all segments of a LAN. When a packet arrives on a port, it is
forwarded to rest of ports so that it can be sent to all other nodes in the network.
Types of Hub:-
1. Active Hub
2. Passive Hub
3. Intelligent hub
vi) Name the layer which is associated with the transmission media.
(Naming the Layer - 2 Marks)
Ans:
Physical Layer: Transmission media operate at Layer 1 (Physical Layer) of the OSI model, it
encompass the physical entity and describe the types of medium on which voice and data can
travel.
Physical Layer is associated in two ways with transmission medium.
1. Guided(wired) media
E.g. Coaxial Cable, Fiber-optic Cable
Page 3 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Ans:
Connection-oriented protocol service is sometimes called a "reliable" network service,
because it guarantees that data will arrive in the proper sequence.
Connection-oriented describes a means of transmitting data in which the devices at the end
points use a preliminary protocol to establish an end-to-end connection before any data is sent.
Example: Transmission Control Protocol (TCP) is a connection-oriented protocol.
(i) State the reason for implementing a network these key resources often shared on a
network
(Reason -1 Mark, Any 3 key Resources - 1 Mark each)
Ans:
Page 4 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
(ii) Draw with neat labelled sketch of star networks having three computers in two stars and
two computers in one star.
1. Serial Line Protocol is an encapsulation of the Internet Protocol designed to work over
serial ports and modem connections.
2. This packet-framing protocol and defines a sequence of bytes that frame IP packets on a
serial line.
3. SLIP is commonly used for point-to-point serial connections running TCP/IP
4. It is designed to transmit signals over a serial connection and has very low overhead.
Page 5 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
a) If you have two computers to connect to a network located over a long distance over 100
KM, which type of transmission you will used? Justify your answer by describing its
features.
(Naming Transmission medium - 2 Marks, Features - 2 Marks)
Ans:
You can connect two computers over the Internet (Wide Area Network)
Features of Internet:
1. World Wide Web.
2. E-mail.
3. News
4. Telnet
5. File Transfer Protocol (FTP)
6. Internet Relay Chat (IRC)
The World Wide Web
E-mail
Electronic mail (e-mail) is the most popular reason people use the Internet.
To create, send, and receive e-mail messages you need an e-mail program and an
account on an Internet mail server with a domain name.
To use e-mail, a user must have an e-mail address, which you create by adding your
user name to the e-mail create by adding your user name to the e-mail server’s domain
name, as in [email protected].
News:
One Internet based service called news, includes tens of thousands of newsgroups.
Each newsgroup hosts discussions on a specific topic. A newsgroup a some indicated its
user’s special topic of interest, such as Food cake.
To participate in a newsgroup, you need a news-reader program that lets you read
articles that have been posted on a news server. You can post articles for others to read and
respond to.
Page 6 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Telnet
Telnet is a specialized service that lets you use one computer to access the contents of
another computer a telnet host.
A telnet program creates a “Window” into the host so you can access files, issue
commands, and exchange data.
Telnet is widely used by libraries to allow visitors to look up information, find articles
and so on.
Page 7 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Vertical Communications
In addition to communicating horizontally with the same protocol in the other system, the
header information also enables each layer to communicate with the layer above and below it.
The headers applied by the different protocols implemented the specific functions carried
out by those protocols.
For Example: When a system receives a packets and passes it up through the protocol
stack, the data link layer protocol header includes afield that identifies which network-layer
protocol the system should use to process the packet.
Network –layer protocol header in tern specifies one of the transport-layer protocols and
the transport-layer protocol identifies the application for which the data is ultimately destined.
Vertical communication makes it possible for a computer to support multiple protocols at
each of the layers simultaneously.
Page 8 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
c) You are said to establish a small network with minimum cost at least ten computer and also
necessary to use the centralized database. Which type of network and topology you will
prefer in this situation? Justify your answer.
(Identification of type of network – 1 Mark, its justification – 1 Mark, Identification of
Topology – 1Mark, its justification -1 Mark)
Ans:
Type of Network- Client-Server Network.
Justification- For the mention situation client Server network is preferred because centralized
database can be maintained at server.
Type of Topology- Bus Topology.
Justification -For the mention situation Bus Topology is preferred because cost is less due to
short cable length, no need of HUB, simple wiring layout. Bus topology can support 10
computers and additional nodes can be easily added to existing bus network
Page 9 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Page 10 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
"physical addresses") are embedded into the network hardware during the manufacturing
process, or stored in firmware, and designed to not be modified.
MAC addresses are 12-digit (6 bytes or 48 bits) hexadecimal numbers. By convention, they
are usually written in one of the following three formats:
a. MM:MM:MM:SS:SS:SS
b. MM-MM-MM-SS-SS-SS
c. MMM.MMM.SSS.SSS
The leftmost 6 digits (24 bits) called a "prefix" is associated with the adapter manufacturer
Page 11 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
i. Physical area
ii. Installation cost
iii. Bandwidth
iv. Transmission media
(1Mark for each Parameter)
Ans:
Page 12 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
b) State two advantages of ring topology. Describe token. State whether ring topology is
broadcast or point to point network.
(Any two Advantages - 2 Marks, definition of token - 1 Mark; ring topology is broadcast or
point to point - 1 Mark)
Ans:
c) What are the different IP address classes? Explain any one in brief.
(Enlisting IP classes -1 Mark & Any one class Explanation - 3Marks)
Ans:
Different IP classes are:
i) Class A
ii) Class B
iii) Class C
iv) Class D
v) Class E
i)Class A
Class A addresses are assigned to networks with a very large number of hosts. The high-order
bit in a class A address is always set to zero. The next seven bits complete the network ID.
The remaining 24 bits (the last three octets) represent the host ID. This allows for 126
Page 13 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
networks and 16,777,214 hosts per network. Figure illustrates the structure of class A
addresses.
ii) Class B
Class B addresses are assigned to medium-sized to large-sized networks. The two high-order
bits in a class B address are always set to binary 1 0. The next 14 bits complete thenetwork
ID. The remaining 16 bits represent the host ID. This allows for 16,384 networks and 65,534
hosts per network. Figure illustrates the structure of class B addresses.
iii) Class C
Class C addresses are used for small networks. The three high-order bits in a class C address
are always set to binary 1 1 0. The next 21 bits complete the network ID. The remaining 8 bits
(last octet) represent the host ID. This allows for 2,097,152 networks and 254 hosts per
network. Figure illustrates the structure of class C addresses.
iv) Class D
Class D addresses are reserved for IP multicast addresses. The four high-order bits in a class
D address are always set to binary 1 1 1 0. The remaining bits are for the address that
Page 14 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
interested hosts recognize. Microsoft supports class D addresses for applications to multicast
data to multicast-capable hosts on an internetwork.
v) Class E
Class E is an experimental address that is reserved for future use. The high-order bits in a
class E address are set to 1111.
Ans:
Page 15 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Ans:
ARP RARP
ARP converts an Internet Protocol address to RARP converts Ethernet MAC address to IP
its physical network address (MAC). address.
Local host maintain the ARP Table. A RARP server maintain the RARP table.
Ans:
Criteria to be considered:
1. Type of medium.
2. No of conductors/connectors.
3. Flexibility.
4. Durability.
5. Bandwidth.
6. Reliability of connection
7. Required speed 8. Distance
9. Ease of installation and maintenance access
10. Technical expertise required to install and utilize
11. Resistance to internal EMI, cross talk of parallel wires
12. Resistance to external EMI outside the cable.
13. Attenuation characteristics
14. Cost
Page 16 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Ans:
Also called as bounded or wired media Also called as unbounded or wireless media
Point to point connection i.e. signal travelling Used for radio broadcasting in all directions
is directed i.e. signal travelling is undirected
Transport signal in electric current or light/ Transport signal in the form of
beam electromagnetic waves
Unidirectional, not broadcast Broadcast
Installation is costly and time consuming Installation needs less time and money
Wired media leads to discrete network Wireless media leads to continuous network
topologies topologies
Attenuation depends exponentially on the Attenuation is proportional to square of the
distance distance
Example: Twisted pair cable, coaxial cable, Example: Radio and Infrared Signals.
optical fiber cable
b) In a small agency, there are five PCs in the network. Cost is an issue and the company
would prefer not to dedicate an individuals time to maintain a network. However the
agency is also concerned about keeping its data safe and the users are not sophisticated
computer users. In what ways is a peer to peer network appropriate for the company? In
what ways it is inappropriate?
(Reasons for appropriate - 2 Marks & Reasons for Inappropriate - 2 Marks)
Ans:
Page 17 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
i) P2P is more reliable as central dependency is eliminated. Failure of one peer doesn’t affect
the functioning of other peers.
ii) There is no need for full-time System Administrator. Every user is the administrator of his
machine. User can control their shared resources.
iii) The over-all cost of building and maintaining this type of network is comparatively very
less.
iv) It does not run efficient if you have many computers, it is best to used two to eight
computers..
A peer to peer to peer network appropriate due to following reasons:
i) Security in this system is very less viruses, spywares, Trojans, etc malwares can easily
transmitted over this P-2-P architecture.
ii) In this network, the whole system is decentralized thus it is difficult to administer. That is
one person cannot determine the whole accessibility setting of whole network.
Ans:
SATELLITE COMMUNICATION:
In satellite communication, signal transferring between the sender and receiver is done with
the help of satellite. In this process, the signal which is basically a beam of modulated
microwaves is sent towards the satellite called UPLINK (6 Ghz). Then the satellite amplifies
the signal and sent it back to the receiver’s antenna present on the earth’s surface called as
DOWNLINK (4Ghz), as shown in the diagram given
Page 18 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
As the entire signal transferring is happening in space. Thus this type of communication is
known as space communication. The satellite does the functions of an antenna and the
repeater together. If the earth along with its ground stations is revolving and the satellite is
stationery, the sending and receiving earth stations and the satellite can be out of sync over
time.
Therefore Geosynchronous satellites are used which move at same RPM as that of the earth in
the same direction.
So the relative position of the ground station with respect to the satellite never changes.
However 3 satellites are needed to cover earth’s surface entirely.
Page 19 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Page 20 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
e) Which of the following TCP/IP transport layers is faster? Justify your answer:
i. TCP
ii. IP
iii. UDP
(Explanation of TCP - 2Marks, IP - 1Mark, UDP - 1Mark)
Ans:
TCP
TCP is transmission control protocol.
It is connection oriented protocol because connection must be establish prior to
transmission of data.
TCP is reliable protocol because data is delivered with acknowledgement.
TCP perform Auto Retransmission if the data is lost.
TCP use flow control.
TCP has low speed of transmission.
Features of TCP are: connection oriented, point to point communication, support duplex
mode.
IP:
IP is internet Protocol.
It is unreliable protocol because it does not provide any error control and flow control.
Packets in IP are called “Datagram”
Datagram is variable length packet with two parts –header and data.
Features of IP are encapsulation, addressing, routing, fragmentation, protocol
identification.
UDP:
UDP is user datagram protocol.
It is connectionless protocol because data is sent without establishing a connection
between sender and receiver before sending the data.
UDP is unreliable because data is delivered without acknowledgement.
UDP does not perform Auto retransmission.
UDP does not use flow control.
UDP has high transmission speed.
Page 21 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Ans:
i) Number of users 50
Client-Server Network
ii) Data and resources need to be restricted
Client-Server Network
Page 22 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Page 23 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Page 24 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
c) State any two advantages of bus topology .Explain whether adding more computers in
bus topology affects performance of network.
(Any Two Advantage – 2 Marks Explanations – 2 Marks)
Ans:
In bus topologies, all computers are connected to a single cable or "trunk or backbone", by a
transceiver either directly or by using a short drop cable. All ends of the cable must be
terminated, that is plugged into a device such as a computer or terminator. Most bus
topologies use coax cables. The number of computers on a bus network will affect network
performance, since only one computer at a time can send data, the more computers you have
on the network the more computers there will be waiting send data.
d) What is meant by file sharing and printer sharing? How this can be achieved?
(Explanation - 2Marks Each)
Ans:
File sharing:
File sharing is the primary feature of network. Due to use of networks, the sharing of files
becomes easier. File sharing requires a shared directory or disk drive to which many users can
access over the network. When many users are accessing the same file on the network, more
than one person can make changes to a file at the same time. They might both making
conflicting changes simultaneously.
Page 25 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Printer sharing:
Printer sharing can share costly & higher quality printers. Printer sharing can be done in
several different ways on network. The most common way is to use printer queues on server.
The printer queue holds print job until any currently running print jobs are finished & then
automatically send the waiting jobs to the printer i.e. printer connected to server. Another way
to share printer on a network is that each workstations accesses the printer directly.
Ans :
It is limited in its ability to queue messages at the receiving end, it is usually used with one
of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and
download them periodically from the server
IPv4 IPv6
Source and destination addresses are 32 Source and destination addresses are 128
bits (4 bytes)in length. bits(16 bytes) in length.
Page 26 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
extension headers.
Ans:
UDP TCP
Complexity UDP is less complex TCP is more complex
Connection UDP is connection less protocol TCP is connection oriented
protocol
Reliability It provides unreliable delivery It provides reliable delivery of
of messages messages
Page 27 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
relationship.
Which layer they exist Transport layer Transport layer
Flow controlling UCP has no flow control TCP has flow control
Overhead Overhead is very low Overhead is low
Which is powerful UDP is less powerful TCP is more powerful.
b) Describe gateways. State the situations under which gateways are necessary in the
network.
(Explanations – 2 Marks, Diagram – 2 Marks, situation explanation - 4 Marks)
Ans:
A gateway is a node (router) in a computer network, a key stopping point for data on its way
to or from other networks. Using gateways, we are able to communicate and send data back
and forth. The Internet wouldn't be any use to us without gateways (as well as a lot of other
hardware and software).
In a workplace, the gateway is the computer that routes traffic from a workstation to the
outside network that is serving up the Web pages. For basic Internet connections at home, the
gateway is the Internet Service Provider that gives you access to the entire Internet.
Gateway operates at all 7 layers of the OSI model. It is a device, which connects two
different dissimilar networks which have same function of communication. Situation where
gateways are necessary for different network like Ethernet, Token Ring, and FDDI etc. It can
communicate if they are using same protocol for communication like TCP/IP and if they are
using different protocol from a gateway can also forward packet across different n/ws that
may also use different protocol.
Page 28 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Eg: if n/w A is a Token Ring network using TCP/IP & network B is a Novell Network, a
gateway can relay frames between two.
This means that a gateway is not only used for similar protocol, but also used between
different protocols. In certain situations the only changes required are to the frame header. In
other cases, the gateway must take case of different frame sizes, data rates, format,
acknowledgement schemes, and priority schemes tec.
Page 29 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
c) Draw the adjacent layers in DLL in OSI reference model and describe the major
functions and responsibilities of DLL .Describe two sublayers of DLL.
(Diagram – 2 Marks, Function and responsibility – 2 Marks, Each Sub layer – 2 Marks
each)
Ans:
Page 30 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER-15 EXAMINATION
Model Answer
Data link layer is responsible for transmitting group of bits between the adjacent nodes.
The group of bits is called as frame. The network layer passes a data unit to the data link
layer. Header and trailer is added to the data unit by data link layer. This data unit is passed to
the physical layer. Data link layer is responsible for moving frames from one node to the next.
Link establishment and termination: establishes and terminates the logical link between
two nodes.
Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are
available.
Frame sequencing: transmits/receives frames sequentially.
Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers
from errors that occur in the physical layer by retransmitting non-acknowledged frames and
handling duplicate frame receipt.
Frame delimiting: creates and recognizes frame boundaries.
Frame error checking: checks received frames for integrity.
Media access management: determines when the node "has the right" to use the physical
medium.
Sublayers of Data Link layer:
1) Logical link control sub layer
It performs functions in the upper portion of the Data Link layer, such as flow control and
management of connection errors.
LLC supports the following three types of connections for transmitting data:
1) Unacknowledged connectionless service: does not perform reliability checks or maintain a
connection, very fast, most commonly used
2) Connection oriented service: once the connection is established, blocks of data can be
transferred between nodes until one of the node terminates the connection.
3) Acknowledged connectionless service provides a mechanism through which individual frames
can be acknowledged.
Page 31 of 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 1/ 25
Q.1.
c) Define the term ‘Topology’. List the names of any two network topologies.
(Definition- 1 Mark, Listing – 1 Mark)
Topology: A topology is a usually “Schematic description of the arrangement of a network
including its nodes and connecting lines (links).
OR
The way in which computers are connected in a network is called as topology.
OR
It is physical interconnection between various elements on computer network such as links
& nodes.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 2/ 25
Types:
1. Bus
2. Ring
3. Star
4. Mesh
5. Tree
6. Hybrid
d) State whether the bus is active or passive network. Justify your answer.
( 2 Marks)
Bus is a passive network.
The bus topology is usually used when a network installation is small, simple or
temporary . In bus network, the cable is just one or more wires , with no active electronics
to amplify the signal or pass it along from computer to computer . This makes the bus a
passive network.
or
In the bus topology the major component is the backbone cable. The communication
takes place through it and this backbone does not do any amplification or correction of
signals passed through that’s why bus can be called as passive network.
1) Military applications
2) Space applications
3) Cable television
4) Telephone
5) Computer networking
6) Medical applications
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 3/ 25
Disadvantages:
1. Security concerns: One of the major drawback of computer network is the security issues
that are involved.
2. Virus and malware: Viruses can spread on a network easily because of the inter-
connectivity of workstations.
3. Lack of robustness: If the main file server of a computer network breaks down , the entire
system becomes useless.
4. Needs an efficient handler: The technical skills and knowledge required to operate and
administer a computer network.
b) Describe Tree Topology with neat diagram. State its advantages. (any two)
(Diagram- 1.5 Marks, Explanation -1.5 Marks, two advantages- 1 Mark)
Tree Topology: A tree topology is variation of star. As in a star, nodes in a tree are linked
to a central hub head end that controls the traffic to a network.
However, not every computer plugs into the central hub, majority of them are connected to
a secondary hub which in turn is connected to the central hub as shown in fig.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 4/ 25
The central hub in the tree is active hub which contains repeater. The repeater amplifies the
signal & increase the distance a signal can travel. The secondary hubs may be active or
passive. A passive hub provides a simple physical connection between the attached devices.
Advantages:
1. Supported by several hardware and software venders.
2. It allows more devices to be attached to a single central hub and can therefore increases the
distance a signal can travel between devices.
3. It allows the network to isolate and prioritize communication from different computers i.e.
the computers attached to one secondary hub can be given priority over the computers
attached to another secondary hub.
c) You are asked to established a small network with minimum cost at least sight
computers. Also it is necessary to use centralized database. Which type of network
topology you will use? Justify your answer.
(Type of network- 1 Marks, Type of topology -1 Mark, Justification -2 Marks)
Due to necessity of centralized data base, we have to use the Client-Server network.
As the network is small & low cost, we can use the bus topology.
The bus topology has the following advantages:
1. Low cost
2. Easy control.
3. It is easy to set-up and extend bus network.
4. Cable length required for this topology is the least compared to other networks.
5. Linear Bus network is mostly used in small networks. Good for LAN.
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 5/ 25
PAN: A PAN is personal area network is used for communication among computer devices
close to one’s person. Wireless networking or Bluetooth technologies are the some examples
of PAN. The communication network established for the purpose of connecting computer
devices of personal use is known as the PAN.
CAN: CAN is a Campus Area Network is used to connect buildings across campuses of
colleges or Universities. A CAN is actually a type of LAN. It is larger than a LAN but
smaller than MAN. CAN is a network that connects two or more LANs but that is limited to a
specific and contiguous geographical area such as a college campus, industrial complex or
military base.
Advantages: 1. CAN is economical.
2. CAN is simple and easy to implement.
3. Helpful for universities & corporate organization to work from any block and receive the
same speed of data together.
LAN: LAN is local area network. LAN is privately-owned networks covering a small
geographic area(less than 1 km), like a home, office, building or group of buildings. LAN
transmits data with a speed of several megabits per second.
Advantages:
1. The reliability of network is high because the failure of the computer in the network does not
affect the functioning for other computers.
2. Addition of new computer to network is easy.
3. High rate of data transmission is possible.
4. Loss expensive to install.
MAN: A Metropolitan Area Network (MAN) is a large computer network that spans a
metropolitan area or campus. A MAN typically covers an area up to 10 kms (city). The best
example of MAN is the cable Television network, available in many cities. For an
organization, the common use of a MAN is to extend their LAN connectivity between
buildings/offices that are within the same city or urban area (hence the name Metropolitan
Area Network). The organization can pass their Ethernet frames to the service provider
MAN; the service provider will carry their frames across the MAN; and then deliver the
frames to the destination site. From the customer's point of view, the MAN looks like one big
(long) Ethernet link between their offices. The different sites could belong to the same IP
subnet, and from the customer's viewpoint, no routing is required between their sites.
Advantages: 1. MAN spans large geographical area than LAN.
2. MAN falls in between the LAN and WAN therefore, increases the efficiency at handling
data.
WAN: WAN is wide area network. WAN is a long-distance communication network that
covers a wide geographic area, such as state or country. The most common example is
internet. A WAN provides long-distance transmission of data, voice, image and video
information over larger geographical areas that may comprise a country or even whole world.
Advantages: 1. WAN can connect the computer to a wider area geographically.
2. WAN shares software & resources with connecting workstations.
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 6/ 25
Each computer is responsible for accessing & maintaining its own security & resources. In
Peer-to- Peer network every computer can function both as client & server. In this type of
network user simply share disk space & resources.
Advantages: 1. No extra investment in server hardware & software is required.
2. Easy setup.
3. No network administrator required.
Disadvantages: 1. Additional load due to sharing of resources.
2. Lack of central organization, which can make data hard to find.
3. Weak security.
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 7/ 25
b) Enlist essential components required to design computer network. Describe any one in
brief.
(1 mark for list, 1 mark for diagram, 2 marks for description, any other component
can be considered)
The components of computer network are:
Hub
Router
Modem
Bridge
Switches
Network Interface Card
Cables and connectors
Crimping tool
LAN tester
Computers
Gateways
Explanation:
1) HUB: Hub is a connecting device; it is also known as multiport repeater.
It is normally used for connecting stations in a physical star topology
All networks require a central location to bring media segments together.
These central locations are called hubs. A hub organizes the cables and relays signals to the
other media segments. There are three main types of hubs:
1) Passive
2) Active
3) Intelligent
Passive Hubs: A passive hubs simply combines the signals of a network segments. There is
no signal processing or regeneration. A passive hub reduces the cabling distance by half
because it does not boost the signals and in fact absorbs some of the signal. With the passive
hub each computer receives the signal sent from all the other computers connected to the hub.
Active hubs: They are like passive hubs but have electronic components for regeneration and
amplification of signals. by using active hubs the distance between devices can be increased.
The main drawback of active hubs is that the amplify noise along with the signals. They are
also much expensive than passive hubs.
Intelligent hubs: in addition to signal regeneration, intelligent hubs perform some network
management and intelligent path selection. One advantage to this is that all transmission
media segment can be connected permanently because each segment will be used only when
a signal is sent to a device using that segment.
Node 1 Node 2
HUB
Node 3 Node 4
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 8/ 25
2) ROUTER: Router is a device that connects 2 or more networks. It consist of hardware and
software .hardware includes the physical interfaces to the various networks in the
internetwork. Software in a router is OS and routing protocols management software.
1) Router use logical and physical addressing to connect two or more logically separate
networks.
2) They accomplish this connection by organizing the large network into logical network
called subnets.
3) Each of the subnet is given a logical address. This allows the network to be separate but
still access to each other and exchange data.
4) Data is grouped into packets. Each packet has physical device address and logical network
address.
Modem Modem
(DCE) (DCE)
Telephone DTE
DTE
4) Switch: A switch is a small hardware device that joins multiple computers together within
one Local Area Network (LAN). Network switches operate at Data Link Layer of the OSI
model. A switch is device that provides a central connection point for cables from
workstations, servers and peripherals.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 9/ 25
5) Bridge: It is a device which connects two or more segment of a network. Use in DLL. If only
forwards the packet which are for other.
6) Gateway: It is a device which connects two different dissimilar networks which has similar
function of communication. It is also called as protocol convertor. It works in all layers of
OSI model.
As the entire signal transferring is happening in space. Thus this type of communication is
known as space communication. The satellite does the functions of an antenna and the
repeater together. If the earth along with its ground stations is revolving and the satellite is
stationery, the sending and receiving earth stations and the satellite can be out of sync over
time.
Therefore Geosynchronous satellites are used which move at same RPM as that of the earth
in the same direction.
So the relative position of the ground station with respect to the satellite never changes.
However 3 satellites are needed to cover earth’s surface entirely.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 10/ 25
d) What is the frequency band used for cellular telephony? How a mobile call is
transmitted and received?
(Explanation of cellular telephony – 2 Marks, Explanation of mobile call transmission &
reception – 2 Marks)
What is the frequency band used for cellular telephony? How a mobile call is transmitted and
received.
Analog transmission is used for cellular telephony. Frequency modulation is used for
communication between the mobile phone and cell office. Two frequency bands are allocated
for this purpose. One band of them is for the communication that is initiated by mobile phone
& the other band for the land phone. Each channel requires a full-duplex dialog. For
preventing interference, adjacent channels are rarely allocated; some of them are also
required for control purposes.
This reduces the number of channels available for each cell. The same frequency band can be
used for multiple non-adjacent cells as shown in fig.
Calls using Mobile phones:
Call is made from the mobile phone by entering 7-, 8-, or 10-digit phone number; the mobile
phone itself scans the band & seeks a channel for setting up the call. After seeking, it sends
this number to the closest cell office, which in turn, sends it to the CTO. If the called party is
available, CTO lets MTSO (mobile telephone switching office) know. At this point, MTSO
allocates an empty voice channel to the cell to establish the connection. The mobile phone
adjust its tuning to the new channel & the dialog begins. When a land phone places a call to a
mobile phone, the telephone central office sends the number to the MTSO. The MTSO
performs a lookup to see where the mobile phone is currently placed by sending appropriate
query signal to all the cells. This process is known paging. The cell where the mobile phone
is currently located responds to the MTSO. Incoming calls work differently. To start with idle
phone is continuously listen to paging channel to detect messages at directed at them. The
MTSO then transmit the incoming call signal to that mobile phone & when the mobile phone
is answered, the MTSO assigns a voice channel to the call, thus enabling the conversation.
e) State any four advantages of server based network over peer to peer network.
(Each advantage -1 Mark, any four advantages)
1. Server based network has Strong central security over peer to peer network.
2. Sever based network has better performance for large number of users than Peer- to –Peer
network.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 11/ 25
f) Draw the constructional sketch of co-axial cable. Describe any three characteristics of
co-axial cable.
( Sketch -2 Marks, Any three characteristics- 2 Marks)
Co-axial cable:
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 12/ 25
b) State any two advantages of ring topology, define token. State whether ring topology
is broadcast or point to point network.
(Advantages 2 marks, definition of token 1 mark; ring topology is broadcast or point
to point 1 mark)
Advantages of Ring Topology:
1) Here, since the system provides point to point flow of data i.e. the data is moving in
one direction from one computer to another i.e. active topology, hence no collision occurs
in the system.
2) Cable faults are easily identified.
3) Dual loop rings can be easily effective.
4) Packet or data delivery is guaranteed.
5) Every computer is having equal priority.
What is Token?
Token is a special three byte frame that travels around the ring network.
It can flow clockwise or anticlockwise.
Ring topology is a point to point network.
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
OSI model has following 7 layers as Physical layer, data link layer, Network layer,
Transport layer, session layer, presentation layer, application layer.
1) Physical layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It deals with mechanical and electrical specifications of interface and
transmission medium. For transmission it defines procedures and functions that devices
and transmission medium has to perform.
2) Data link layer:
It is responsible for transmitting group of bits between the adjacent nodes. The group
of bits is called as frame. The network layer passes a data unit to the data link layer.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 13/ 25
Header and trailer is added to the data unit by data link layer. This data unit is passed to
the physical layer.
Data link layer is responsible for moving frames from one node
to the next. Functions of data link layer are:
1) Framing
2) Physical addressing
3) Flow control
4) Error control
5) Media access control
6) Node to node delivery
3) Network layer:
It is responsible for routing the packets within the subnet i.e. from source to
destination. It is responsible for source to destination delivery of individual packets
across multiple networks. It ensures that packet is delivered from point of origin to
destination.
Functions of network layer:
1) Logical addressing
2) Routing.
3) Congestion control
4) Accounting and billing
5) Address transformation
6) Source host to destination host error free delivery of packet.
4) Transport layer:
Responsibility of process to process delivery of message
Ensure that whole message arrives in order.
Functions of Transport Layer:
1) Service point addressing
2) Segmentation and reassembly
3) Connection control
4) Flow control: Flow control is performed end to end
5) Error control
5) Session layer:
Establishes, maintains, synchronizes the interaction among communication systems
It is responsible for dialog control and synchronization
Functions of Session Layer
1) Dialog control
2) Synchronization, session and sub session
3) Session closure
7) Application layer: It enables user to access the network. It provides user interfaces and
support for services like email, remote file access.
Functions: network virtual terminal, file transfer access and management, mail services
and directory services
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 14/ 25
Each layer in the layered architecture provides service to the layers which are directly above
and below it. The outgoing information will travel down through the layers to the lowest
layer. While moving down on the source machine, it acquires all the control information
which is required to reach the destination machine. The control information is in the form of
headers and footers which surrounds the data received from the layer above. This process of
adding headers and footers to the data is called as data encapsulation. The headers and footers
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 15/ 25
contain control information in the individual fields. It is used to make message packet reach
the destination. The headers and footers form the envelope which carries the message to the
desired destination.
1) Class A
Class A addresses are assigned to networks with a very large number of hosts. The high-
order bit in a class A address is always set to zero. The next seven bits complete the
network ID. The remaining 24 bits (the last three octets) represent the host ID. This
allows for 126 networks and 16,777,214 hosts per network. Figure illustrates the structure
of class A addresses.
2) Class B
Class B addresses are assigned to medium-sized to large-sized networks. The two high-
order bits in a class B address are always set to binary 1 0. The next 14 bits complete the
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 16/ 25
network ID. The remaining 16 bits represent the host ID. This allows for 16,384 networks
and 65,534 hosts per network. Figure illustrates the structure of class B addresses.
3)Class C
Class C addresses are used for small networks. The three high-order bits in a class C
address are always set to binary 1 1 0. The next 21 bits complete the network ID. The
remaining 8 bits (last octet) represent the host ID. This allows for 2,097,152 networks and
254 hosts per network. Figure illustrates the structure of class C addresses.
4) Class D
Class D addresses are reserved for IP multicast addresses. The four high-order bits in a
class D address are always set to binary 1 1 1 0. The remaining bits are for the address
that interested hosts recognize. Microsoft supports class D addresses for applications to
multicast data to multicast-capable hosts on an internetwork.
5) Class E
Class E is an experimental address that is reserved for future use. The high-order bits in a
class E address are set to 1111.
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 17/ 25
IPv4 IPv6
1. Source and destination addressesare32 1. Source and destination addresses are
bits (4 bytes)in length. 128 bits(16 bytes)in length.
2. Uses broadcast addresses to send traffic 2. There arenoIPv6 broadcast addresses.
to all nodes on a subnet. Instead, multicast scoped addresses are
used.
3. Fragmentation is supported at 3. Fragmentation is not supported at
Originating hosts and intermediate routers. routers. It is only supported at the
4.IP header include a checksum. originatinghost.
4. .IP header does not include a checksum.
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 18/ 25
What is Bluetooth ?
1. A cable-replacement technology that can be used to connect almost any device to any
other device
2. Radio interface enabling electronic devices to communicate wirelessly via short range (10
meters) ad-hoc radio connections
3. a standard for a small , cheap radio chip to be plugged into computers, printers, mobile
phones, etc.
4. Uses the radio range of 2.45 GHz
5. Theoretical maximum bandwidth is 1 Mb/s
6. Several Bluetooth devices can form an ad hoc network called a “piconet”
7. In a piconet one device acts as a master (sets frequency hopping behavior) and the others
as slaves
Example: A conference room with many laptops wishing to communicate with each other
Bluetooth Architecture
1) Piconet
Each piconet has one master and up to 7 simultaneous slaves
Master : device that initiates a data exchange.
Slave : device that responds to the master
All devices in a piconet hop together
Master gives slaves its clock and device ID
Non-piconet devices are in standby
M=Master P=Parked
S=Slave SB=Standby
2) Scatternet
• Linking of multiple piconets through the master or slave devices
• Bluetooth devices have point-to-multipoint capability to engage in Scatternet
communication.
• Devices can be slave in one piconet and master of another
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 19/ 25
3. Fragmentation and Reassembly: IP datagrams are passed down to the data link
layer for transmission on the local network. However, the maximum frame size of
each physical/data-link network using IP may be different. For this reason, IP
includes the ability to fragment IP datagrams into pieces so they can each be
carried on the local network. The receiving device uses the reassembly function to
recreate the whole IP datagram again.
e) What is token passing? List any four protocols associated with application layer of
OSI model.
(Token passing definition 1 mark, any 4 protocols of application layer 1 mark each)
Token passing is a method of passing the token in the ring network either clockwise or
anticlockwise.
Protocols associated with application layer of OSI model are as follows:
1. TELNET
2. File Transfer Protocol (FTP)
3. Simple Mail Transfer Protocol (SMTP)
4. Domain Name System (DNS)
5. Hypertext Transfer Protocol (HTTP)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 20/ 25
b) Describe the function of repeater. In which situation the repeater is used in the
network?
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 21/ 25
NIC:
NIC is a Network Interface Card which is a small card inserted or plugged on the
motherboard of the host. It has a small CPU, memory and a limited instruction set
required for the network related functions. Each NIC has a unique hardware address or
physical address to identify the host uniquely, which ensures that its unique all over
world.
These functions include,
It accepts instructions from host to transfer data to/ from cable.
It checks the status of the bus with the help of the transceiver and waits till the bus is idle.
It sends the data bit by bit once the bus is idle.
It inserts the CRC in the header of the frame while transmitting.
While accepting the data, NIC compares the destination address in the frame with its own
hardware address; If matches then only it is accepted otherwise rejected.
Validating the input frame by checking its CRC to ensure that the data is error free.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 22/ 25
e) Site addresses 201.70.64.0. The company needs six subnets. Design subnets. Write
addresses of all subnets.
(Identify the class and bits : 1M; Each subnet address : ½ M.)
Site Address : 201.70.64.0
No. of Subnets : 6
Class : Class C
Default subnet mask : 255.255.255.0
To design 6 subnets :
No. of bits used in the host id:
2n -2 ≥ 6 ; where n = number of bits
If n= 3;
23 – 2 ≥ 6.
Therefore, n= 3.
Given IP : 201.70.64.0
Network ID : 201.70.64
Subnet 1:
The bit combination is 001.
Taking last octet in binary :0 0 1 0 0 0 0 0 = 32 (10)
Subnet 2:
The bit combination is 01 0.
Taking last octet in binary :0 0 1 0 0 0 0 0 = 64(10)
Subnet 3:
The bit combination is 011.
Taking last octet in binary :0 1 1 0 0 0 0 0 = 96(10)
Subnet 4:
The bit combination is 100.
Taking last octet in binary :1 0 0 0 0 0 0 0 = 128(10)
Subnet 5:
The bit combination is 101.
Taking last octet in binary :1 0 1 0 0 0 0 0 = 160(10)
Subnet 6:
The bit combination is 110.
Taking last octet in binary :1 1 0 0 0 0 0 0 = 192 (10)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 23/ 25
1. Modems are used when digital signal is sent over analog medium.
2. When the data transmission is over an analog medium such as telephone lines, Modem is
used for converting analog signal to digital signal.
3. When a home user need to connect to ISP a modem is used to connect to telephone lines.
Or when user wants to connect internet by telephone line.
Crossover cable is created by connecting the two UTP cables by swapping transmission
and reception signals as shown below:
Here, One end of the cable is crimped in the same way as straight cable, on the other end
the following change has to be done,
1-White and 3 orange- white are to be connected
2 –Green and 6 orange are to be connected as shown in the fig below.
Application:
While connecting one computer to another without going through router, switch or hub,
the crossover cables are used.
These are also used when connecting one computer to a device directly, without any other
connecting device.
Cross cable is used for connecting similar level devices.
For example : two computers or connecting computer with hub since all are level
1devices.
b) Describe TCP/IP model with suitable diagram. Describe the function of each layer.
(Diagram 2M; Explanation 6M)
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 24/ 25
1. Application Layer
The application layer is concerned with providing network services to applications. There
are many application network processes and protocols that work at this layer, including
HyperText Transfer Protocol (HTTP), Simple Mail Transport Protocol (SMTP) and File
Transfer Protocol (FTP).
2. Transport Layer
This layer is concerned with the transmission of the data. The two main protocols that
operate at this layer are Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP). TCP is regarded as being the reliable transmission protocol and it
guarantees that the proper data transfer will take place. UDP is not as complex as TCP
and as such is not designed to be reliable or guarantee data delivery.
3. Network Layer or Internet layer:
This layer is concerned with the format of datagrams as defined in the internet
protocol(IP) and also about the mechanism of forwarding datagrams from the source
computer to the final destination via one or more routers. The other protocol in this layer
include Address Resolution Protocol (ARP), Reverse Address Resolution Protocol
(RARP) and Internet Control Message Protocol (ICMP).
5. Physical Layer:
This deals with hardware level, connections as in other network model.
c) With the help of neat sketch describe the working of router. Describe in detail the
operation of router considering OSI model.
(Explanation of Router 4M, Description of Router in OSI 4M))
Router is a device that connects two or more computer network together this allows two
or more disparate computer network to send data to each other.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Summer – 15 EXAMINATION
Subject Code: 17429 Model Answer Page 25/ 25
The figure shows a router connecting to two networks viz: A (Token Ring) and B
(Ethernet) at points X and Y respectively. This means that the router must have two
interfaces and also two Network interface cards (NICs) one to interact with network A at
point X, and the other to interact with network B at point Y. this enable it to send data
between the two networks A and B. a router connect more than two networks.
A router operates at a the physical, data link and network layer of the OSI model, as
shown in fig a router is termed as an intelligent device.
A router is useful for interconnecting two or more networks.
These networks can be heterogeneous, which means that they can differ in their physical
characteristics such as frame size, transmission rates, topologies, addressing etc. thus, if a
router has to connect such different networks, it has to consider all these issues.
A router has to determine the best possible transmission path among several available.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Page 1 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Ans: Selection criteria for selecting network topology: (Any two
• Size of the network & number of devices or nodes being connected. criteria Each:
• Ease of configuration & installing. 1 mark)
• The ease of adding new device in an existing network.
• The ease of fault indication & reflection.
• Number of physical links required to be used for connecting the devices.
• Need of network connecting devices such as repeaters, switches, hubs etc.
• Costs of the network.
• Based on the security requirement
• Need of network administration.
(iv) State the function of: 2M
1) Hub
2) Router
(v) State the frequency band used in cellular telephony for transmission and 2M
reception.
Ans: • A quad-band GSM phone could use GSM service in the 850-MHz, 900-MHz, (Any one
1800-MHz or 1900-MHz band. Correct
• GSM operates in the 900-MHz and 1800-MHz bands in Europe and Asia and in frequency
the 850-MHz and 1900-MHz band in the United States. band: 2
• CDMA mobiles operate in 800 MHz band
marks)
• In Advanced Mobile Phone System (AMPS) The band between 824 and 849 MHz
carries reverse communication; the band between 869 and 894 MHz carrie
forward communication
Page 2 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• A dual-band TDMA phone could use TDMA services in either an 800-MHz or a
1900-MHz system.
Page 3 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• In an IPv6 address, the variable type prefix field defines the address type or
purpose.
(i) Name any four resources that can be shared in a computer network. 4M
(ii) Draw a neat diagram and describe the working of star topology. 4M
Ans: (Diagram: 1
mark,
Description: 3
marks)
Star Topology:
• In a star topology, each device has a dedicated point-to-point link only to a
central controller, usually called a hub.
• The devices are not directly linked to one another.
• A star topology does not allow direct traffic between devices.
• The controller acts as an exchange.
• If one device wants to send data to another, it sends the data to the
controller, which then relays the data to the other connected device.
• A star topology is less expensive than a mesh topology.
• In a star, each device needs only one link and one I/O port to connect it to
any number of others. This factor also makes it easy to install and
reconfigure.
Page 4 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• Far less cabling needs to be housed, and additions, moves, and deletions
involve only one connection: between that device and the hub.
• Other advantages include robustness. If one link fails, only that link is
affected. All other links remain active. This factor also lends itself to easy
fault identification and fault isolation.
• As long as the hub is working, it can be used to monitor link problems and
bypass defective links.
• One big disadvantage of a star topology is the dependency of the whole
topology on one single point, the hub. If the hub goes down, the whole
system is dead.
• Although a star requires far less cable than a mesh, each node must be
linked to a central hub.
• The star topology is used in local-area networks (LANs). High-speed
LANs often use a star topology with a central hub.
In a mesh topology, every device has a In star topology, each device has a
dedicated point-to-point link to every dedicated point-to-point link only to a
other device. central controller.
More cabling and I/O ports required Less cabling and less I/O ports required
Fault identification and fault isolation Fault identification and fault isolation
easier slightly less easier
Because every device must be connected Installation and reconnection are easier.
to every other device, installation and
reconnection are difficult.
Page 5 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• Ownership : Typically owned, controlled, and managed by a single person or
organization.
Page 7 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
(i) Modems
(ii) Routers
Page 8 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Page 9 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Ans: Server-based network (Working: 2
In a server-based network, the server is the central location where users share and access marks, Uses:
network resources. This dedicated computer controls the level of access that users have 2 marks)
to share resources. Shared data is in one location, making it easy to back up critical
business information. Each computer that connects to the network is called a client
computer. In a server-based network, users have one user account and password to log
on to the server and to access shared resources. Server operating systems are designed
to handle the load when multiple client computers access server-based resources.
1. Centralization: Servers help in administering the whole set-up. Access rights and
resource allocation is done by Servers.
2. Proper Management: All the files are stored at the same place. Also it becomes
easier to find files.
3. Back-up and Recovery possible: As all the data is stored on server it’s easy to make
a back-up of it.
4. Up-gradation and Scalability in Client-server set-up: Changes can be made easily
by just upgrading the server. Also new resources and systems can be added by
making necessary changes in server.
5. Accessibility: From various platforms in the network, server can be accessed
remotely.
6. Security: Rules defining security and access rights can be defined at the time of set-
up of server.
b) Draw a neat sketch of Bus topology and describe its working. Give its 4M
advantages.
Ans: Bus topology is a network setup in which each computer and network device are (Diagram: 1
connected to a single cable or backbone by the help of interface connectors. This central mark,
cable is the backbone of the network and is known as Bus. Every workstation Working: 2
communicates with the other device through this Bus. A signal from the source is marks,
broadcasted and it travels to all workstations connected to bus cable. Although the
Page 10 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
message is broadcasted but only the intended recipient, whose MAC address or IP Advantages: 1
address matches, accepts it. If the MAC /IP address of machine doesn’t match with the mark)
intended address, machine discards the signal. A terminator is added at ends of the
central cable, to prevent bouncing of signals. A barrel connector can be used to extend
it.
Ans: Encapsulation is the process of taking data from one protocol and translating it into (Description:
another protocol, so the data can continue across a network. For example, a TCP/IP 4 marks)
packet contained within an ATM frame is a form of encapsulation. The physical layer
is responsible for physical transmission of the data. Link encapsulation allows local area
networking and Internet Protocol (IP) provides global addressing of individual
computers; Transmission Control Protocol (TCP) adds application or process selection.
During encapsulation, each layer builds a protocol data unit (PDU) by adding a header
(and sometimes trailer) containing control information to the PDU from the layer above.
For example, in the Internet protocol suite, the contents of a web page are encapsulated
with an HTTP header, then by a TCP header, an IP header, and, finally, by a frame
header and trailer. The frame is forwarded to the destination node as a stream of bits,
where it is de-capsulated (or de-encapsulated) into the respective PDUs and interpreted
at each layer by the receiving node. Encapsulation, the more abstract layer is often
called the upper layer protocol while the more specific layer is called the lower layer
protocol. Sometimes, however, the terms upper layer protocols and lower layer
protocols are used to describe the layers above and below IP
Page 11 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
2. Network layer
• ICMP Internet Control Message Protocol
• IGMP Internet Group Management Protocol
• IGRP Interior Gateway Routing Protocol
• IPv4 Internet Protocol version 4
• IPv6 Internet Protocol version 6
• IPSec Internet Protocol Security
3. Transport layer
• AHAH Authentication Header over IP or IPSec
• TCP Transmission Control Protocol
• UDP User Datagram Protocol
4. Presentation layer
• Network Data Representation
• Netware Core Protocol
• MIDI (Musical Instrument Digital Interface)
Page 12 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• Telnet (a remote terminal access protocol)
• X.25 Packet Assembler/Disassembler Protocol (PAD)
e) State the reasons for having a layered architecture in OSI reference model. 4M
Ans: The reasons of having a layered architecture in OSI reference model are as follows: (Any 4
1. It simplifies the design process as the functions of each layers and their interactions reasons: 1
are well defined. mark Each)
2. The layered architecture provides flexibility to modify and develop network services.
3. The number of layers, name of layers and the tasks assigned to them may change from
network to network. But for all the networks, always the lower layer offers certain
services to its upper layer.
4. The concept of layered architecture redefines the way of convincing networks. This
leads to a considerable cost savings and managerial benefits.
5. Addition of new services and management of network infrastructure become easy.
6. Due to segmentation, it is possible to break complex problems into smaller and more
manageable pieces.
7. Logical segmentation helps development taking place by different terms.
Ans: (Any 4
differentiation
TCP UDP : 1 mark
TCP is connection oriented protocol UDP is connectionless protocol. Each)
TCP is more reliable than UDP UDP is less reliable than TCP
TCP is slower for data sending than TCP. UDP is faster for data sending than TCP
TCP makes checks for errors and reporting. UDP makes error checking but no repor
TCP gives guarantee that the order of data at UDP has no such guarantee.
receiving end is same as on sending end
TCP is 20 bytes Header size of UDP is 8 bytes.
TCP is heavy weight as it needs three UDP is light weight.
packets to setup a connection
TCP has acknowledgement segments UDP has no acknowledgement
TCP is used for application that require high UDP is used for application that are tim
reliability but less time critical sensitive but require less reliability
4. Attempt any FOUR of the following: 16 Marks
Ans: (Any 4
differentiation
IPv4 IPv6 : 1 mark
Each)
Page 13 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Source and destination addresses are 32 bits Source and destination addresses are 128
(4 bytes) in length. bits (16 bytes) in length. For more
information.
Uses broadcast addresses to send traffic to There are no IPv6 broadcast addresses.
all nodes on a subnet. Instead, multicast scoped addresses are
used.
Fragmentation is supported at originating Fragmentation is not supported at routers. It
hosts and intermediate routers. is only supported at the originating host.
IP header includes a checksum. IP header does not include a checksum.
IP header includes options. All optional data is moved to IPv6 extension
headers.
IPsec support is optional. IPsec support is required in a full IPv6
implementation.
No identification of payload for QoS Payload identification for QoS handling by
handling by routers is present within the routers is included in the IPv6 header using
IPv4 header. the Flow Label field.
Addresses must be configured either Addresses can be automatically assigned
manually or through DHCP. using stateless address auto configuration,
assigned using DHCPv6, or manually
configured.
Uses host address (A) resource records in Uses host address (AAAA) resource records
the Domain Name System (DNS) to map in the Domain Name System (DNS) to map
host names to IPv4 addresses. host names to IPv6 addresses.
b) Explain the protocols ARP and RARP. 4M
Page 14 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
c) Draw a sketch indicating the construction of fibre optic cable. State four 4M
advantages over electrical cables.
Ans: (Diagram: 2
marks, Four
advantages: ½
marks each)
Core: This is the physical medium that transports optical data signals from an attached
light source to a receiving device. The core is a single continuous strand of glass or
plastic that’s measured in microns (µ) by the size of its outer diameter. The larger the
core, the more light the cable can carry.
Cladding: This is the thin layer that surrounds the fibre core and serves as a boundary
that contains the light waves and causes the refraction, enabling data to travel
throughout the length of the fibre segment.
Coating: This is a layer of plastic that surrounds the core and cladding to reinforce and
protect the fibre core. Coatings are measured in microns and can range from 250 to
900 microns.
Strengthening fibres: These components help protect the core against crushing forces
and excessive tension during installation. The materials can range from Kevlar® to
wire strands to gel-filled sleeves.
Cable jacket: This is the outer layer of any cable. Most fibre optic cables have an
orange jacket, although some types can have black or yellow jackets.
Ans: An IP address is 32-bit address that uniquely and universally defines the connection (List: 1 mark,
off a device (for example, a computer or a router) to the Internet Explanation:
IP addresses are classified into 5 classes 3 marks)
1) Class A
2) Class B
Page 15 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
3) Class C
4) Class D
5) Class E
Class A format:
0 network id host id
Class B format:
1 0 network id host id
Class C format:
11 0 network id host id
Page 16 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
21bits 8 bits (4th byte)
Class D format:
The IPv4 networking standard defines Class D addresses as reserved for multicast.
Multicast is a mechanism for defining groups of nodes and sending IP messages to that
group rather than to every node on the LAN (broadcast) or just one other node (unicast).
Multicast is mainly used on research networks. As with Class E, Class D addresses
should not be used by ordinary nodes on the Internet.
For class D minimum value for multi cast address is 224.0.0.0 and maximum multi class
address is 239.255.255.255
Class E format:
11110 reserved
e) Explain the services provided by the transport layer of the OSI model. 4M
Ans: 1. Service Point Addressing: Transport Layer header includes service point address (Any 4
which is port address. This layer gets the message to the correct process on the Services: 1
computer unlike Network Layer, which gets each packet to the correct computer. mark Each)
2. Segmentation and Reassembling: A message is divided into segments; each
segment contains sequence number, which enables this layer in reassembling the
message. Message is reassembled correctly upon arrival at the destination and
replaces packets which were lost in transmission.
3. Connection Control : It includes 2 types:
I. Connectionless Transport Layer: Each segment is considered as an
independent packet and delivered to the transport layer at the destination
machine.
II. Connection Oriented Transport Layer: Before delivering packets, connection
is made with transport layer at the destination machine.
Page 17 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
4. Flow Control: In this layer, flow control is performed end to end.
5. Error Control: Error Control is performed end to end in this layer to ensure that
the complete message arrives at the receiving transport layer without any error.
Error Correction is done through retransmission.
6. Data Integrity: Using checksums, the data integrity across all the delivery layers
can be ensured. These checksums guarantee that the data transmitted is the same
as the data received through repeated attempts made by other layers to have
missing data resent.
f) Draw a neat diagram and describe a wide area network. What are the three 4M
phases of communication in a WAN.
Ans: (Diagram: 1
mark,
Description of
WAN: 1
mark,
Explanation
of Three
phases: 2
marks)
Wide Area Network is a computer network that covers relatively larger geographical
area such as a state, province or country. It provides a solution to companies or
organizations operating from distant geographical locations who want to
communicate with each other for sharing and managing central data or for general
communication.
WAN is made up of two or more Local Area Networks (LANs) or Metropolitan Area
Networks (MANs) that are interconnected with each other, thus users and computers
in one location can communicate with users and computers in other locations.
Page 18 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
In Wide Area Network, Computers are connected through public networks, such as
the telephone systems, fibre-optic cables, and satellite links or leased lines. The
Internet is the largest WAN in a world. WANs are mostly private and are built for a
particular organization by Internet Service Providers (ISPs) which connects the LAN
of the organization to the internet. WANs are frequently built using expensive leased
lines where with each end of the leased line a router is connected to extend the network
capability across sites.
a) Explain the various fields in the frame format of UDP with a neat diagram. 4M
Ans: (Diagram: 2
marks,
Explanation
of the field: 2
marks)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
port number and if the destination host is the server then the port number will likely
be a well-known port number.[4]
Length:
A field that specifies the length in bytes of the UDP header and UDP data. The
minimum length is 8 bytes because that is the length of the header. The field size sets
a theoretical limit of 65,535 bytes (8 byte header + 65,527 bytes of data) for a UDP
datagram. The practical limit for the data length which is imposed by the
underlying IPv4 protocol is 65,507 bytes (65,535 − 8 byte UDP header − 20 byte IP
header).
In IPv6 jumbogram it is possible to have UDP packets of size greater than 65,535
bytes. RFC 2675 specifies that the length field is set to zero if the length of the UDP
header plus UDP data is
greater than 65,535.
Checksum:
The checksum field may be used for error-checking of the header and data. This field
is optional in IPv4, and mandatory in IPv6. The field carries all-zeros if unused.
Ans: peration of FTP:When you want to copy files between two computers that are on the (Diagram: 1
same local network, often you can simply "share" a drive or folder, and copy the files mark,
the same way you would copy files from one place to another on your own PC. Explanation:
3 marks)
What if you want to copy files from one computer to another that is halfway around
the world? You would probably use your Internet connection. However, for security
reasons, it is very uncommon to share folders over the Internet. File transfers over the
Internet use special techniques, of which one of the oldest and most widely-used is
FTP. FTP, short for "File Transfer Protocol," can transfer files between any
computers that have an Internet connection, and also works between computers using
totally different operating systems.
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
To transfer files, provide your client software (Auto FTP Manager) with the server
address, user name, and password. After connecting to the FTP server, you can use
Auto FTP Manager's File Manager to upload, download and delete files. Using the
File Manager is a lot like working with Windows Explorer.
c) Explain Handoff procedure in mobile communication. 4M
Ans: Hand off procedure in mobile communication: Mobility is the most important (Diagram: 2
feature of a wireless cellular communication system. Usually, continuous service is marks,
achieved by supporting handoff (or handover) from one cell to another. Handoff is the Explanation:
process of changing the channel (frequency, time slot, spreading code, or combination 2 marks)
of them) associated with the current connection while a call is in progress. It is often
initiated either by crossing a cell boundary or by a deterioration in quality of the signal
in the current channel.
Handoff is divided into two broad categories— hard and soft handoffs. They are
also characterized by “break before make” and “make before break.” In hard
handoffs, current resources are released before new resources are used; in soft
handoffs, both existing and new resources are used during the handoff process.
A hard handoff is essentially a “break before make” connection. Under the control of
the
MSC, the BS hands off the MS’s call to another cell and then drops the call. In a hard
handoff,
Page 21 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
the link to the prior BS is terminated before or as the user is transferred to the new
cell’s
BS; the MS is linked to no more than one BS at any given time. Hard handoff is
primarily
used in FDMA (frequency division multiple access) and TDMA (time division
multiple access),
where different frequency ranges are used in adjacent channels in order to minimize
channel interference. So when the MS moves from one BS to another BS, it becomes
impossible
for it to communicate with both BSs (since different frequencies are used).
A hard handoff occurs when the old connection is broken before a new connection is
activated.
The performance evaluation of a hard handoff is based on various initiation criteria
d) What are the situations under which gateways are used in networks? 4M
Ans: Following are the situations under which Gateways are used in a network : (List Any four
• Gateways are specifically made to connect dissimilar networks together situation
• A gateway is a node (router) in a computer network, a key stopping point for data on Each: 1 mark)
its way to or from other networks. The Internet wouldn't be any use to us without
gateways (as well as a lot of other hardware and software).
• In a workplace, the gateway is the computer that routes traffic from a workstation to
the outside network that is serving up the Web pages. For basic Internet connections
at home, the gateway is the Internet Service Provider that gives you access to the
entire Internet.
• On the Internet, the node that's a stopping point can be a gateway or a host node.
• A computer that controls the traffic your Internet Service Provider (ISP) receives
is a node.
• If you have a wireless network at home that gives your entire family access to the
Internet, your gateway is the modem (or modem-router combo) your ISP provides so
you can connect to their network. On the other end, the computer that controls all of
the data traffic your Internet Service Provider (ISP) takes and sends out is itself a
node.
• When a computer-server acts as a gateway, it also operates as a firewall and a proxy
server. A firewall keeps out unwanted traffic and outsiders off a private network. A
proxy server is software that "sits" between programs on your computer that you use
(such as a Web browser) and a computer server—the computer that serves your
network. The proxy server's task is to make sure the real server can handle your
online data requests.
e) Compare OSI and TCP/IP network model. 4M
Ans: Following are some major differences between OSI Reference Model and TCP/IP (Any four
Reference Model difference: 1
OSI TCP/IP Mark each)
Page 22 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
1. OSI is a generic, protocol 1. TCP/IP model is based on
independent standard, acting as a standard protocols around which
communication gateway between the Internet has developed. It is a
the network and end user. communication protocol, which
allows connection of hosts over a
network.
2. In OSI model the transport 2. In TCP/IP model the transport
layer guarantees the delivery of layer does not guarantees delivery
packets. of packets. Still the TCP/IP model
is more reliable.
3. Follows vertical approach. 3. Follows horizontal approach.
4. OSI model has a separate 4. TCP/IP does not have a separate
Presentation layer and Session Presentation layer or Session
layer. layer.
5. OSI is a reference model 5. TCP/IP model is, in a way
around which the networks are implementation of the OSI model.
built. Generally it is used as a
guidance tool.
6. Network layer of OSI model 6. The Network layer in TCP/IP
provides both connection model provides connectionless
oriented and connectionless service.
service.
7. OSI model has a problem of 7. TCP/IP model does not fit any
fitting the protocols into the protocol
model.
8. Protocols are hidden in OSI 8. In TCP/IP replacing protocol is
model and are easily replaced as not easy.
the technology changes.
9. OSI model defines services, 9. In TCP/IP, services, interfaces
interfaces and protocols very and protocols are not clearly
clearly and makes clear separated. It is also protocol
distinction between them. It is dependent.
protocol independent.
10. It has 7 layers 10. It has 4 layers
Page 23 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
f) Name the topology which combines two or more topologies. What are its 4M
advantages? Draw a neat diagram of the same.
Ans: Hybrid topology combines two or more topologies. (Topology
Advantages: identification:
1) Reliable : Unlike other networks, fault detection and troubleshooting is easy in 1 mark ,
this type of topology. The part in which fault is detected can be isolated from the rest Advantages: 1
of network and required corrective measures can be taken, WITHOUT affecting the mark ,
functioning of rest of the network. Diagram: 2
2) Scalable: Its easy to increase the size of network by adding new components, marks)
without disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of the
organization and by optimizing the available resources. Special care can be given to
nodes where traffic is high as well as where chances of fault are high.
4) Effective: we can design it in such a way that strengths of constituent topologies
are maximized while there weaknesses are neutralized. For example we saw Ring
Topology has good data reliability (achieved by use of tokens) and Star topology has
high tolerance capability
Page 24 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
a) 8M
Draw a neat diagram showing the layers of OSI model and state the function of
each layer.
Ans:
The ISO - OSI REFERENCE Model Layers (Diagram: 3
marks,
Functions: 5
marks)
Page 25 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
The OSI model takes the task of internetworking and divides that up into what is
referred to as a vertical stack that consists of the following 7 Layers
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio
signal — through the network at the electrical and mechanical level. It provides
the hardware means of sending and receiving data on a carrier, including defining
cables, cards and physical aspects. .
Data Link (Layer 2)
At OSI Model, Layer 2, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and handles errors in the
physical layer, flow control and frame synchronization. The data link layer is divided
into two sub layers: The Media Access Control (MAC) layer and the Logical Link
Control (LLC) layer. The MAC sub layer controls how a computer on the network
gains access to the data and permission to transmit it. The LLC layer controls
frame synchronization, flow control and error checking.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known
as virtual circuits, for transmitting data from node to node. Routing and forwarding
are functions of this layer, as well as addressing, internetworking, error
handling, congestion control and packet sequencing.
Transport (Layer 4)
Model, Layer 4, provides transparent transfer of data between end systems, or hosts,
and is responsible for end-to-end error recovery and flow control. It ensures complete
data transfer from source to destination.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection
coordination.
Presentation (Layer 6)
This layer provides independence from differences in data representation
(e.g., encryption) by translating from application to network format, and vice versa.
The presentation layer works to transform data into the form that the application layer
can accept. This layer formats and encrypts data to be sent across a network,
providing freedom from compatibility problems. It is sometimes called the syntax &
semantics
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Everything at this
layer is application-specific. This layer provides application services for file
Page 26 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
transfers, e-mail, and other network software services. Telnet and FTP are
applications that exist entirely in the application level. . All the applications are
residing in this layer.
Ans: (i) Subnetting: Logically separated network A subnet short for sub network is an (Description
identifiably separate part of an organization's network. Typically, a subnet may of each term:
represent all the machines at one geographic location, in one building, or on the 2 marks)
same local area network (LAN). Having an organization's network divided into
subnets allows it to be connected to the Internet with a single shared network
address. Without subnets, an organization could get multiple connections to the
Internet, one for each of its physically separate subnetworks, .
(iii) Masking : In computing world mask is data that are used for bitwise operations,
particularly in a bit field mask, multiple bits in a byte, nibble, word (etc.) can be
set either on, off or inverted from on to off (or vice versa) in a single bitwise
operation. if you take the example of IP Address masking where in subnet mask
of class C 255.255.255.0 will be masking first 3 digits that meanse first three
octate can not be changed for keeping yourself the part of the same network.
Thus here mask decides host part of an IP address & a network part of an IP
address
Page 27 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
(iv) Classless IP address : Using a classful IP addressing format worked well when
the Internet was relatively small. But as the number of networks on the Internet
grew, the limitations of classful addresses became apparent. The Class A address
space contains only 125 usable networks in the range 0–127 because networks 0
and 127 are reserved, and network 10 is used for private addressing. Each of these
125 Class A networks could theoretically contain 224 – 2 or 16,777,214 hosts, but
it's not realistic to have more than 16 million hosts on the same network.
Therefore, the Internet moved away from a classful address space to a classless
address space. In other words, the number of bits used for the network portion of
an IP address became variable instead of fixed.
The network portion of classful IP addresses is fixed. For the network portion of an
IP address, Class A addresses use 8 bits, Class B addresses use 16 bits, and Class
C addresses use 24 bits. A router could determine the address class by inspecting
the first byte of the address. A value of 1–126 is Class A, 128–191 is Class B, and
192–223 is Class C.
Ans: Single Mode cable: Is a single stand that has one mode of transmission. Single Mode (Description
Fiber with a relatively narrow diameter, through which only one mode will propagate. of each point:
2 marks)
Single Modem fiber is used in many applications where data is sent at multi-frequency
(WDM Wave-Division-Multiplexing) so only one cable is needed - (single-mode on
one single fiber)
Single-mode fiber gives you a higher transmission rate. Single-mode fiber has a much
smaller core than multimode. The small core and single light-wave virtually eliminate
any distortion that could result from overlapping light pulses, providing the least
signal attenuation and the highest transmission speeds of any fiber cable type.
Page 28 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Multi-Mode cable : has a little bit bigger diameter, Multimode fiber gives you high
bandwidth . Light waves are dispersed into numerous paths, or modes, as they travel
through the cable.
In Single mode light takes single path through the fiber core. Step index means sharp
step in the index of refraction between core and cladding interface. This indicates that
in step index, core and cladding have their own constant index of refractions N1 and
N2 respectively.
Page 29 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
One way to reduce the modal dispersion in multimode fiber is to change the fiber's
optical characteristics to compensate for the problem. By modifying the refractive
index of the glass through very precise manufacturing techniques, the light can be
made to travel more slowly than light that is bouncing around in modes near the
outside of the core. The shorter paths are made slower so that they are held back to the
pace of the faster (but longer) paths. The light that travels farther travels faster and the
light that travels less travels slower. The net effect is that the light pulse stays together
and doesn't spread out in the way that it would with non-Graded Index fiber. A graded
index fiber typically transmits roughly 800 modes. The core fiber has a varying
refractive index. The core is clad with a glass with a lower refractive index, just like
non-GI multimode, to cause stray light to bounce back into the cable.
Page 30 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
• With careful choice of material, dimensions and λ, the total dispersion can be made
extremely small, less than 0.1 ps /(km × nm), making this fiber suitable for use with
high data rates.
• In a single-mode fiber, a part of the light propagates in the cladding.
• The cladding is thick and has low loss.
• Typically, for a core diameter of 10 µm, the cladding diameter is about 120 µm.
• Handling and manufacturing of single mode step index fiber is more difficult.
Single - Mode Graded Index Fiber: In fiber optics, a graded index is an optical
fiber whose core has a refractive index that decreases with increasing radial distance
from the optical axis of the fiber . Because parts of the core closer to the fiber axis
have a higher refractive index than the parts near the cladding, light rays
follow sinusoidal paths down the fiber. The most common refractive index profile for
a graded-index fiber is very nearly parabolic. The parabolic profile results in continual
refocusing of the rays in the core, and minimizes modal dispersion.
Page 31 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
WINTER– 16 EXAMINATION
Model Answer Subject Code: 17429
__________________________________________________________________________________________________
Page 32 of 32
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans:
A computer network is a group of computer systems and other computing hardware devices that are
linked together through communication channels to facilitate communication and resource-sharing
among a wide range of users.
Page 1 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans:
Applications of Computer Network
Banking
Video conferencing
Marketing
School
Radio
Television
E-mail
Companies
Page 2 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Page 3 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans:
Criteria to be considered:
Type of medium.
No of conductors/connectors.
Flexibility.
Durability.
Bandwidth.
Reliability of connection
Required speed
Distance (segment length )
Ease of installation and maintenance access
Technical expertise required to install and configure
Resistance to internal EMI, cross talk of parallel wires
Resistance to external EMI outside the cable.
Attenuation
Cost
Bending Radius
Page 4 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans:
Protocol: There are certain rules that must be followed to ensure proper communication & a set
of such rules and regulation is known as protocol.
Encapsulation: Encapsulation is the process of adding the headers and footers to the data.
Page 5 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
IPv4 IPv6
1. Source and destination addresses are 32 bits 1. Source and destination addresses are 128bits
(4 bytes) in length. (16 bytes) in length.
2. Uses broadcast addresses to send traffic to all 2. There are no IPv6 broadcast addresses.
nodes on a subnet. Instead, multicast scoped addresses are used.
3. Fragmentation is supported at originating hosts 3. Fragmentation is not supported at routers. It
and intermediate routers. is only supported at the originating host.
4. IP header includes a checksum. 4. .IP header does not include a checksum
5. IP header includes options. 5. All optional data is moved to IPv6 extension
headers.
6. IPsec support is optional 6. IPsec support is required in a full IPv6
implementation.
Ans:
Classification of network by their geography:
LAN - Local Area Network
MAN - Metropolitan Area Network
WAN - Wide Area Network
CAN - Campus Area Network
PAN - Personal Area Network
Page 6 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
PAN: A PAN is personal area network is used for communication among computer devices close to
one’s person. Wireless networking or Bluetooth technologies are the some examples of PAN. The
communication network established for the purpose of connecting computer devices of personal use
is known as the PAN.
CAN: CAN is a Campus Area Network is used to connect buildings across campuses of colleges or
Universities. A CAN is actually a type of LAN. It is larger than a LAN but smaller than MAN.CAN
is a network that connects two or more LANs but that is limited to a specific and contiguous
geographical area such as a college campus, industrial complex or military base.
LAN: LAN is local area network. LAN is privately-owned networks covering a small geographic
area(less than 1 km), like a home, office, building or group of buildings. LAN transmits data with a
speed of several megabits per second.
MAN: A Metropolitan Area Network (MAN) is a large computer network that spans a metropolitan
area or campus. A MAN typically covers an area up to 10 kms (city). The best example of MAN is
the cable Television network, available in many cities. For an organization, the common use of a
MAN is to extend their LAN connectivity between buildings/offices that are within the same city or
urban area (hence the name Metropolitan Area Network). The organization can pass their Ethernet
frames to the service provider MAN; the service provider will carry their frames across the MAN;
and then deliver the frames to the destination site. From the customer's point of view, the MAN
looks like one big (long) Ethernet link between their offices. The different sites could belong to the
same IP subnet, and from the customer's viewpoint, no routing is required between their sites.
WAN: WAN is wide area network. WAN is a long-distance communication network that covers a
wide geographic area, such as state or country. The most common example is internet. A WAN
provides long-distance transmission of data, voice, image and video information over larger
geographical areas that may comprise a country or even whole world.
(b) Name the topology which is combination of different topologies. Explain it with advantages.
(Name of topology - 1 mark; Explanation - 2 marks; advantages - 1 mark)
Ans:
Name of topology: Hybrid Topology
Hybrid Topology:-A combination of two or more different topologies makes for a hybrid topology.
When different topologies are connected to one another, they do not display characteristics of any
one specific topology.
Working of Hybrid Topology The Hybrid topology scheme combines multiple topologies into one
large topology. The hybrid network is common in large wide area networks. Because each topology
Page 7 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
has its own strengths and weaknesses, several different types can be combined for maximum
effectiveness.
3) Flexible: Hybrid Network can be designed according to the requirements of the organization
and by optimizing the available resources. Special care can be given to nodes where traffic is
high as well as where chances of fault are high
4) Effective: Hybrid topology is the combination of two or more topologies, so we can design it in
such a way that strengths of constituent topologies are maximized while there weaknesses are
neutralized.
Page 8 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Page 9 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
(a) State the difference between server based network and peer to peer network.
(Any Four Points - 1 mark each)
Ans:
(b) State the functions of (i) Hub (ii) Repeater (iii) Bridge (iv) Router
(Two Functions of Each component - ½ marks each)
Ans:
Hub
Hub connects all nodes in star topology. Hub is broadcasting device.
It sends packets to all nodes in the network.
It works at Physical Layer Of OSI model
Repeater:
Repeaters are used to take the distorted, weak and corrupt input signal and regenerate this signal
at its output.
It ensures that the signals are not distorted or weak before it reaches the destination.
It recreates the bit pattern of the signal, and puts this regenerated signal back on to the
transmission medium.
Page 10 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Bridge
A bridge device filters data traffic at a network boundary.
Bridges reduces the amount of traffic on a LAN by dividing it into two segments.
It inspects incoming traffic and decides whether to forward or discard it.
It sends packets between two networks of same type.
Router
Router chooses the best path for packet forwarding.
Router read complex network address in packet.
It works at Network Layer of OSI model
Efficiently direct packets from one network to another, reducing excessive traffic.
Join neighbouring or distant network
Connect dissimilar networks.
Prevent network bottlenecks by isolating portions of a network.
(c) List type of cable. Draw and label the constructional sketch of co-axial cable.
(Listing - 1 mark; Diagram - 2 marks; Labeling - 1 mark)
Ans:
Types of cables:
1. Twisted Pair cable
2. Coaxial cable
3. Fiber optic cable
Page 11 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans:
1. Transmission media are needed for interacting with the devices.
2. Without transmission media communication cannot take place.
3. Communication media is the middle part of sender and receiver.
4. It is needed for faster communication.
5. It is needed for reliable delivery of data with efficient methods.
6. It is needed for secure transmission of data
Ans:
1. File sharing
2. Printer sharing
3. Application services
4. E-mail services.
5. Remote access
Page 12 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans:
1. Bandwidth
2. Transmission impairments
3. Interference
4. Number of receivers
5. Range of communication
1) File based system: Files are stored in shared location on server. Server provides access to
file. Gate way server connects from file based email system to internet.
2) Client server e-mail system: E-mail server contains message and handles e-mail
interconnections. E-mail client functions (also consider other e-mail functions): read mail,
send, compose, forward, delete. E-mail protocols: SMTP, POP etc.
Page 13 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
5. Remote access: Set up remote access service on network operating system. Setup VPN (virtual
private network) on internet terminal services (TELNET).User can access files from remote
location. User can access centralized application or share files on LAN.
6. Disk sharing: Disk connected in a network can be shared in many users / computers also called
as mountain disk or shared volume.
7. Scanner sharing: Scanner connected in a network can be shared in many users/computers.
Page 14 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans:
Page 15 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Page 16 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
In computer networking, the term encapsulation is used to refer to the process of each layer at
the sending computer adding its own header information, in the form of meta-data to the actual
payload (data)
Each layer’s header information would be interpreted and acted upon by a peer layer in another
machine.
Encapsulation is analogous to packing a letter inside an addressed envelope by the sender. Just
like postal envelopes cannot be delivered to the intended recipient without an address, similarly
without the encapsulation headers, data cannot be carried across the computer networks from
the sending computer to the receiving computer.
It is the primary means of communication between peer layers of different computers. For
instance, : the Network layer Header (NH) containing the destination IP address, helps a packet
to be routed to the correct receiving computer : the Data link layer Header (DLH) containing the
destination MAC address, helps a frame to be passed onto the correct next hop neighbor, during
a packets hop by hop journey from the source computer to the receiving computer : the
Transport layer Header (TH) containing the source port and the destination port helps the source
and the destination computers to correctly multiplex/demultiplex data among different
applications (like HTTP, FTP etc.).
Page 17 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
(a) State meaning of (i) Subnetting (ii) Supernetting with suitable examples.
(Subnetting - 1 mark; Example - 1 mark; Supernetting - 1 mark; Example - 1 mark)
Ans:
Sub-netting: Subnet mask is a net mask with the only real difference being that breaking a larger
Network into smaller parts and each smaller section will use different sets of address numbers.
The subnet mask is 32 bit value that usually express in dotted decimal notation used by IP address.
This is the combination of net-ID and host-ID.
Example:
Consider the subnet mask as 255.255.0.0. Convert the 255.255.0.0 subnet mask to binary.
255.255.0.0 = 11111111 11111111 00000000 00000000 (in binary) add 1s right after the last 1 on
the right (in the middle of the Mask, between the 1s and 0s) I add five 1s to make it look like this:
1111111111111111
11111000 00000000 Using the subnet's formula, this would give us 25 = 32networks
Super-netting: To create a supernetwork, the procedure is to be reversed. The networks are
combined by creating space for a larger number of hosts. To accomplish this, we start with the
default subnet mask of 255.255.255.0 and use some of the bits reserved for the Net id to identify
Page 18 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
the Host id. The following example shows we would create a new supernetwork by combining
four separate subnetworks.
Example: If a packet arrives at the router with the destination address 192.168.64.48, the
supernet mask 255.255.252.0 is applied to the destination address.
11000000.10101000.01000000.00110000 (destination IP address) AND
11111111.11111111.11111100.00000000 (Supernet mask) Returns
11000000.10101000.01000000.00000000
TCP/IP Reference Model: TCP/IP means transmission control protocol and internet protocol.
Protocols are set of rules which govern every possible communication over the internet. These
protocols describe the movement of data between the host computers or internet. These offer simple
naming and addressing schemes.
Overview of TCP/IP reference model
TCP/IP that is transmission control protocol and the internet protocol was developed by Department
of Defense’s Project Research Agency (ARPA, later DARPA) under the project of network
interconnection.
Originally it was created to connect military networks together, later it was used by government
agencies and universities. It is robust to failures and flexible to diverse networks. Most widely used
protocol for interconnecting computers and it is the protocol of the internet.
Description of different TCP/IP protocols
Layer 1: Host-to-network Layer
1. Protocol is used to connect the host, so that the packets can be sent over it.
2. Varies host to host and network to network.
Page 19 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans:
Bluetooth Architecture
Bluetooth architecture defines two types of networks:
1. Piconet
2. Scattemet
1. Piconet
• Piconet is a Bluetooth network that consists of one primary (master) node and seven active
secondary (slave) nodes.
• Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or stations within the
distance of 10 meters.
• There can be only one primary or master station in each piconet.
• The communication between the primary and the secondary can be one-to-one or one-to-many.
• All communication is between master and a slave. Salve-slave communication is not possible.
Page 20 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
2. Scatternet:
• Scattemet is formed by combining two or more piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station or node can receive messages from the master in the first piconet and deliver the
message to its slaves in other piconet where it is acting as master. This node is also called
bridge slave.
• Thus a station can be a member of two piconets.
• A station cannot be a master in two piconets
Page 21 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
(d) Define IP Addressing .List IP Address classes with their range of addresses.
(Define - 1 mark; Classes - 1 mark; range - 2 marks)
Ans:
Internet Protocol IP address is a number (example shown right) used to indicate the location of a
computer or other device on a network using TCP/IP. These addresses are similar to those of your
house; they allow data to reach the appropriate destination on a network and the Internet.
There are two versions of IP addresses used today, IPv4 and IPv6
IP address classes: There are five classes of available IP ranges: Class A, Class B, Class C, Class
D and Class E, while only A, B, and C are commonly used. Each class allows for a range of valid
IP addresses, shown in the following table.
Class Address Range
Class A 1.0.0.0 to 127.255.255.255
Class B 128.0.0.0 to 191.255.255.255
Class C 192.0.0.0 to 223.255.254.255
Class D 224.0.0.0 to 239.255.255.255
Class E 240.0.0.0 to 254.255.255.255
Page 22 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans
The OSI reference model is as shown in the figure. There are seven layers in the model. Physical
layer, Data link layer, Network layer, Transport layer, Session layer, Presentation layer,
Application layer. Each layer performs unique and specific task and it offers services to the layer
above it. Each computer on a network uses a series of protocols to perform the functions assigned to
each layer. At the top of the stack is the application layer and at the bottom is the physical medium
which actually connects the computers to form a network. The figure shows the OSI model with
two hosts A and B, communicating with each other Interface: an interface defines the operations
and services offered by lower layer to the upper layer. This is an interface between each pair of
adjacent layers as shown in the figure. Peer: the entities comprising the corresponding layers on
different machines are called as peers. The communication actually takes place between the peers
using the protocols. Exchange of information: at the physical layer the communication is direct that
is, machine a sends a stream of bits to machine B. at higher layers each layer in the sending
machines adds its own information to the message it receives from the layer just above it and passes
the whole package to the layer just below it. The information added by each layer is in the form of
Page 23 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
headers or trailers. At layer 1 the entire package is converted to a form that can be transferred to the
receiving machine.
Ans:
LAN WAN
Covers Local areas only (e.g. homes, offices, Large geographic areas(e.g. cities,
schools) states, nations)
Definition LAN (Local Area Network) is a WAN (Wide Area Network) is a
computer network covering a small computer network that covers a
geographic area, like a home, office, broad area (e.g., any network
school, or group of buildings. whose communications links cross
metropolitan, regional, or national
boundaries over a long distance).
Speed High speed (1000 mbps) Less speed (150 mbps)
Data transfer LANs have a high data transfer rate. WANs have a lower data transfer
rates rate compared to LANs.
Example The network in an office building can Internet is a good example of a
be a LAN WAN
Connection One LAN can be connected to other Computers connected to a wide-
LANs over any distance via telephone area network are often connected
lines and radio waves. through public networks, such as
the telephone system. They can also
be connected through leased lines
or satellites.
Data Experiences fewer data transmission Experiences more data transmission
Transmission errors errors as compared to LAN
Error
Ownership Typically owned, controlled, and WANs (like the Internet) are not
managed by a single person or owned by any one organization but
organization. rather exist under collective or
distributed ownership and
management over long distances.
Set-up costs If there is a need to set-up a couple of For WANs since networks in
extra devices on the network, it is not remote areas have to be connected
Page 24 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
(a) State the application of NIC device driver and client server software.
(NIC device driver application - 2 marks; client server software - 2 marks; any 2 application)
Ans:
Applications of NIC device driver
A driver (sometimes called a device driver) is software that enables a computer to work with a
particular device. Although a device might be installed on a computer, the computer's operating
system cannot communicate with the device until the driver for that device has been installed and
configured
Network interface card (NIC) drivers are computerized instructions and information that are
required for a NIC card to be operational after it is installed into or connected to a computer. It is
the software driver that tells the computer how to work with the device so that the device can
perform its job.
Applications:
There are drivers for nearly every type of computer device and peripheral.
1) The computer's operating system works with the driver to make the device perform.
Printers provide a good illustration of how drivers are used. Printers built by different
manufacturers have different features and functions.
2) It is impossible for computer and operating-system manufacturers to equip new computers
with all the software required to identify and work with every type of printer.
3) Network interface card (NIC) drivers are computerized instructions and information that are
required for a NIC card to be operational after it is installed into or connected to a computer.
Page 25 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
4) These instructions usually are written by highly proficient computer programmers who might
program in a variety of programming languages such as C or C++.
5) A NIC card is a hardware device, and hardware drivers might be thought of as the computer
code or machine language that "drives" hardware or makes it work.
2) Web browsers
Web browser or browser is a software application used to locate, retrieve and display content on
the World Wide Web, including Web pages, images, video and other files. As a client/server
model, the browser is the client run on a computer that contacts the Web server and requests
information. The Web server sends the information back to the Web browser which displays the
results on the computer or other Internet-enabled device that supports a browser.
Page 26 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
TCP UDP
TCP is transmission control UDP is user datagram protocol.
protocol.
TCP use flow control UDP does not use flow control.
TCP has high speed of UDP has very high transmission speed.
transmission
(c) Name the types of Handoffs in Mobile Communication and describe Handoff procedure with
suitable diagram.
(1 - mark for naming types of handoffs (any two); 3 - marks for explanation with diagram)
Ans:
Handoffs in Mobile Communication
A handoff refers to the process of transferring an active call or data session from one cell in a
cellular network to another or from one channel in a cell to another. A well-implemented handoff is
important for delivering uninterrupted service to a caller or data session user.
Handoffs may be classified into two types:
Hard handoff
Soft handoff
Queued handoff
Delayed handoff
Forced handoff
Page 27 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
1) Hard Handoff: Characterized by an actual break in the connection while switching from one
cell or base station to another.
2) Soft Handoff: Entails two connections to the cell phone from two different base stations. This
ensures that no break ensues during the handoff. Naturally, it is more costly than a hard handoff.
OR
Page 28 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Cellular networks are composed of cells, each of which is capable of providing telecommunications
services to subscribers roaming within them. Each cell can only serve up to a certain area and
number of subscribers. Thus, when any of these two limits is reached, a handoff ensues.
For instance, if a subscriber moves out of the coverage area of a particular cell while entering
another, a handoff takes place between the two cells. The cell that served the call prior to the
handoff is relieved of its duties, which are then transferred to the second cell. A handoff may also
be triggered when the number of subscribers using a particular cell has already reached the cell’s
maximum limit (capacity). Such a handoff is possible because the reach of the cell sites serving
these cells can sometimes overlap. Thus, if a subscriber is within an overlapping area, the network
may opt to transfer one subscriber's call to the cell involved in the overlap.
Sometimes a handoff can take place even if no limit is breached. For example, suppose that a
subscriber initially inside the jurisdiction of a large cell (served by an umbrella-type cell site) enters
the jurisdiction of a smaller cell (one served by a micro cell). The subscriber can be handed off to
the smaller cell in order to free up capacity on the larger one.
(d) A computer centre is connected in star topology with 8 computers. This set up has to be
converted into Mesh topology. What are the requirements? What are the advantages and
disadvantages of the two systems? Draw the sketches for both the topologies.
Ans:
In Star topology Devices are connected to Hub/Switch that we have to disconnect and remove the
central device. Now, If we have to connect Eight devices in a mesh topology. How many cables are
needed? How many ports are needed for each device?
Mesh is having high redundancy. Only one device would be disconnected if all the connections
were to fail for that device. You can have many connections to other devices that’s why it’s less
likely to fail. The only cause of failure at this point is really the power and if you just don't have
any. Even if one of the connections between two devices fail there is no effect on network and they
can still communicate through other channels.
Page 29 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
1) Data can be transmitted from different devices simultaneously. This topology can withstand
high traffic.
2) Even if one of the components fails there is always an alternative present. So data transfer
doesn’t get affected.
3) Expansion and modification in topology can be done without disrupting other nodes.
Page 30 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
(e) Draw the frame format of TCP Header and state the function of various fields.
(Frame format - 2 marks; explanation of all fields - 2 marks)
Ans:
TCP/IP Header Format: TCP segments are sent as internet datagram’s. The Internet Protocol
header carries several information fields, including the source and destination host addresses. A
TCP header follows the internet header, supplying information specific to the TCP protocol. This
division allows for the existence of host level protocols other than TCP.
Page 31 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Source Port (16): The port number of the host sending the data
Destination Port (16): The port number of the application requested on the destination host.
Sequence Number (32): The sequence number of the first data octet in this segment (except
when SYN is present). If SYN is present the sequence number is the initial sequence number
(ISN) and the first data octet is ISN+1. It puts the data back in the correct order or retransmits
missing or damages data, a process called sequencing.
Acknowledgement Number (32): Define which TCP octet expected next. If the ACK control
bit is set this field contains the value of the next sequence number the sender of the segment is
expecting to receive. Once a connection is established this is always sent.
Header Length (4): Stands for header length, which defines the number of 32 bit words in the
header. This indicates where the data begins. The TCP header (even one including options) is
an integral number of 32 bits long.
Unused (6): Reserved for future use, it always set to 0.
Flags (6): Control functions used to set up and terminate a session. Flags from left to right:
o URG: Urgent Pointer field significant
o ACK: Acknowledgment field significant
o PSH: Push Function
o RST: Reset the connection
o SYN: Synchronize sequence numbers
o FIN: No more data from sender
Windows (16): The window size of the sender is willing to accept, in octet. The number of
data octets beginning with the one indicated in the acknowledgment field which the sender of
this segment is willing to accept.
Checksum (16): An error detection code. The checksum field is the 16 bit one's complement
of the one's complement sum of all 16 bit words in the header and text. If a segment contains an
odd number of header and text octets to be check summed, the last octet is padded on the right
with zeros to form a 16 bit word for checksum purposes. The pad is not transmitted as part of
the segment. While computing the checksum, the checksum field itself is replaced with zeros.
Urgent Pointer (16): Indicates the ends of urgent data. This field communicates the current
value of the urgent pointer as a positive offset from the sequence number in this segment. The
urgent pointer points to the sequence number of the octet following the urgent data. This field
is only be interpreted in segments with the URG control bit set.
Options (32): Options may occupy space at the end of the TCP header and are a multiple of 8
bits in length. All options are included in the checksum. An option may begin on any octet
boundary. There are two cases for the format of an option:
Case 1: A single octet of option-kind.
Case 2: An octet of option-kind, an octet of option-length, and the actual option-data octets.
The option-length counts the two octets of option-kind and option-length as well as the option
data octets.
Page 32 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Ans:
Bus Topology is a network setup in which each computer and network device are connected to a
single cable or backbone. Bus uses a common backbone to connect all devices. A single cable, the
backbone functions as a shared communication medium that devices attach or tap into with an
interface connector. A device wanting to communicate with another device on the network sends a
broadcast message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message.
Page 33 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
(a) Draw and explain the functions of various layer of OSI Reference model.
(Layered structure 1 mark; functions of layers - 7 marks)
(Diagram - 2 marks; explanation of layers functions - 6 marks)
Ans:
OSI model (open system interconnection) model was developed by ISO (international standard
organization)
Function of OSI model
1) It provides way to understand how internet work operates.
2) It gives guideline for creating network standard. OSI model has 7 layers as shown in the
figure.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
OSI model has following 7 layers as Physical layer, data link layer, Network layer, Transport
layer, session layer, presentation layer, application layer.
Physical layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It deals with mechanical and electrical specifications of interface and transmission
medium. For transmission it defines procedures and functions that devices and transmission
medium has to perform.
Data link layer: It is responsible for transmitting group of bits between the adjacent nodes.
The group of bits is called as frame. The network layer passes a data unit to the data link
layer. Header and trailer is added to the data unit by data link layer. This data unit is passed
to the physical layer. Data link layer is responsible for moving frames from one node to the
next. Functions of data link layer are:
Page 34 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
1) Framing
2) Physical addressing
3) Flow control
4) Error control
5) Media access control
6) Node to node delivery
Network layer: It is responsible for routing the packets with in the subnet i.e. from source to
destination. It is responsible for source to destination delivery of individual packets across
multiple networks. It ensures that packet is delivered from point of origin to destination.
Functions of network layer
1) logical addressing
2) Routing.
3) Congestion control
4) Accounting and billing
5) Address transformation
6) Source host to destination host error free delivery of packet.
Transport layer: Responsibility of process to process delivery of message Ensure that whole
message arrives in order.
Functions of Transport Layer:
1) Service point addressing
2) Segmentation and reassembly
3) Connection control
4) Flow control: Flow control is performed end to end
5) Error control
6) Quality of service
Page 35 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Functions:
Network virtual terminal, file transfer access and management, mail services and directory
services
Ans:
The Internet layer of TCP/IP is responsible for addressing, packaging, and routing functions. The
core protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
1) The Internet Protocol (IP) is a routable protocol responsible for IP addressing, routing, and
the fragmentation and reassembly of packets. It has the task of delivering packets from the
source host to the destination host solely based on the IP address in the packet headers. For
this purpose, IP defines packet structures that encapsulate the data to be delivered. It also
defines addressing methods that are used to label the datagram with source and destination
information.
2) The Address Resolution Protocol (ARP) is responsible for the resolution of the Internet layer
address to the Network Interface layer address such as a hardware address. ARP was defined
by RFC 826 in 1982. ARP is used for mapping a network address (e.g. an IPv4 address) to a
physical address like an Ethernet address (also named a MAC address). ARP has been
implemented with many combinations of network and data link layer technologies
3) The Internet Control Message Protocol (ICMP) is responsible for providing diagnostic
functions and reporting errors due to the unsuccessful delivery of IP packets. It is used by
network devices, like routers, to send error messages indicating, for example, that a requested
service is not available or that a host or router could not be reached. ICMP can also be used to
relay query messages.
4) The Internet Group Management Protocol (IGMP) is responsible for the management of IP
multicast groups. It is used by hosts and adjacent routers on IPv4 networks to establish
multicast group memberships. IGMP is an integral part of IP multicast. IGMP can be used for
one-to-many networking applications such as online streaming video and gaming, and allows
more efficient use of resources when supporting these types of applications. IGMP is used
on IPv4 networks.
Page 36 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
(c) State eight advantages of fiber optic cable over other cables.
(Any 8 advantages - 1 mark for each)
Ans:
Fibre optic cable is one of the fastest-growing transmission mediums for both new cabling
installations and upgrades, including backbone, horizontal, and even desktop applications. Fiber
offers a number of advantages over copper.
1. Greater bandwidth
Fiber provides far greater bandwidth than copper and has standardized performance up to 10 Gbps.
Fiber speeds are dependent on the type of cable used. Single-mode cable offers far greater distance
than either 62.5- or 50-micron multimode cable. In addition, fiber optic cable can carry more
information with greater fidelity than copper wire. That’s why telephone and CATV companies are
converting to fiber.
2. Low attenuation and greater distance
Because the fiber optic signal is made of light, very little signal loss occurs during transmission, and
data can move at higher speeds and greater distances. Fiber does not have the 100-meter (9328-ft.)
distance limitation of unshielded twisted pair copper (without a booster). Fiber distances can range
from 300 meters (984.2 ft.) to 40 kilometers (24.8 mi.), depending on the style of cable, wavelength,
and network. Because fiber signals need less boosting than copper ones do, the cable performs
better.
3. Security
Your data is safe with fiber cable. It doesn’t radiate signals and is extremely difficult to tap. If the
cable is tapped, it’s very easy to monitor because the cable leaks light, causing the entire system to
fail. Fiber networks also enable to put all electronics and hardware in one central location, instead
of having wiring closets with equipment throughout the building.
4. Immunity and reliability
Fiber provides extremely reliable data transmission. It’s completely immune to many environmental
factors that affect copper cable. The core is made of glass, which is an insulator, so no electric
current can flow through. It’s immune to Electro Magnetic interference and radio-frequency
interference (EM/RFI), crosstalk, impedance problems, and more. Fiber is also less susceptible to
temperature fluctuations than copper and can be submerged in water.
5. Design
Fiber is lightweight, thin, and more durable than copper cable. Plus, fiber optic cable has pulling
specifications that are up to 10 times greater than copper cable’s. Its small size makes it easier to
handle, and it takes up much less space in cabling ducts. Although fiber is still more difficult to
Page 37 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
terminate than copper, advancements in connectors are making termination easier. In addition, fiber
is actually easier to test than copper cable.
6. Migration
The proliferation and lower costs of media converters are making copper to fiber migration much
easier. The converters provide seamless links and enable the use of existing hardware. Fiber can be
incorporated into network in planned upgrades.
7. Fieldtermination.
Although fiber is still more difficult to terminate than copper, advancements in fiber tools have
made terminating and using fiber in the field easier. Quick fusion splicers enables with auto-
alignments enable fast splicing in the field. Auto-aligning pins ensure accuracy. And the use of pig-
tails and pre-terminated cable make field connections quick and easy.
8. Cost
The cost for fiber cable, components, and hardware is steadily decreasing. Installation costs for
fiber are higher than copper because of the skill needed for terminations. Overall, fiber is more
expensive than copper in the short run, but it may actually be less expensive in the long run. Fiber
typically costs less to maintain, has less much less downtime, and requires less networking
hardware. And fiber eliminates the need to recable for higher network performance.
Page 38 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER-16 EXAMINATION
Model Answer
Page 39 of 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
WINTER– 17 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code: 17429
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.
Ans: A network consists of two or more computers that are linked in order to share resources (Definition
(such as printers and CDs), exchange files, or allow electronic communications. The : 2marks)
computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.
Page 1 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
4. Flexible Handling: A user can log on to a computer anywhere on the network and
access his/her files. This offers flexibility to the user as to where he/she should be
during the course of his/her routine.
Ans: HUB: Hub is a connecting device; it is also known as multiport repeater. It is normally (Hub:1
used for connecting stations in a physical star topology All networks require a central mark,
location to bring media segments together. These central locations are called hubs. A hub Types:
organizes the cables and relays signals to the other media segments. 1mark )
Ans: Twisted pair cabling is a type of wiring in which two conductors of a single circuit are (Relevant
twisted together for the purposes of canceling out electromagnetic interference (EMI) explanation
from external sources; for instance, electromagnetic radiation from unshielded twisted pair : 2 marks)
(UTP) cables, and crosstalk between neighboring pairs.
f) State any two advantages of coaxial cable. 2M
Ans: To reduce the design complexity, most of the networks are organized as a series of layers (Relevant
or levels, each one build upon one below it. Layered architecture is to divide the design explanation
into small pieces. Each layer adds to the services provided by the lower layers in such a : 2 marks)
manner that the highest layer is provided a full set of services to manage communications
and run the applications. The benefits of the layered architecture is modularity and clear
interfaces, i.e. open architecture and comparability between the different provider’s
components.
Page 2 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., (IP
computer, printer) participating in a computer network that uses the Internet Protocol for address: 1
communication. An IP address serves two principal functions: host or network interface mark,
identification and location addressing. IPv4 address is of 32 bit. Classes
Listing: 1
The IPv4 addresses are classified into 5 types as follows: mark)
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Ans: The Computer network facilitates centralized network management in following aspects (Each
facility: 1
1. Management of Software: Expensive software can be installed on one centralized mark)
computer and they can be accessed by other computers in a network.
2. Maintenance of network: Because of centralized management, maintenance of
network becomes easy an administrator can keep track of network performance, speed
and security from centralized computer
3. Keeping data Backup: It may happen that the data on any one computer system is
accidently lost due to system failure, computer viruses or human error. To avoid this,
data from computer system’s disk is copied to some other medium for keeping it safe.
Such backups are important to retrieve the lost data.
4. Network security: It becomes easy to maintain network with respect to virus and
malware attacks using centralized management
b) Describe router with neat and labeled diagram. State the situation under which 4M
router are necessary in network.
Routers are devices that help in determining the best path out of the available paths, for
a particular transmission. They consist of a combination of hardware and software.
Page 3 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
The two main kinds of software in a router are the operating system and the routing
protocol.
Routers use logical and physical addressing to connect two or more logically separate
networks.
Messages are stored in the routers before re-transmission, routers are said to implement
a store-and-forward technique.
Fig: Router
The router is a fundamental building block of modern business networks, providing traffic
with a gateway to both the Internet and other networks. Routers play important roles
on a network, with many combined with other devices such as firewalls, modems and
switches to provide networking solutions.
Ans: (Diagram:
MODEM: Modem works as modulator as well as demodulator. Modem converts analog 2 marks,
signal to digital signal and vice versa. In case of networking data has to be transferred Explaintion
from one location to another location. At present to transfer such data whatever the :2 marks)
infrastructure (PSTN) is available is of analog technology but computer sends digital data
to transfer this data to another location. Thus it is needed to convert into analog format so
that it can be transferred by using currently available infrastructure
Fig: Modem
Page 4 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) What is meant by file sharing and printer sharing? How this can be achieved? 4M
Ans: 1. File sharing: It is the practice of distributing or providing access to digital media, such (Explanatio
as computer programs, multimedia (audio, images and video), documents or electronic n: 1mark
books. Each, How
it can be
File sharing typically involves word-processing files, spreadsheets, and other files to achieved(A
which many people need regular access. It requires a shared directory or disk drive that ny Relevant
many users can access over the network, along with the underlying programming logic answer):
needed to make sure that more than one person doesn’t make changes to a file at the 1mark
same time (called file locking). The reason you don’t want multiple people making each)
changes to a file at the same time is that they might both be making conflicting changes
simultaneously without realizing it.
2. Printer sharing: Printer sharing is beneficial to many users as they can share costly &
higher quality printers. Printer sharing can be done in several different ways on
network.
The most common way is to use printer queues on server. The printer queue holds print
job until any currently running print jobs are finished & then automatically send the
waiting jobs to the printer i.e. printer connected to server. Another way to share printer
on a network is that each workstations accesses the printer directly.
1) File sharing: File sharing is the primary feature of network. Due to use of networks,
the sharing of files becomes easier. File sharing requires a shared directory or disk drive to
which many users can access over the network. When many users are accessing the same
file on the network, more than one person can make changes to a file at the same time.
They might both making conflicting changes simultaneously.
2) Printer sharing: Printer sharing is beneficial to many users as they can share costly &
higher quality printers. Printer sharing can be done in several different ways on network.
The most common way is to use printer queues on server. The printer queue holds print
job until any currently running print jobs are finished & then automatically send the
waiting jobs to the printer i.e. printer connected to server. Another way to share printer on
a network is that each workstations accesses the printer directly.
Page 5 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3) Application services: You can also share application on a network. For example you
can have a shared copy of Microsoft office or some other application & keep it on the
network server. Another application services you can have on the network is shared
installation i.e. contents of CD-ROM copy to the server, then run the installation the
installing application mush faster & more convenient.
4) E- mail services: E-mail is extremely valuable & important feature for communication
within organization or outside the people in world. E-mail service can be used by user in
two different ways: 1. File based 2.Client File based e-mail system requires gateway
server for connecting or handling the e-mail interface between the two systems using
gateway software that is part of the file-based e-mail system. A client-server e-mail
system is one where an e-mail server containing the messages & handles all incoming &
outgoing mail. It is more secure & powerful than file based e-mail system.
5) Remote access: Using this feature user can access their file & e-mail, when they are
travelling or working on remote location. It enables users to access to centralized
application, stored private or shared files on LAN.
6) Internet & Intranet: Internet: It is public network. This consists of thousands of
individual networks & millions of computers located around the world. Internets have
many different types of services available such as e-mail, the web & Usenet newsgroups.
Intranet: It is private network or it is company’s own network. Company use this feature
for internal use. For example: company establish its own web server, for placing
documents such as employee handbooks, purchases form or other information that
company publishes for internal use. It also has internet services such as FTP servers or
Usenet servers.
Page 6 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: Satellite Communication: In satellite communication, signal transferring between the (Diagram:
sender and receiver is done with the help of satellite. In this process, the signal which is 2 marks,
basically a beam of modulated microwaves is sent towards the satellite called UPLINK Explanatio
(6Ghz). Then the satellite amplifies the signal and sent it back to the receiver’s antenna n: 2 marks)
present on the earth’s surface called as DOWNLINK (4Ghz), as shown in the diagram
given
Ans: (Any 4
difference
Client server Network Peer to peer network
:1mark
Centralized management. Decentralized management.
each )
In this server has more power & client In this each machine has same power
has less power.
It is hardware intensive. Uses less expensive computer
hardware.
Complex to setup & require Easy to setup & administrator.
professional administrator.
Very secure Less secure
Network O.S required Network O.S not required
It support large Network It support small Network
Page 7 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: 1. The first mobile telephone system had a single channel for both sending and receiving (Any
in as early as 1946. relevant
2. Second development took place in 1960s. This was called Improved Mobile answer: 4
Telephone System (IMTS) marks)
3. It had a strong transmitter and used for two frequencies – one for sending and other for
receiving.
4. The third step was the development of Advanced Mobile Phone system (AMPS), the
area covered is conceptually divided in small regions known as cells, thus the name
cellular phones. Each cell has an antenna and a cell office to control that cell.
5. MTSO controls various such cell offices and coordinates the communication between
them and the Telephone central office
6. Telephone central office is a part of the wired land telephone system.
7. The computer at MTSO is responsible for not only the connections but also for the
information and billing of cells
8. The typical cell radius size is 0 to 12 miles.
a) With neat diagram explain client server network along with its advantages and 4M
disadvantages.
Ans: The servers stores all the network's shared files and applications programs, such as (Diagram:
word processor documents, compilers, database applications, spreadsheets, and the 1 mark ,
network operating system. Explanatio
Client will send request to access information from the server based on the request n:1 mark,
server will send the required information to the client. Any 2
Advantages
:1 mark,
Any 2
Disadvanta
ges:1 mark)
Page 8 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
7) Reduces Data duplication by storing data stored on the servers instead of each
client, so it reduces the amount of data duplication for the application.
Ans: (Diagram:
2 marks,
Explanatio
n: 2 marks)
In a mesh network topology, each of the network node, computer and other devices,
are interconnected with one another.
Every node not only sends its own signals but also relays data from other nodes.
In fact a true mesh topology is the one where every node is connected to every other
node in the network.
This type of topology is very expensive as there are many redundant connections, thus
it is not mostly used in computer networks.
It is commonly used in wireless networks.
Flooding or routing technique is used in mesh topology.
Ans: OSI model (open system interconnection) model was developed by ISO (international (Diagram:
standard organization) 1 mark,
Explanatio
Function of OSI model: n: 3 marks)
Page 9 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer
OSI model has following 7 layers as Physical layer, data link layer, Network layer,
Transport layer, session layer, presentation layer, application layer.
1. Physical layer:
o It co-ordinates the functions required to transmit bit stream over physical medium.
o It deals with mechanical and electrical specifications of interface and transmission
medium.
o For transmission it defines procedures and functions that devices and transmission
medium has to perform
Physical characteristics of interfaces and media.
Representation of bits: Data rate (transmission rate).
Synchronization of bits.
Line configuration: Point to point or multipoint configuration should be
used.
3. Network layer:
o It is responsible for routing the packets within the subnet i.e. from source to
destination.
o It is responsible for source e to destination delivery of individual packets across
multiple networks.
o It ensures that packet is delivered from point of origin to destination.
o Functions of network layer:
logical addressing
Page 10 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Routing.
Congestion control
Accounting and billing
Address transformation
Source host to destination host error free delivery of packet.
4. Transport layer:
o Responsibility of process to process delivery of message Ensure that whole
message arrives in order.
o Functions of Transport layer:
Service point addressing
Segmentation and reassembly
Connection control
Flow control: Flow control is performed end to end.
Error Control
5. Session layer:
o Establishes, maintains, and synchronizes the interaction among communication
systems
o It is responsible for dialog control and synchronization.
o Functions of Session layer:
Dialog control
Synchronization, session and sub session
Session closure
6. Presentation layer:
o It is concerned with syntax, semantics of information exchanged between the two
systems.
o Functions of Presentation layer:
Translation: presentation layer is responsible for converting various
formats into required format of the recipient
Encryption: Data encryption and decryption is done by presentation layer
for security.
Compression and Decompression: data to be transform compressed while
sending and decompress while receiving for reducing time of transmission.
7. Application layer:
o It enables user to access the network.
o It provides user interfaces and support for services like email, remote file access.
o Functions of Application layer:
Network virtual terminal
file transfer access and management
mail services and directory services
Page 11 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: (Diagram:
2 marks,
Explanatio
n: 2 marks)
Explanation:
The protocols operating at the various layers work together to supply a unified quality
of service.
Each protocol layer provides a service to the layers directly above and below it.
The process of adding the headers and trailers to the data is called as data
encapsulation.
A packet(header and data ) at level 7 is encapsulated in a packet at level 6.The whole
packet at level 6 is encapsulated in a packet at level 5, and so on. In other words, the
data portion of a packet at level N-1 carries the whole packet (data and header and
maybe trailer) from level N.
e) State any four protocol associated with application layer of OSI model. 4M
Ans: Protocol associated with Application layer of OSI Reference model are (Any 4
correct
1. Virtual Terminal (TELNET) protocols: 1
2. File transfer Protocol (FTP) mark each
3. Simple Mail Transfer Protocol (SMTP) )
4. Hypertext Transport Protocol (HTTP)
5. Domain Name System (DNS)
Page 12 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: (Any 4
SLIP PPP correct
points: 1
Serial Line Internet Protocol does not In PPP, LCP (Line Control Protocol)
mark each
establish or maintain connection is responsible for establishing,
)
between the client and ISP server. maintaining and termination
connection between two end points.
Communication starts once the Communication begins only after
connection between two modems are authentication and the types of traffic
established. is sent by the client.
Type of traffic cannot be selected in Type of traffic can be selected by
SLIP. NCP ( Network Control Protocol)
No protocol for termination. IPCP/IP (Control Protocol) terminates
a network layer connection between
the user and ISP.
No addressing mechanism provided. Additional services for addressing
mechanism is provided
Doesn’t allow error control Allows error control
No provision for data compression Provides Data compression.
Ans: (Diagram:
1mark,
Explanatio
n: 3marks )
Most widely used protocol for interconnecting computers and it is the protocol of the
internet.
1. Protocol is used to connect the host, so that the packets can be sent over it.
2. Varies host to host and network to network.
1. Protocols used in this layer are high level protocols such as TELNET, FTP (file
transfer protocol etc.
Ans: (Relevant
An IP address has two components, the network address and the host address. Explanatio
A subnet mask separates the IP address into the network and host addresses. n:4 marks)
In Internet Protocol (IP) networking, devices on a subnet share contiguous ranges of
IP address numbers.
A mask (known as the subnet mask or network mask) defines the boundaries of an IP
subnet.
The correspondence between subnet masks and IP address ranges follows defined
mathematical formulas.
IT professionals use subnet calculators to map between masks and addresses.
A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address
into network address and host address.
Page 14 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Subnet Mask is made by setting network bits to all "1"s and setting host bits to all
"0"s. Within a given network, two host addresses are reserved for special purpose, and
cannot be assigned to hosts.
The "0" address is assigned a network address and "255" is assigned to a broadcast
address, and they cannot be assigned to hosts.
Subnet masking for 2 subnet: To calculate the number of subnets or nodes, use the
formula (2n-2) where n = number of bits in either field, and 2n represents 2 raised to
the nth power. Multiplying the number of subnets by the number of nodes available
per subnet gives you the total number of nodes available for your class and subnet
mask. Also, note that although subnet masks with noncontiguous mask bits are
allowed, they are not recommended.
Example:
10001100.10110011.11011100.11001000 140.179.220.200 IP Address
11111111.11111111.11000000.00000000 255.255.192.000 Subnet Mask
--------------------------------------------------------------------------------------------------
10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address
Hence Subnet number Address
140.179.64.0
140.179.128.0
Ans: (Any 4
correct
GUIDED MEDIA UNGUIDED MEDIA points:1
Also called as bounded or wired media Also called as unbounded or wireless mark each
media )
Point to point connection i.e. signal Used for radio broadcasting in all
travelling is directed directions i.e. signal travelling is
undirected
Transport signal in electric current or Transport signal in the form of
light/ beam electromagnetic waves
Unidirection, not broadcast Broadcast
Installation is costly and time Installation needs less time and money
consuming
Wired media leads to discrete network Wireless media leads to continuous
topologies network topologies
Attenuation depends exponentially on Attenuation is proportional to square
the distance of the distance
Example: Twisted Pair cable, Coaxial Example: Radio, Infrared light,
cable, Fibre optic cable Microwave
Page 15 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: (Any 4
IPV6 IPV4 correct
Source and destination addresses are Source and destination addresses are points:1
128 bits (16 bytes) in length. For more 32 bits (4 bytes) in length. mark each
information. )
e) Write the names of layer that performs the following function in OSI. 4M
1) 1)Data encapsulation 2) Error detection 3) File transfer 4) Encoding
Ans: (For each
1. Data Encapsulation- Transport Layer, Data Link Layer. (All OSI Layers) correct
layer:1
2. Error Detection-Data link layer and Transport Layer mark)
Page 16 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: (Any 4
LAN WAN correct
Covers Local areas only (e.g. homes, Large geographic areas(e.g. cities, points:1
offices, schools) states, nations) mark each
Definition LAN (Local Area Network) is a WAN (Wide Area Network) is a )
computer network covering a computer network that covers a
small geographic area, like a broad area (e.g., any network
home, office, school, or group whose communications links cross
of buildings. metropolitan, regional, or national
boundaries over a long distance).
Speed High speed (1000 mbps) Less speed (150 mbps)
Data transfer LANs have a high data transfer WANs have a lower data transfer
rates rate. rate compared to LANs.
Example The network in an office Internet is a good example of a
building can be a LAN WAN
Connection One LAN can be connected to Computers connected to a wide-
other LANs over any distance area network are often connected
via telephone lines and radio through public networks, such as
waves. the telephone system. They can
also be connected through leased
lines or satellites.
Data Experiences fewer data Experiences more data
Transmission transmission errors transmission errors as compared to
Error LAN
Ownership Typically owned, controlled, WANs (like the Internet) are not
and managed by a single person owned by any one organization but
or organization. rather exist under collective or
distributed ownership and
management over long distances.
Set-up costs If there is a need to set-up a For WANs since networks in
couple of extra devices on the remote areas have to be connected
network, it is not very the set-up costs are higher.
expensive to do that.
Geographical Have a small geographical Have a large geographical range
Spread range and do not need any generally spreading across
leased telecommunication lines boundaries and need leased
telecommunication lines
Maintenance Because it covers a relatively Maintaining WAN is difficult
costs small geographical area, LAN is because of its wider geographical
easier to maintain at relatively coverage and higher maintenance
low costs. costs.
Bandwidth High bandwidth is available for Low bandwidth is available for
transmission. transmission.
Geographical Have a small geographical Have a large geographical range
Spread range and do not need any generally spreading across
leased telecommunication lines boundaries and need leased
telecommunication lines
Page 17 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b) Describe repeater. State the situation under which repeater are necessary in 4M
network.
Page 18 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Diagram:
Page 19 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: {**Note: IPv4 or IPv6 packet header shall be considered as the answer for IP frame (Diagram:
header. **} 2marks,
Explanatio
IPv4 header: n: 2marks)
HLEN
Version Service Type
(4 Total Length ( 16 bits)
(4 Bits) (ToS) (8 Bits)
bits)
Flags Fragmentation offset ( 13
Identification ( 16 bits)
( 3bits) bits)
Time to Live Protocol
Header Checksum ( 16 bits)
(TTL) (8 bits) ( 8 bits)
Source IP address (32 bits)
Destination IP address (32 bits)
Page 20 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Header length (HLEN): This indicates the size of the header in a multiple of 4 byte
words. When the header size is 20 bytes, HLEN = 5, and HLEN = 15 when maximum size
(60 bytes).
Service Type (Type of Service): This field is used to define service parameters such as
the priority of the datagram and the level of reliability desired.
Total Length: This field contains the total length of the IP datagram. IP datagram cannot
be more than 65,536 since this filed size is 2 bytes or 16 (216 = 65,536).
Identification: This field is used in the situations when a datagram is fragmented. The sub
datagram are sequenced using identification field so that later it can be used to reconstruct
the original datagram.
Flags: This field corresponds to identification field. It indicates whether a datagram can
be fragmented and if fragmented, the position of the fragment (first, last or middle).
Fragmentation Offset: If a datagram is fragmented, this field indicates the offset of the
data in the original datagram before segmentation. This is used while reconstructing.
Time to Live (TTL): This filed is initialized by some value and decremented each time it
passes through routers. If the value becomes zero or negative, the data is not forwarded.
Thus it decides the lifetime of the data.
Protocol: This field identifies the transport protocol running on top of IP. The upper layer
software piece can be TCP or UDP. This field specifies which piece of software at the
destination node the datagram should be passed on to.
Source address: This field contains the 32 bit IP address of the sender.
Destination address: This field contains the 32 bit IP address of the final destination.
OR
Page 21 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
IPv6 header:
IPv6 fixed header is 40 bytes long and contains the following information.
Traffic Class (8-bits): These 8 bit are divided into two parts. The most significant 6 bits are
used for Type of Service to let the Router Known what services should be provided to this
packet. The least significant 2 bits are used for Explicit Congestion Notification (ECN).
Flow label (20-bits): This label is used to maintain the sequential flow of the packets
belonging to a communication. The source labels the sequence to help the router identify that a
particular packet belongs to a specific flow of information. This field helps avoid re- ordering
of data packets. It is designed for streaming/real –time media.
Payload Length (16-bits): This field is used to tell the routers how much information a
particular packet contains in its payload. Payload is composed of Extension Headers and Upper
Layer data. With 16 bits, up to 65535 bytes can be indicated, but if the Extension Headers
contain Hop-by-Hop Extension Header, then the payload may exceed 65535 bytes and this
field is set to 0.
Next Header (8-bits): This field is used to indicate either the type of Extension Header, or if
the Extension Header is not present then it indicates the Upper Layer PDU. The values for the
type of Upper Layer.
Hop Limit (8-bits): This field is used to stop packet to loop in the network infinitely. This is
same as TTL in IPV4. The value of Hop Limit field is decremented by 1 as it passes a link
(router/hop). When the field reaches 0 the packets is discarded.
Source Address (128-bits): This field indicates the address of originator of the packet.
Destination Address (128–bits): This field provides the address of intended recipient of the
packet.
Page 22 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) Explain working of data link layer and network layer of OSI model. 8M
Working:
It is responsible for transmitting group of bits between the adjacent nodes.
The group of bits is called as frame.
The network layer passes a data unit to the data link layer. Header and trailer
information is added to the data unit by data link layer.
This data unit is passed to the physical layer.
Data link layer is responsible for moving frames from one node to the next.
Functions of data link layer include Framing, Physical addressing, Flow control, Error
control, Media access control, Node to node delivery.
Page 23 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Network layer:
It is responsible for routing the packets within the subnet i.e. from source to
destination.
It is responsible for source e to destination delivery of individual packets across
multiple networks.
It ensures that packet is delivered from point of origin to destination.
Working:
Network layer chooses a route before sending all the packets belonging to the same
message.
A header is added to a packet, which includes source and destination addresses.
Any congestion at a node is tackled by the network layer.
When there are multiple subnet operators of different types, the different rates are
charged by the network layer as an accounting function.
Functions of network layer include Logical addressing, Routing, Congestion control,
Accounting and billing, Address transformation and Source host to destination host
error free delivery of packet.
Page 24 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Functions:
Local host maintains the ARP Table. ARP maps the Internet Protocol address (IP)to a
physical machine address.
It provides the interface between the IP addressing system used by IP and the
Hardware addresses used by the data link layer protocol.
ARP broadcasts an IP address in an effort to discover its equivalent hardware address.
ARP has been implemented with many combinations of network and data link layer
technologies.
Responsible for ARP query and ARP response datagram.
Maintains ARP cache so that if the same query has been processed earlier, new
broadcast message is not created but, it checks in the ARP cache.
Page 25 of 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.
Ans: It is the complete unit transmitted by sending computer over the network medium. (Any correct
OR definition: 2
A packet is the unit of data that is routed between an origin and a destination on the marks)
Internet or any other packet-switched network.
Satellite network
Medical Science
Remote Sensing Radar uses microwave radiation to detect range, speed & other
characteristics of remote object
Page | 1
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
c) Give the problem faced in ring topology. 2M
d) State whether the bus is active or passive network. Justify your answer. 2M
In the bus topology the major component is the backbone cable. The communication
takes place through it and this backbone does not do any amplification or correction of
signals passed through that’s why bus can be called as passive network
TCP/IP
Ans: File sharing: The major advantage of computer network is that it allows file sharing (1 mark each
and remote file access. A person sitting at one workstation that is connected to a for any 2
network can easily see files present on another workstation, provided he/she is correct
authorized to do so. advantages)
Page | 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Resource Sharing: A computer network provides a cheaper alternative by the
provision of resource sharing. All the computers can be interconnected using a
network and just one modem & printer can efficiently provide the services to all
users.
Flexible Handling: A user can log on to a computer anywhere on the network and
access his/her files. This offers flexibility to the user as to where he/she should be
during the course of his/her routine.
Ans: Transmission media is broadly classified into two groups. (1 mark each
for 2 types)
Wired or Guided Media or Bound Transmission Media
(b) Microwave
(c) infrared
Page | 3
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
i) State any four topologies. 2M
Star
Mesh
Tree
Hybrid
Ans: The reliability of network is high because the failure of the computer in the (1 mark each
network does not affect the functioning for other computers. for any 2
correct
Resource Sharing characteristi
cs)
Addition of new computer to network is easy.
Ans: Twisted pair cabling are used in network because its wiring has two conductors of a (2 mark for
single circuit are twisted together for the purposes of canceling out electromagnetic explanation)
interference (EMI) from external sources; for instance, electromagnetic radiation from
unshielded twisted pair (UTP) cables, and eliminates crosstalk between neighboring
pairs.
Page | 4
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
l) State any 2 advantages of co-axial cable. 2M
m) Define protocol. 2M
Ans: It is defined as set of rules and regulations to communicate between layers. (Any correct
definition 2
marks)
Page | 5
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
PAN:
1. A PAN is personal area network is used for communication among computer
devices close to one’s person.
CAN:
1. CAN is a Campus Area Network is used to connect buildings across
campuses of colleges or Universities.
LAN:
1. LAN is local area network. LAN is privately-owned networks covering a
small geographic area(less than 1 km), like a home, office, building or group
of buildings.
MAN:
1. A Metropolitan Area Network (MAN) is a large computer network that spans
a metropolitan area or campus.
Page | 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
4. The organization can pass their Ethernet frames to the service provider
MAN; the service provider will carry their frames across the MAN; and then
deliver the frames to the destination site.
5. From the customer's point of view, the MAN looks like one big (long)
Ethernet link between their offices.
6. The different sites could belong to the same IP subnet, and from the
customer's viewpoint, no routing is required between their sites.
WAN:
1. WAN is wide area network.
Page | 7
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Disadvantages:
Expensive dedicated hardware.
d) With the help of neat diagram, describe working of fiber optic cable. 4M
Page | 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Working:
1. Fiber optics transmits signals in the form of light.
How ray of light changes direction when going from one substance to another.
3. When the angle of incidence i is less than critical angle then the ray refracts.
4. Angle of incidence i is equal to critical angle then, the rays bends along the surface.
5. When the angle of incidence i is greater than critical angle, then the ray reflects.
6. The ray incident above the critical angle it is trapped in the fiber.
Page | 9
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
e) State the functions of data link layer. 4M
Ans: Data link layer: It is responsible for transmitting group of bits between the adjacent (1 mark for
nodes. The group of bits is called as frame. The network layer passes a data unit to the each correct
data link layer. Header and trailer is added to the data unit by data link layer. This data function, any
unit is passed to the physical layer. Data link layer is responsible for moving frames 4 function)
from one node to the next.
Frame traffic control: tells the transmitting node to "back-off" when no frame
buffers are available.
Media access management: determines when the node "has the right" to use the
physical medium.
Ans: 1. An IP address has two components, the network address and the host address. (2 marks
2. A subnet mask separates the IP address into the network and host addresses. Explanation,
3. In Internet Protocol (IP) networking, devices on a subnet share contiguous 2 marks
ranges of IP address numbers. Example)
4. A mask (known as the subnet mask or network mask) defines the boundaries of
an IP subnet.
5. The correspondence between subnet masks and IP address ranges follows
defined mathematical formulas.
6. IT professionals use subnet calculators to map between masks and addresses.
7. A Subnet mask is a 32-bit number that masks an IP address, and divides the IP
address into network address and host address.
8. Subnet Mask is made by setting network bits to all "1"s and setting host bits to
all "0"s. Within a given network, two host addresses are reserved for special
Page | 10
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
purpose, and cannot be assigned to hosts.
9. The "0" address is assigned a network address and "255" is assigned to a
broadcast address, and they cannot be assigned to hosts.
10. Subnet masking for 2 subnet: To calculate the number of subnets or nodes, use
the formula (2n-2) where n = number of bits in either field, and 2n represents 2
raised to the nth power. Multiplying the number of subnets by the number of
nodes available per subnet gives you the total number of nodes available for your
class and subnet mask. Also, note that although subnet masks with non-
contiguous mask bits are allowed, they are not recommended.
Example:
10001100.10110011.11011100.11001000 140.179.220.200 IP Address
11111111.11111111.11000000.00000000 255.255.192.000 Subnet Mask
--------------------------------------------------------------------------------------------------
10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address
Hence Subnet number Address
1. 140.179.64.0
2. 140.179.128.0
Page | 11
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
b) Explain tree topology with neat diagram. 4M
Ans: (Note: Any other diagram showing central hub and other connection may also be (Diagram
considered) :2marks,
Explanation:
2 marks)
Explanation:
Tree has a hierarchy of various hubs, like branches in a tree, hence the name. Tree
topology can be derived from the star topology. Figure shows that every node is
connected to the same hub. However, only few nodes are connected directly to the
central hub.
The central hub contains a repeater, which looks at the incoming bits and regenerates
them afresh as full blown signals for 0 or 1 as per case. This allows the digital signals to
traverse over longer distances. Therefore, the central hub is also called active hub. The
tree topology also contains many secondary hubs, which may be active hubs or passive
hubs.
Page | 12
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
c) Enlist any four communication bands for unguided media with their frequency 4M
range.
Ans: (Any 4
Communicat
ion bands
with correct
range : 1
mark each)
Page | 13
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Ans: OSI model (Open System Interconnection) model was developed by ISO (international (Diagram: 1
standard organization) which provides way to understand how internetwork operates. It mark,
gives guidelines for creating network standard. Explanation:
OSI model has 7 layers as shown in the figure. 3 marks)
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer
The OSI model takes the task of internetworking and divides that up into what is
referred to as a vertical stack that consists of the following 7 Layers.
Page | 14
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal —
through the network at the electrical and mechanical level. It provides the hardware
means of sending and receiving data on a carrier, including defining cables, cards and
physical aspects.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error handling, congestion
control and packet sequencing.
Transport (Layer 4)
Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and
is responsible for end-to-end error recovery and flow control. It ensures complete data
transfer from source to destination.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection
coordination.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g.,
encryption) by translating from application to network format, and vice versa. The
presentation layer works to transform data into the form that the application layer can
accept. This layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the syntax & semantics.
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Everything at this
layer is application-specific. This layer provides application services for file.
Page | 15
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
f) State different IP address classes. Explain any one in brief. 4M
Ans: Different IP address classes in IPv4:- Class A, Class B, Class C, Class D, Class E. (List of
classes: 1
Class A : mark, Any
one class
explanation:
3 marks)
In this, the first bit is ‘0’. The next 7 bits are used indicate network id. Rest of the 3
bytes are used to indicate host id. Class A: Minimum value is 0.0.0.0 and maximum
value 127.255.255.255. In this class, number of hosts that can be connected to each
network (216) is more than the number of networks (27).
Class B :
In this, the first two bits are ‘1 0’. The next 14 bits are used indicate network id. Rest of
the 2 bytes are used to indicate host id. Class A: Minimum value is 128.0.0.0 to
maximum value 191.255.255.255. In this class, number of hosts that can be connected to
each network (214) is almost the same as the number of networks (216).
Class C :
In this, the first three bits are ‘1 1 0’. The next 21 bits are used indicate network id. Rest
of the One byte is used to indicate host id. Class A: Minimum value is 192.0.0.0 to
maximum value 223.255.255.255. In this class, number of hosts that can be connected to
each network (28) is very less compared to the number of networks (221).
21bits 8 bits (4th byte) Minimum value
Class D:
If first 4 bits are ‘1 1 1 0’ the IP address belongs to class D. The IPv4 networking
standard defines Class D addresses as reserved for multicast. Multicast is a mechanism
for defining groups of nodes and sending IP messages to that group rather than to every
node on the LAN (broadcast) or just one other node (unicast). Multicast is mainly used
on research networks. As with Class E, Class D addresses should not be used by
ordinary nodes on the Internet. For class D minimum value for multi cast address is
224.0.0.0 and maximum multi class address is 239.255.255.255.
Page | 16
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Class E:
If first 5 bits are ‘1 1 1 1 0’ the IP address belongs to class E. For class E minimum
value for reserved address is 240.0.0.0 to 255.255.255.255. These are used for research
work in IP addresses.
2. Data transfer: Data transfer involves transmitting data between the devices over the
virtual circuit.
Page | 17
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
OR
Page | 18
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
b) What is transceiver? State the advantages and disadvantages of it. 4M
Ans: Transceivers: These are devices that both transmit and receive. Transceivers are used to (Definition: 2
connect nodes to the various Ethernet media. Most computers and network interface marks, Any 2
cards contain a built-in 10BaseT or 10Base2 transceiver, allowing them to be connected Advantages:
directly to Ethernet without requiring an external transceiver. Many Ethernet devices ½ mark
provide an AUI connector to allow the user to connect to any media type via an external each; Any 2
transceiver. The transceiver is responsible for transmitting, receiving, and detecting Disadvantag
collisions. The transceiver is connected to the station via a transceiver cable that es: ½ mark
provides separate paths for sending and receiving. each.)
Advantages:
2. The same device can provide path for send and receive signals.
Disadvantages:
c) Draw a sketch of shielded twisted pair cable and describe any two characteristics. 4M
Page | 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Characteristics:
It has metal shield that covers twisted pair.
STP costs more than UTP but less than fiber-optic cable.
STP can theoretically run at 50OMbps for a 100-meter cable length.
STP eliminates Cross talk.
The requirement for special connectors can make STP more difficult to install
than UTP.
It is less noisy, so signal is more secure as compared to UTP.
Since it has a metal foil or braided mesh, it is bulkier.
Ans: (Diagram: 2
marks,
Explanation:
2 marks)
OR
Page | 20
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Explanation:
The protocols operating at the various layers work together to supply a unified quality of
service. Each protocol layer provides a service to the layers directly above and below it.
The process of adding the headers and trailers to the data is called as data
encapsulation.
A packet(header and data ) at level 7 is encapsulated in a packet at level 6.The whole
packet at level 6 is encapsulated in a packet at level 5, and so on. In other words, the
data portion of a packet at level N-1 carries the whole packet (data and header and
maybe trailer) from level N.
Page | 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
e) Explain horizontal and vertical communication. 4M
Ans: (Note: Either a single diagram (2M) or Individual (each 1M) may be considered) (Horizontal
communicati
on: 2 marks,
Vertical
communicati
on: 2 marks)
Horizontal Communication:
When the packet arrived at its destination, the process by which the headers are
applied at the source is repeated in server.
Page | 22
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Application layer of Host A machine communicates with Application layer Of
Host B machine. Presentation layer of Host A machine communicates with
presentation layer Of Host B machine. Session layer of Host A machine
communicates with Session layer Of Host B machine. Transport layer of Host A
machine communicates with Transport layer Of Host B machine and so on.
Vertical Communication:
Page | 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
The n/w layer protocol header will specify the name of transport layer protocol to
be used to process the packet.
Due to vertical communication, it becomes protocol at each layer
simultaneously.
Page | 24
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Explanation:
File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying
a file from one host to another. Figure shows the basic model of FTP.
The client has three components: user interface, client control process, and the
client data transfer process. The server has two components: the server control
process and the server data transfer process.
The control connection is made between the control processes. The data
connection is made between the data transfer processes.
The control connection remains connected during the entire interactive FTP
session.
The data connection is opened and then closed for each file transferred. It opens
each time commands that involve transferring files are used, and it closes when
the file is transferred. In other words, when a user starts an FTP session, the
control connection opens. While the control connection is open, the data
connection can be opened and closed multiple times if several files are
transferred.
Separation of commands and data transfer makes FTP more efficient. FTP uses
the services of TCP. It needs two TCP connections.
FTP uses two well-known TCP ports: Port 21 is used for the control connection,
and port 20 is used for the data connection.
Ans: A gateway is a node (router) in a computer network, a key stopping point for (Explanation
data on its way to or from other networks. Using gateways, we are able to communicate s: 2 marks,
and send data back and forth. The Internet wouldn't be any use to us without gateways Diagram
(as well as a lot of other hardware and software). /Any Similar
:2 marks)
A common use for a gateway is to connect a LAN and a Mainframe computer by
changing protocols and transmitting packets between two entirely different networks.
For example, a network designed to use the OSI model can be connected to another
network using the Internet model.
Page | 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Diagram:
Ans: In satellite communication, signal transferring between the sender and receiver is done (Diagram/
with the help of satellite. In this process, the signal which is basically a beam of Any similar:
modulated microwaves is sent towards the satellite called UPLINK (6 Ghz). 2 marks,
Explanation
Then the satellite amplifies the signal and sent it back to the receiver’s antenna present
:2 marks)
on the earth’s surface called as DOWNLINK (4Ghz), as shown in the diagram given
As the entire signal transferring is happening in space. Thus this type of communication
is known as space communication.
The satellite does the functions of an antenna and the repeater together. If the earth along
Page | 26
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
with its ground stations is revolving and the satellite is stationery, the sending and
receiving earth stations and the satellite can be out of sync over time.
Therefore Geosynchronous satellites are used which move at same RPM as that of the
earth in the same direction. So the relative position of the ground station with respect to
the satellite never changes. However 3 satellites are needed to cover earth’s surface
entirely.
Ans: Token passing: when hosts want to transmit data, it should hold the token, which is an (Token
empty packet. The token is circling the network in a very high speed. Passing
explaination:
If any workstation wants to send data, it should wait for the token. When the token has
2 marks,
reached the workstation, the workstation can take the token from the network, fill it with
Comparison
data, mark the token as being used and place the token back to the network.
: 2 marks:
Compare token passing and CSMA/CD two points)
Point 1:
The token passing is the least sensitive to work load. In token passing when the network
is lightly loaded the overhead is high but it is least sensitive to work load. As the load
increases the throughput does not decrease.
CSMA/CD offers the shortest delay under light load conditions but it is most sensitive to
variations of load. That means when the load increases in CSMA/CD we know that
delay increases significantly particularly when the load is heavy.
Point 2:
Token passing is suitable for real-time traffic because the delay is deterministic.
CSMA/CD it is non-deterministic, how much time it will take is not known. Therefore,
as a consequence in case of CSMA/CD some packets may take very long time to deliver
Page | 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
and there is a possibility that some unfortunate packets will not be delivered
3. Compression:
It is responsible for routing the packets within the subnet i.e. from source to destination.
It is responsible for source e to destination delivery of individual packets across multiple
networks. It ensures that packet is delivered from point of origin to destination.
1. logical addressing
2. Routing.
3. Congestion control
5. Address transformation
Page | 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
e) Compare IPv4 and IPv6. 4M
Ans: (Any 4
points, 1
IPV4 IPV6
mark each)
1. Source and destination addresses are 1. Source and destination addresses are
32 bits (4 bytes) in length. 128 bits (16 bytes) in length.
Page | 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
f) With neat diagram explain DNS in Internet. 4M
Ans: (Diagram/
Any suitable:
1 mark,
Explanation
:3 marks)
The Domain Name System (DNS) is a client/server application that identifies each
host on the Internet with a unique user-friendly name.
DNS organizes the name space in a hierarchical structure to decentralize the
responsibilities involved in naming.
Each node in the tree has a domain name.
A domain is defined as any subtree of the domain name space.
Domain Name system has top level domains such as .edu, .org, .com etc
The name space information is distributed among DNS servers.
A domain name server is simply a computer that contains the database and the
software of mapping between domain names and IP addresses.
Functions of DNS:
Accept request from programs for converting domain names into IP addresses.
Accept request from other DNS servers to convert domain names into IP
addresses
Page | 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
6. Attempt any two: 16 Marks
a) With neat diagram, explain client server network along with its advantages and 8M
disadvantages.
Ans: The servers stores all the network's shared files and applications programs, such as word (Explanation
processor documents, compilers, database applications, spreadsheets, and the network :3 marks,
operating system. Diagram:1
mark,
Client will send request to access information from the server based on the request
Advantages
server will send the required information to the client.
2 marks and
Disadvantag
e: 2 marks)
OR
Page | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Client :
A computer which is seeking any resource from another computer is a Client Computer.
You can think a client as a computer in your network, where a network user is
performing some network activity.
For Example: Downloading a file from a File Server, Browsing Intranet/Internet etc.
The network user normally uses a client computer to perform his day to day work.
Server:
A Server computer is installed with appropriate Operating System and related Software
to serve the network clients with one or more services, continuously without a break.
Features of Servers:
1. It has the centralized control. i.e. centralized user accounts, security, and access
to simplify network administration.
2. It does not slow down with heavy use.
3. The size of the network can be expanded to any size.
4. Proper Management in which all files are stored at the same place. In this way,
management of files becomes easy. Also it becomes easier to find files.
5. As all the data is stored on server it’s easy to make a back-up of it.
6. Reduces Data duplication by storing data stored on the servers instead of each
client, so it reduces the amount of data duplication for the application.
Functions of Router:
Advantage of Router:
Page | 33
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Disadvantage of Router:
It is complex to maintain.
Security Risk.
Router is more expensive
Types of router:
1. Static Router
2. Dynamic Router
Page | 34
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
c) Describe TCP/IP model with suitable diagram. 8M
(Diagram:2
marks,
Explanation
of each layer
:6 marks)
TCP/IP Reference Model: TCP/IP means transmission control protocol and internet
protocol.
TCP/IP that is transmission control protocol and the internet protocol was developed by
Department of Defense’s Project Research Agency (ARPA, later DARPA) under the
project of network interconnection.
Most widely used protocol for interconnecting computers and it is the protocol of the
internet. It has 4 layers as given below.
Page | 35
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Layer 3: Transport Layer
Page | 36
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
b) Define error. 2M
Ans Any distortion or noise occurred during the process of transmission or Correct
reception can be termed as error. definitio
n 2M
c) Compare guided and unguided media (02 points) 2M
Ans
Guided media Unguided media Any two
The signal energy propagates The signal energy propagates points
within the guided media .i.e. through air 1M
through wires each
It is mainly suited for point to It is mainly used for
point line configurations. broadcasting purpose.
The signal propagates in the The signal propagates in the
form of voltage, current or form of electromagnetic waves.
photons.
Examples of guided media are:- Examples are:- Microwave or
Twisted Pair Cable, Co-axial Radio Links Infrared
Cable, Optical Fiber Cable
Page 2 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Need:
1. 1. In order to communicate with other devices in the network, there Need
needs a global addressing scheme. IP addresses are used for logically 1M
addressing the computers.
2. It provides a unique identification of the computer in the network.
g) Compare SLIP and PPP (02 points) 2M
Ans SLIP PPP
Any two
Can be used only with Can be used with multiple
points
TCP/IP. protocols. 1M each
Supports only synchronous Supports synchronous as well as
transmission of data. asynchronous data transmission.
SLIP cannot have auto PPP can auto-configure settings
configure settings.
while SLIP doesn’t Provide PPP provides error detection
error detection and recovery. and recovery.
h) Define Encapsulation 2M
Note: Any explanation or diagram shall be considered. Correct
Ans The protocols operating at the various layers work together to supply definitio
a unified quality of service. Each protocol layer provides a service to n 2M
the layers directly above and below it. The process of adding the
headers and trailers to the data is called as data encapsulation.
Page 3 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
OR
A packet(header and data ) at level 7 is encapsulated in a packet at
level 6.The whole packet at level 6 is encapsulated in a packet at level
5, and so on. In other words, the data portion of a packet at level N-1
carries the whole packet (data and header and maybe trailer) from
level N. The concept is called encapsulation.
OR
Page 4 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
iii)802.5
This standard covers Token Ring
iv)802.11
These are set of standards which wireless Local Area Network
(WLAN) and popularly known as Wireless Fidelity.
Page 5 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans i) Baud rate: The baud rate is the number of times the signal level
changes in a channel per second. Each
definitio
ii) Data Transmission Rate: The data transmission rate is the n 1M
volume of data transmitted over a transmission channel or via a data
interface within a specified unit of time. The units used for this are
baud or bits/s.
iv) Bits per rate: This is the number of bits transmitted per second in
a channel.
b) Compare Analog signal and Digital Signal. 4M
Ans ANALOG SIGNAL DIGITAL SIGNAL
An analog signal has infinitely A digital signal has only a
many levels of intensity over a limited number of values Any
period of time. along its value. four
correct
compari
sons 1M
each
Page 6 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 7 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagra
m 2M
Page 8 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagra
m 2M
Page 9 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Disadvantages of repeater:
Page 10 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
c) Define 4M
i) Wi-fi ii) Wi-Max
Ans i) Wi-Fi
Wi-Fi is the name of a popular wireless networking technology that Wi-Fi
uses radio waves to provide a wireless high-speed Internet and 2M
network connection Wi-Fi is simply a trademarked phrase that means
IEEE 802.11. IEEE 802.11 wireless LAN: The 802.11 architecture
define two types of services and three different types of stations.
802.11 services:
ii) Wi-Max
i) Wi- Max is worldwide interoperability for Microwave Access. It is a Wi-Max
wireless communication standard which can provide data rates up to 2M
1. Gbps: It is refers to interoperable implementation of IEEE 802.16
family of standards.
Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Class E Explana
Class A: tion of
Class A range for first byte is 0-127. Class A type of IP addresses any one
have First byte consisting of Network address with first bit as 0 and class
the next 3 bytes with host id. Hence, number of hosts are more when 3M
compared to number of networks. The default subnet masks for class
A networks is 255.0.0.0. Class A networks have their network
addresses from 1.0.0.0 to 126.0.0.0, with the zero's being replaced by
node addresses.
Class B:
Class B range for first byte is 128-191. This type has first two bytes
specifying network ID with starting two bits as 10 and last two bytes
referring to host ID. The default subnet masks for class B is
255.255.0.0. Network addresses for these ranges from 128.0.0.0 to
191.0.0.0.
Class C:
Class C range for first byte is 192-223. This class has first three bytes
referring to network with starting bits as 110 and last byte signifies
Host ID. Here, number of networks are more when compared to
number of hosts in each network. The default subnet masks for class
C is 255.255.255.0 . The network IP addresses for these range from
192.0.0.0 to 223.0.0.0.
Class D:
Class D range for first byte is 224-239 Class D is used for
multicasting and its starting bits are 1110
Class E:
Class E range for first byte is 240-255 .Class E is reserved for future
use and its starting bits are 1111
Page 12 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
ii) Bridge:
Works on Physical & Data link layer of OSI model.
iii) Hub:
Works on physical layer.
v) Gateway:
Operates on all seven layers of OSI model.
4 Attempt any four of the following 16
a) Enlist and explain functions of application layer of OSI model. 4M
Ans Function of application layer List
1) Network Abstraction 1M
2) File access and transfer
3) Mail Services Explana
4) Remote Login tion
5) Directory Services 3M
6) WWW (World Wide Web)
The application layer is the top-most layer of OSI model. It
provides services directly to user applications.
It provides user interfaces and support for services such as email,
remote file access and transfer, shared database management and
other types of distributed information services.
Network Abstraction: The application layer provides an
abstraction of the underline network to an end user and an
Page 13 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 14 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
c) Describe working of token ring with neat sketch and give its two 4M
advantages.
Ans The Token Ring standard is based on the idea of a circulating token. Workin
A host that processes the token can transmit, others cannot. This g 2M
avoids contentions and collisions in the network. A host that does not
possess the token must wait even if it has data to be sent out. A host
that gets the token either can send a frame and forward the token to
the next host. If it has nothing to send, it simply forwards the token to
the next host.
Diagra
m 1M
Page 15 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Any 2
Advanta
Advantages of LAN: ges 2M
Can connect existing machines together e.g. connect machines of
different departments for better interoperability.
Price is to performance ratio is very good. Mainframes and
minicomputers are much costlier as compare to performances.
Incremental growth: you can add machines to existing network as
and when needed.
Files can be stored on a central computer (the file server) allowing
data to be shared throughout an organization.
Files can be backed up more easily when they are all on a central
file server rather than when they are scattered across a number of
independent workstations.
Networks also allow security to be established, ensuring that the
network users may only have access to certain files and
applications.
Software and resources can be centrally managed.
Network versions of software often allow for their speedy
installation on Workstations from the file server.
Expensive devices such as laser printers or scanners can be shared.
Users can access their files from any workstation
e) Describe ICMP datagram. 4M
Ans The Internet Control Message Protocol (ICMP) is a supporting
protocol in the Internet protocol suite. It is used by network Descript
devices, including routers, to send error messages and operational ion 2M
information indicating, for example, that a requested service is not
available or that a host or router could not be reached.
Page 16 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagra
m 2M
Page 17 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagra
m 2M
Diagra
m 2M
Page 19 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagra
m 2M
Page 20 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 21 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 22 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
ii) Gateway
1. Gateway is protocol converter.
2. Gateway enables communication between different network
architecture and environments.
3. Gateway connects two systems that do not use the same protocol,
data format, language and architecture.
4. It works at all layers of OSI model.
5. Convert commonly used protocols (e.g. TCP/IP) to a specialized
protocol (for example, an SNA: System Network Architecture).
6. Convert message formats from one format to another.
7. Translate different addressing schemes.
b) Describe internal architecture of ISP with diagram. 4M
Ans Internal Architecture of ISP consists of
1. Set of Modems Explana
2. Remote Access Server tion 2M
3. SMTP Server
4. Web Server
5. Routers
Page 24 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagra
m 2M
1. Set of Modems
i. Convert Analog signal on the line to the Digital.
ii. Connect ISP to the Subscriber.
2. Remote Access Server
i. All subscribers are connected to RAS through set of modems
ii. Maintains database of valid user id and password.
iii. It also verifies user id and password
3. SMTP Server
i. It is Simple Message Transfer Protocol
ii. It stores subscribers e-mails until the subscriber connects to the
internet
iii. It sends and receives mails on behalf of its subscriber
4. Web Server
i. Subscribers can create their own web pages To provide value
added services such as News update, Weather information,
Technical updates, Sports updates, Chat facilities
Page 25 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
5. Routers
i. It maintains routing tables
ii. Subscribers may be connected to the Internet through Routers
Diagra
m 2M
Page 26 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans Any
Charact Serial Parallel four
eristics Communication Communication points
1M each
In serial communication a In parallel communication
Data word of eight bits in length the eight bits are
Transfer is sent sequentially, and is transferred in
received after all eight bits corresponding 8 channels,
are sent, one at a time. The every channel transmits a
bits are then assembled back bit, and a byte of data is
into one byte which is the received simultaneously.
initial communication.
A serial communication Parallel communication is
Speed device sends data in bits, Faster because parallel
and at the end the bits device transmits an 8
harmonize to form a byte of
bits at a time.
data and are thus slower.
Page 27 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 28 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3. Synchronization
Page 29 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Page 1 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) State any two advantages of Bus topology. 2M
Page 2 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
e) State three advantages of optical fiber cable. 2M
Ans: Roaming: It is the ability for a cellular customer to automatically make and receive voice (Correct
calls, send and receive data, or access other services, including home data services, when Definition
travelling outside the geographical coverage area of the home network, by means of using a :2
visited network. marks)
Page 3 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
B) Attempt any two: (2x4=8)
Page 4 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
connecting or handling the e-mail interface between the two systems using gateway software
that is part of the file-based e-mail system. A client-server e-mail system is one where an e-
mail server containing the messages & handles all incoming & outgoing mail. It is more
secure & powerful than file based e-mail system.
5) Remote access: Using this feature user can access their file & e-mail, when they are
travelling or working on remote location. It enables users to access to centralized application,
stored private or shared files on LAN.
6) Internet & Intranet: Internet: It is public network. This consists of thousands of
individual networks & millions of computers located around the world. Internets have many
different types of services available such as e-mail, the web & Usenet newsgroups.
Intranet: It is private network or it is company’s own network. Company use this feature for
internal use. For example: company establish its own web server, for placing documents
such as employee handbooks, purchases form or other information that company publishes
for internal use. It also has internet services such as FTP servers or Usenet servers.
c) State the functions of: 4M
1) Hub
2) Repeater
3) Bridge
4) Router
Ans: 1)Hub: (Two
Hub connects all nodes in star topology. Hub is broadcasting device. Functions
It sends packets to all nodes in the network. of Each
compone
It works at Physical Layer of OSI model.
nt - ½
2) Repeater: marks
Repeaters are used to take the distorted, weak and corrupt input signal and regenerate this each)
signal at its output.
It ensures that the signals are not distorted or weak before it reaches the destination.
It increases the signal strength.
3)Bridge:
A bridge device filters data traffic at a network boundary.
Bridges reduces the amount of traffic on a LAN by dividing it into two segments.
It inspects incoming traffic and decides whether to forward or discard it.
It sends packets between two networks of same type.
4)Router:
Router chooses the best path for packet forwarding.
Router read complex network address in packet.
It works at Network Layer of OSI model
Efficiently direct packets from one network to another, reducing excessive traffic.
Join neighbouring or distant network
Connect dissimilar networks.
Prevent network bottlenecks by isolating portions of a network.
Page 5 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
2. Attempt any four of the following: (4x4=16)
Ans: (Diagram
: 2 Mark,
Descripti
on: 2
marks)
Star Topology:
• In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub.
• The devices are not directly linked to one another.
• A star topology does not allow direct traffic between devices.
• The controller acts as an exchange.
• If one device wants to send data to another, it sends the data to the controller, which then
relays the data to the other connected device.
• A star topology is less expensive than a mesh topology.
• In a star, each device needs only one link and one I/O port to connect it to any number of
others. This factor also makes it easy to install and reconfigure.
Far less cabling needs to be housed, and additions, moves, and deletions involve only
one connection: between that device and the hub.
• Other advantages include robustness. If one link fails, only that link is affected. All other
links remain active. This factor also lends itself to easy fault identification and fault isolation.
• As long as the hub is working, it can be used to monitor link problems and bypass defective
links.
• One big disadvantage of a star topology is the dependency of the whole topology on one
single point, the hub. If the hub goes down, the whole system is dead.
• Although a star requires far less cable than a mesh, each node must be linked to a central
hub.
• The star topology is used in local-area networks (LANs). High-speed LANs often use a star
topology with a central hub.
Page 6 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) Describe role of modem in Networking. 4M
Ans: (Diagram
: 1 mark,
Explanati
on: 3
marks)
Ans: (Diagram
A twisted pair consists of two copper wires about 1 mm thick. : 2 marks,
These two wires are individually contained in a plastic insulation and are twisted Explanati
together in a helical form. Polyethylene, polyvinyl chloride, flour polymer resin and on: 2
Teflon(r) are some of the substances that are used for insulation purposes. marks)
Page 7 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Purpose of twisting the wire is to reduce the electrical interference from the similar
pairs in surroundings. The performance of the wire improves with the increase in the
number of twist per foot.
If the two wires are parallel, then the electromagnetic interference from the devices
such as motor can create a noise or interferences.
Inferences on the wire that is closer to the source of noise. These results in high
voltage level in one wire than the other This further leads to uneven load and
damaged signal and there will be difference at the receiver side.
If two wires are twisted, then the cumulative effect of the interference on both the
wires is equal.
In such a way, each wire is closer to the noise source for half of the time and farther
away for the other half i.e. in one twist one wire is closer to the noise source and the
other is farther; in next twist the reverse is true.
In this way, there will be no difference at the receiver side as unwanted signals are
cancelled out.
Twisted pair is distance limited. As distance between network element increases,
attenuation increases and quality decreases at a given frequency.
Twisted pair is an insecure transmission medium. It is relatively simple to place
physical taps.
Twisted pair cables are of two types namely, Shielded (STP) and Unshielded (UTP)
based on the shield provided to cover it.
Page 8 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
d) Describe any four situations in which server based networks are more superior to peer 4M
to peer network.
Ans: 1. Centralization: Servers help in administering the whole set-up. Access rights and (Any four
resource allocation is done by Servers. correct
2. Proper Management: All the files are stored at the same place. Also it becomes easier to situation:
find files.
1 mark
3. Back-up and Recovery possible: As all the data is stored on server it’s easy to make a
back-up of it. each)
4. Up-gradation and Scalability in Client-server set-up: Changes can be made easily by
just upgrading the server. Also new resources and systems can be added by making
necessary changes in server.
5. Accessibility: From various platforms in the network, server can be accessed remotely.
6. Security: Rules defining security and access rights can be defined at the time of set-up of
server.
Ans: Source and destination addresses are 32 bits (4 bytes) in length. (Any four
Security is another aspect where IPv4 had a push back. With all devices not accessing the limitation
Internet, there needs to be some security mechanism to protect the data and perform : 1 mark
cryptography services etc. each)
No identification of payload for QoS handling by routers is present within the IPv4
header.
The routing tables will become large. A separate routing table entry is needed for each
network resulting in a large number of routing table entries.
IPv4 addresses are either configured manually or automatically using the DHCP
(Dynamic Host Configuration Protocol). These days as almost all devices are IP enabled,
Page 9 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
we should have simpler means to configure rather have these devices configured
automatically without majorly relying on some administration.
3. Attempt any four: (4x4=16)
Flow controlling TCP has flow control UDP has no flow control
Data transmission TCP gives guarantee that the No guarantee of the data
order order of the data at the transmission order
receiving end is the same as
the sending end
Page 10 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) Explain the service provided by network layer of the OSI model. 4M
In this, the first bit is ‘0’. The next 7 bits are used indicate network id. Rest of the 3 bytes are
used to indicate host id. Thus the First Byte in Class A type of IP address will have a range
from 0 to 126.
Example : 10.1.2.1
In this, the first byte ‘10’ has first bit 0, and hence it belongs to class A IP address.
Class B :
Class B IP address format is given below:
In this, the first two bits are ‘1 0’. The next 14 bits are used indicate network id. Rest of the 2
bytes are used to indicate host id. Thus, the first byte of class B type of IP address has a
range from 128 to 191.
Page 11 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Example : 187.4.5.1
In this address, the first byte ‘187’ has first two bits as 10.
Class C :
Class C IP address format is given below:
In this, the first three bits are ‘1 1 0’. The next 21 bits are used indicate network id. Rest of
the One byte is used to indicate host id. Thus the first byte of the IP address in class C has
range from 192 to 223.
Example : 192.168.1.2
In this the first three bits are 110, which represents the Class C type IP address.
Class D:
Class D IP address format is given below:
1 1 1 0 Multicast Address
If first 4 bits are ‘1 1 1 0’ the IP address belongs to class D. The IPv4 networking standard
defines Class D addresses as reserved for multicast. Multicast is a mechanism for defining
groups of nodes and sending IP messages to that group rather than to every node on the LAN
(broadcast) or just one other node (unicast). Multicast is mainly used on research networks.
As with Class E, Class D addresses should not be used by ordinary nodes on the Internet.
The range for first byte of class D starts from 224 till 239.
Example: 225.25.2.1
Here, the first 4 bits are 1110.
Class E:
Class E IP address format is given below:
If first 5 bits are ‘1 1 1 1 0’ the IP address belongs to class E. For class E minimum value for
reserved address is 240.0.0.0 to 255.255.255.255. These are used for research work in IP
addresses.
Page 12 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Example: 245.5.6.2
Here, the first 5 bits are 11110.
CAN:
1. CAN is a Campus Area Network is used to connect buildings across campuses of colleges
or Universities.
2. A CAN is actually a type of LAN.
3. It is larger than a LAN but smaller than MAN.CAN is a network that connects two or
more LANs but that is limited to a specific and contiguous geographical area such as a
college campus, industrial complex or military base.
LAN:
1. LAN is local area network. LAN is privately-owned networks covering a small geographic
area(less than 1 km), like a home, office, building or group of buildings.
2. LAN transmits data with a speed of several megabits per second.
MAN:
1. A Metropolitan Area Network (MAN) is a large computer network that spans a
metropolitan area or campus.
2. A MAN typically covers an area up to 10 kms (city). The best example of MAN is the
cable Television network, available in many cities.
3. For an organization, the common use of a MAN is to extend their LAN connectivity
between buildings/offices that are within the same city or urban area (hence the name
Metropolitan Area Network).
4. The organization can pass their Ethernet frames to the service provider MAN; the service
provider will carry their frames across the MAN; and then deliver the frames to the
destination site.
5. From the customer's point of view, the MAN looks like one big (long) Ethernet link
Page 13 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
between their offices.
6. The different sites could belong to the same IP subnet, and from the customer's viewpoint,
no routing is required between their sites.
WAN:
1. WAN is wide area network.
2. WAN is a long-distance communication network that covers a wide geographic area, such
as state or country.
3. The most common example is internet.
4. A WAN provides long-distance transmission of data, voice, image and video information
over larger geographical areas that may comprise a country or even whole world.
Ans: {{**Note: Any other diagram showing central hub and other connection may also be (Diagram
considered**}} :2 marks,
Explanati
Tree Topology: on: 2
A tree topology is variation of star. As in a star, nodes in a tree are linked to a central hub marks)
head end that controls the traffic to a network. However, not every computer plugs into the
central hub, majority of them are connected to a secondary hub which in turn is connected to
the central hub as shown in fig.
Page 14 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Page 15 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) Compare star bus with star-ring topology. 4M
Diagram
Network If any one hub fails, the computers If any one hub fails, the whole
Failure connected to other hubs in networks network collapses.
still can communicate.
Ease of network Easy to add computers in star Easy to add computers in star
expansion topology and easy to add hubs in topology and difficult to add
bus topology. hubs in ring topology.
Page 16 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
6. Presentation Layer: XDR, TLS, SSL and MIME.
7. Application Layer: HTTP, SMTP, DHCP, FTP, Telnet, SNMP and SMPP.
used.
Page 17 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Fragmentation is supported at Fragmentation is not supported at routers. It is
only supported at the originating host.
Originating hosts and intermediate
routers.
extension headers.
Ans: Client server Architecture consists of Client computers or nodes, which are connected to (2
centralized server. The servers stores all the network's shared files and applications marks;
programs, such as word processor documents, compilers, database applications, Explanati
spreadsheets, and the network operating system. Client will send request to access on:
information from the server based on the request server will send the required information to 1mark;
the client. Advantag
es (Any
two) :
1mark;
Disadvant
ages (Any
two) :
1mark)
Page 18 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
management of files becomes easy. Also it becomes easier to find files.
5. As all the data is stored on server it’s easy to make a back-up of it.
6. Reduces Data duplication by storing data stored on the servers instead of each client, so it
reduces the amount of data duplication for the application.
Disadvantages of Client Server Network:
1. Server failure leads to whole network failure.
2. It is very expensive to install and manage as dedicated hardware (server) and special
software is required.
3. A Professional IT person is required to maintain the servers and other technical details of
network.
5. Attempt any four: (4x4=16)
Unregistered IP:
1. An Internet Protocol (IP) address set aside for use within a LAN, intranet, or other
private network and not for use in a public network such as the Internet.
2. An IP address within three ranges of numbers that are set aside for the computers in
local networks. Typically assigned to the machines by a DHCP server, these private
addresses are not routed over the Internet. In order to gain access to the Internet, the
private addresses are converted to a public IP address that is exposed to the Internet
by a network address translation (NAT) service.
b) Describe carrier sense multiple access with collision detection. 4M
Ans: 1. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is the LAN access (4 marks:
method used in Ethernet. Relevant
2. When a device wants to gain access to the network, it checks to see if the network is free. explanati
3. If the network is not free, the device waits a random amount of time before retrying. on)
4. If the network is free and two devices access the line at exactly the same time, their
signals collide.
5. When the collision is detected, they both back off and wait a random amount of time
before retrying.
6. CSMA/CD is a type of contention protocol. Networks using the CSMA/CD procedure
are simple to implement but do not have deterministic transmission characteristics. The
CSMA/CD method is internationally standardized in IEEE 802.3 and ISO 8802.3.
Page 19 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
c) Explain horizontal and vertical communication. 4M
1) The horizontal communication is the logical connection between the layers, there is no
direct communication between them.
2) Information included in each protocol header by the transmitting system is a message that
will be carried to the same protocol in the destination system.
3) For two computers to communicate over a n/w, the protocol used at each layer of the OSI
model in the transmitting system must be duplicated at the receiving system.
4) The packet travels up through the protocol stack and each successive header is stripped of
by the appropriate protocol & processed.
5) When the packet arrived at its destination, the process by which the headers are applied at
the source is repeated in server.
Page 20 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Vertical communication:
1) In addition to communicating horizontally with the same protocol in the other system, the
header information also enables each layer to communicate with the layer above & below it.
2) Eg. The network layer will communicate with the data link layer & transport layer.
4) When a system receives a packet & passes it up through various layers the data link layer
protocol header includes a field which specifies the name of network layer protocol to be
used to process the packet.
5) The network layer protocol header will specify the name of transport layer protocol to be
used to process the packet.
Page 21 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Installation is costly and time consuming Installation needs less time and money
Ans: NIC (Network interface card / network adapter): It physically makes the connection, works (1 Mark:-
as interface between computer and network cable. What is
NIC; 3
Functions of NIC: marks:-
1. Establishes and manages the computer’s network connection. any 3
2. Translates digital computer data into signals (appropriate for the networking medium) relevant
for outgoing messages, and translates signals into digital computer data for incoming functions)
messages
3. Provide physical link or connectivity between computer and the network physical
medium.
4. Creates, sends, and receives frames – Frame: fundamental unit of data for network
transmission and reception.
5. Manages access to medium.
6. Control flow of data between computer and physical medium.
7. Acts as gatekeeper (permits inbound communications aimed only at its computer (or
broadcast) to pass through NIC and on to CPU)
– Each card has a unique MAC address in ROM
– Promiscuous mode disables gatekeeper functions
Page 22 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
f) Compare peer to peer and client-server network. 4M
Ans: ( any 4
Peer to peer Network Client Server Network
point: 1
1. It is much like company uses 1. It is much like company uses mark
decentralized management centralized management. each)
2.In this each machine has same power 2. In this server has more power & client
has less power.
Ans: The Internet Layer Of TCP/IP Is Responsible For Addressing, Packaging, And Routing ( any 4
Functions. The Core Protocols Of The Internet Layer Are IP, ARP, ICMP, And IGMP. protocols
1) The Internet Protocol (IP) 2 marks
each)
a. It Is A Routable Protocol Responsible For IP Addressing, Routing, And The
Fragmentation And Reassembly Of Packets.
b. It Has The Task Of Delivering Packets From The Source Host To The Destination
Host Solely Based On The IP Address In The Packet Headers.
c. For This Purpose, IP Defines Packet Structures That Encapsulate The Data To Be
Delivered.
d. It Also Defines Addressing Methods That Are Used To Label The Datagram With
Source And Destination Information.
Page 23 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
c. ARP Is Used For Mapping A Network Address (E.G. An Ipv4 Address) To A
Physical Address Like An Ethernet Address (Also Named A MAC Address).
d. ARP Has Been Implemented With Many Combinations Of Network And Data Link
Layer Technologies
b) Explain OSI model with neat diagram. Which layer of OSI model packages raw data 8M
bit into data frames? Describe bit stuffing with one example.
Ans: OSI model (open system interconnection) model was developed by ISO (international (OSI
standard organization) diagram -
Function of OSI model 1mark;
1) It provides way to understand how internetwork operates. Explanati
2) It gives guideline for creating network standard. on-3
marks;
OSI model has 7 layers as shown in the figure. Identifica
tion of
correct
layer: 1
mark; Bit
stuffing
explanati
on-2
marks;
Page 24 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
example-
1 mark)
1) Physical layer:
It co-ordinates the functions required to transmit bit stream over physical medium.
It deals with mechanical and electrical specifications of interface and transmission medium.
For transmission it defines procedures and functions that devices and transmission
medium has to perform.
a. Physical characteristics of interfaces and media.
b. Representation of bits:
c. Data rate(transmission rate).
d. Synchronization of bits.
e. Line configuration: Point to point or multipoint configuration should be used.
f.
2) Data link layer:
It is responsible for transmitting group of bits between the adjacent nodes. The group of bits
is called as frame. The network layer passes a data unit to the data link layer. Header
and trailer is added to the data unit by data link layer. This data unit is passed to the
physical layer.
Data link layer is responsible for moving frames from one node to the next.
3) Network layer:
It is responsible for routing the packets within the subnet i.e. from source to destination. It is
responsible for source e to destination delivery of individual packets across multiple
Page 25 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
networks. It ensures that packet is delivered from point of origin to destination.
Functions of network layer:
a. logical addressing
b. Routing.
c. Congestion control
d. Accounting and billing
e. Address transformation
f. Source host to destination host error free delivery of packet.
4) Transport layer:
Responsibility of process to process delivery of message Ensure that whole message arrives
in order.
a. Service point addressing
b. Segmentation and reassembly
c. Connection control
d. Flow control: Flow control is performed end to end
e. Error control
5) Session layer:
Establishes, maintains, synchronizes the interaction among communication systems It is
responsible for dialog control and synchronization
a. Dialog control
b. Synchronization, session and sub session
c. Session closure
6) Presentation layer:
It is concerned with syntax, semantics of information exchanged between the two systems.
Functions:
a. Translation,
b. encryption,
c. compression
7) Application layer:
It enables user to access the network. It provides user interfaces and support for services like
email, remote file access.
Functions:
a. network virtual terminal,
b. file transfer access and management,
c. mail services
Page 26 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
d. directory services
Data link layer of OSI model packages raw data bit into data frames.
Bit stuffing:
Bit stuffing is the process of adding one extra 0 whenever five consecutive 1‟s in the data,
so that the receiver does not mistake the pattern 0111110 or a flag. At sender side the bit is
stuffed and at receiver side stuffed bit is removed. As shown in following
Example:
c) How cross cable is created? Draw figure and explain. Give its use. 8M
Page 27 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Uses:
a. While connecting one computer to another without going through router, switch or
hub, the crossover cables are used.
b. These are also used when connecting one computer to a device directly, without any
other connecting device.
c. Cross cable is used for connecting similar level (Homogenous) devices.
For example: two computers or connecting computer with hub since all are level 1
device.
Page 28 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
WINTER – 19 EXAMINATION
Subject Name: Data Communication and Network
Model Answer
1|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It is more efficient and more reliable In this transmission start bits and
than asynchronous transmission to stop bits are added with data.
transfer the large amount of data.
3|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Optical fibers use the principle of ‘reflection’ to pass light through a channel.
c Explain wireless LAN 802.17 architecture. 4M
Ans Consider
Wireless LAN 802.11: IEEE 802.11
The IEEE 802.11 standard defines the physical layer and media access control instead of
(MAC) layer for a wireless local area network. Wireless LANs transmit and 802.17
receive data over the atmosphere, using radio frequency (RF) or infrared optical
technology, thereby; eliminating the need for fixed wired connections.
802.11 Architecture: BSS diagram
1M,
The 802.11architecture defines two types of services: Explanation -
1M-
1. Basic services set (BSS) ESS diagram
1M,
2. Extended Service Set (ESS) Explanation -
1M
1. Basic Services Set (BSS)
• The basic services set contain stationary or mobile wireless stations and a *Note:
central base station called access point (AP). If student
• The use of access point is optional. attempted to
• If the access point is not present, it is known as stand-alone network. Such a solve the
BSS cannot send data to other BSSs. This type of architecture is known as adhoc answer give
architecture. appropriate
• The BSS in which an access point is present is known as an infrastructure marks.
network.
4|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
These extended networks are created by joining the access points of basic services
sets through a wired LAN known as distribution system.
(ii) Stationary stations: These are AP stations that are part of a wired LAN.
5|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
6|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
7|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3.Radio wave propagation is susceptible to weather effects like rain, thunder and
storm etc.
b Draw and explain block diagram of communication system. 4M
Ans 1 M diagram.
3M
explanation
1. Message
2. Sender
3. Medium
4. Receiver
5. Protocol
Message:
Medium: The message originated from sender needs a path over which it can
travel to the receiver. Such path is called as medium or channel
8|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Receiver: It is the device which receives the message and reproduces it. A
receiver can be host, camera, workstation, telephone etc.
3. Switch
4. Bridge
5. Router
6. Gateway
7. Modem
Repeater:
It is used to take the distorted, weak and corrupt input signal and regenerate
this signal at its output.
It ensures that the signals are not distorted or weak before it reaches the
destination.
It recreates the bit pattern of the signal, and puts this regenerated signal back
on to the transmission medium
Hub:
9|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It operates in both the physical and the data link layer.
Bridge:
It inspects incoming traffic and decides whether to forward or discard it.
A bridge operates in both the physical and the data link layer.
Gateway:
It is a node in a computer network, a key stopping point for data on its way to
or from other networks.
Router:
It is a device that helps in determining the best and shortest path out of the
available paths, for a particular transmission.
Routers use logical and physical addressing to connect two or more logically
separate networks.
Router read complex network address in packet and efficiently directs packets
from one network to another, reducing excessive traffic.
Modem:
10 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It is the device used to converts digital signals generated by the computer into
analog signals which can be transmitted over a telephone or cable line
transforms incoming analog signals into their digital equivalents.
11 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
12 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
bandwidth in logical channels and allocates one user to each channel. Each user
can use the channel frequency independently and has exclusive access of it. All
channels are divided in such a way that they do not overlap with each other.
Channels are separated by guard bands. Guard band is a frequency which is not
used by either channel.
When channel A transmits its frame at one end, the De-multiplexer provides
media to channel A on the other end. As soon as the channel A’s time slot
expires, this side switches to channel B. On the other end, the De-multiplexer
13 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
14 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Data Transfer: Once the circuit has been established, data and voice are
transferred from the source to the destination. The dedicated connection
remains as long as the end parties communicate.
Circuit Disconnection: When data transfer is complete, the connection
is relinquished. The disconnection is initiated by any one of the user.
Disconnection involves removal of all intermediate links from the sender
to the receiver.
15 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2. Protocol is used to connect to the host, so that the packets can be sent over it.
4. Order in which packets are received is different from the way they are sent.
o Delivering IP packets
o Performing routing
o Avoiding congestion
16 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
5. Transport layer breaks the message (data) into small units so that they are
handled more efficiently by the network layer.
The TCP/IP specifications described a lot of applications that were at the top of
the protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
1. Telnets a two-way communication protocol which allows connecting to a
remote machine and run applications on it.
2. FTP (File Transfer Protocol) is protocol that allows File transfer amongst
computer users connected over a network. It is reliable, simple and efficient.
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to
transport electronic mail between a source and destination, directed via a route.
4. DNS (Domain Name Server) resolves an IP address into a textual address for
Hosts connected over a network.
17 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Simplex Mode
Half duplex Mode
Full duplex Mode
1. In Simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit; the other can
only receive. The simplex mode can use the entire capacity of the
channel to send data in one direction.
Keyboards, traditional monitors and printers are examples of simplex devices.
2. In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of the
channel can be utilized for each direction
-for example: Walkie-talkies.
18 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
namely, either the link must contain two physically separate transmission
paths or the capacity of the channel is divided between signals traveling in
both directions .One common example of full-duplex communication is the
telephone network. When two people are communicating by a telephone
line, both can talk and listen at the same time.
19 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Circuit switching was designed for voice applications. Telephone is the best
suitable example of circuit switching. Before a user can make a call, a virtual
path between callers and called is established over the network.
Packet Switching: The entire message is broken down into smaller chunks
called packets. The switching information is added in the header of each packet
and transmitted independently.
It is easier for intermediate networking devices to store small size packets and
they do not take much resource either on carrier path or in the internal memory
of switches.
20 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Configure and start the intend daemon on each host machine on the
network. Read TCP/IP daemons and then follow the instructions
in Configuring the intend daemon.
Configure each host machine to perform either local name resolution or to
use a name server. If a hierarchical Domain Name networks being set up,
configure at least one host to function as a name server.
Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in Client network
services if you wish to make a particular service unavailable.
Decide which hosts on the network will be servers, and which services a
particular server will provide.Follow the instructions in Server network
services to start the server daemons you wish to run.
21 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
• The communication between the primary and the secondary can be one-to-one
or one-to-many.
22 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
7. Select BOOTP only, set the lease duration to Unlimited, and click OK.
8. Right-click Reservations.
9. Enter the IP address and the MAC address for Controller A. Click
Add.
23 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
10. Enter the IP address and the MAC address for Controller B. Click
Add.
Ans 4 components-
Wireless Network Infrastructures
11/2M each
The infrastructure of a wireless network interconnects wireless users and end
systems. The infrastructure might consist of base stations, access controllers,
application connectivity software, and a distribution system. These components
enhance wireless communications and fulfill important functions necessary for
specific applications.
1. Base Stations
The base station is a common infrastructure component that interfaces the
wireless communications signals traveling through the air medium to a wired
network? Often referred to as a distribution system. Therefore, a base station
enables users to access a wide range of network services, such as web browsing,
e-mail access, and database applications. A base station often contains a wireless
NIC that implements the same technology in operation by the user's wireless
NIC.
Residential gateways and routers are more advanced forms of base stations that
enable additional network functions.
As show in Figure a base station might support point-to-point or point-to-
multipoint communications.
24 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Access Controllers
In the absence of adequate security, quality of service (QoS), and roaming
mechanisms in wireless network standards, companies offer access-control
solutions to strengthen wireless systems. The key component to these solutions
is an access controller, which is typically hardware that resides on the wired
portion of the network between the access points and the protected side of the
network. Access controllers provide centralized intelligence behind the access
points to regulate traffic between the open wireless network and important
resources. In some cases, the access point contains the access control function.
Application Connectivity Software
Web surfing and e-mail generally perform well over wireless networks. All it
takes is a browser and e-mail software on the client device. Users might lose a
wireless connection from time to time, but the protocols in use for these
relatively simple applications are resilient under most conditions.
Special application connectivity software is necessary as an interface between
a user's computer device and the end system hosting the application's software
or database.
25 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Distribution System
A wireless network is seldom entirely free of wires. The distribution system,
which often includes wiring, is generally necessary to tie together the access
points, access controllers, and servers. In most cases, the common Ethernet
comprises the distribution system.
26 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER – 19 EXAMINATION
Subject Name: Data Communication Network Model Answer Subject Code: 22414
Page No: 1 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(b) Microwave
(c) infrared
(d) Satellite
3. 802.5:Token Ring
Page No: 2 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2. Routing.
3. Congestion control
5. Address transformation
Page No: 3 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1. Broadcast networks
2. Point-to-point networks
Point to point networks consists of many connections between individual pairs of
machines. To go from the source to the destination a packet on these types of
network may have to go through intermediate computers before they reach the
desired computer.
b Draw structural diagram of fiber optic cable and write its functions 4M
Ans 2 M for
diagram
and 2 M
for
functions
1. Single-mode fibers - Used to transmit one signal per fiber (used in telephones
and cable TV)
2. Multi-mode fibers - Used to transmit many signals per fiber (used in computer
Page No: 4 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical impulse,
light or radio signal — through the network at the electrical and mechanical level.
It provides the hardware means of sending and receiving data on a carrier,
including defining cables, cards and physical aspects.
Data Link (Layer 2) At OSI Model, Layer 2, data packets are encoded and
decoded into bits. It furnishes transmission protocol knowledge and management
and handles errors in the physical layer, flow control and frame synchronization.
The data link layer is divided into two sub layers: The Media Access Control
(MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer
controls how a computer on the network gains access to the data and permission to
transmit it. The LLC layer controls frame synchronization, flow control and error
Page No: 5 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
checking.
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Physical Layer
OSI Model
Page No: 6 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page No: 7 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
attached to a central node (often called a hub or switch). The attachment of these diagram
network pieces to the central component is visually represented in a form similar to and 1
a star. mark for
descriptio
The hub and hosts, and the transmission lines between them, form a graph with n ,2M
the topology of a star. Data on a star network passes through the hub before ring
topology-
continuing to its destination. The hub manages and controls all functions of the
1 M for
network. It also acts as a repeater for the data flow. diagram
and 1
Mark for
descriptio
n
The star network is one of the most common computer network topologies.
(ii)RING Topology
A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node - a
ring.
Data travels from node to node, with each node along the way handling every
packet.
Page No: 8 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ring topology refers to a specific kind of network setup in which devices are
connected in a ring and pass information to or from each other according to their
adjacent proximity in the ring structure. This type of topology is highly efficient
and handles heavier loads better than bus topology.
Page No: 9 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b Describe the functions of physical and data link layer of OSI model 4M
ans Functions of Physical Layer 2M for
Physical
Physical layer is the actual carrier of information between computers layer
Communication between computers happens due to physical layer Function
and 2 M
Data is actually carried between every adjacent node for Data
(computers/routers) by transmission of electromagnetic/optical signals at link
the physical layer over wired/wireless media layer)(4
Page No: 10 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Physical layer therefore encompasses the set of all protocols/standards used functions
in different types of Wired/Wireless interfaces and the telecommunication each)
links connecting them
It also includes the mechanical, electrical and timing specifications for
different network interfaces
Functions of Data Link Layer
Data link layer receives the data from the network layer & divide it into
manageable units called frames.
It then provides the addressing information by adding header to each
frame.
Physical addresses of source & destination machines are added to each
frame.
It provides flow control mechanism to ensure that sender is not sending the
data at the speed that the receiver cannot process.
It also provide error control mechanism to detect & retransmit damaged,
duplicate, or lost frame, thus adding reliability to physical layer.
Another function of data link layer is access control. When two or more
devices are attached to the same link, data link layer protocols determine
which device has control over the link at any given time.
Page No: 11 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
consisting of Network address with first bit as 0 and the next 3 bytes with host id.
Hence, number of hosts are more when compared to number of networks. The
default subnet masks for class A networks is 255.0.0.0. Class A networks have
their network addresses from 1.0.0.0 to 126.0.0.0, with the zero's being replaced by
node addresses.
Class B: Class B range for first byte is 128-191. This type has first two bytes
specifying network ID with starting two bits as 10 and last two bytes referring to
host ID. The default subnet masks for class B is 255.255.0.0. Network addresses
for these ranges from 128.0.0.0 to 191.0.0.0.
Class C: Class C range for first byte is 192-223. This class has first three bytes
referring to network with starting bits as 110 and last byte signifies Host ID. Here,
number of networks is more when compared to number of hosts in each network.
The default subnet masks for class C is 255.255.255.0 The network IP addresses
for these range from 192.0.0.0 to 223.0.0.0.
Class D: Class D range for first byte is 224-239 Class D is used for multicasting
and its starting bits are 1110
Class E: Class E range for first byte is 240-255 .Class E is reserved for future use
and its starting bits are 1111
Page No: 12 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Simplex Mode
Half duplex Mode
Full duplex Mode
a. In Simplex mode, the communication is unidirectional, as on a one-way street.
Only one of the two devices on a link can transmit; the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one
direction.
-Keyboards, traditional monitors and printers are examples of simplex
devices.
Page No: 13 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a. In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of
the channel can be utilized for each direction
-for example :Walkie-talkies.
Page No: 14 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Message switching
Circuit switching is preferred over packet switching in voice communication
because:
In circuit switching, a dedicated path is established between sender and
receiver which is maintained for entire duration of conversation.
It provides continuous and guaranteed delivery of data.
During the data transfer phase, no addressing is needed.
Delays are small.
It uses connection oriented service.
Message received in order to the destination
c Your company has the network id 165.130.0.0. You are responsible for 6M
creating subnets on the network, and each subnet must provide at least 1000
host ids. What subnet mask meets the requirement for the minimum number
of host ids and provides the highest number of subnets?
ans The given network id 165.130.0.0 is class B (Range of class B is 128.0.0.0 to Explanati
191.255.255.255) with subnet mask of 255.255.252.0 creates 62 subnets with 1022 on 6 M
host each.
11111111.11111111.11111100.00000000.
To calculate the number of host ids available for each subnet is based on the
number of digits remaining in the network address.
The number of possible host ids in each subnet ranges from 00000001 through
11111110.
So, in the network 165.130.0.0/22, host addresses can range from 165.130.0.1
through 165.130.254
Page No: 15 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
tries dividing it by g(x). If there is remainder there has been a transmission error divisor
and zero remainder means no error in the transmission. r is degree of g(x) and do
polynomial. the
Step by step procedure: problem.
1. Append a string of r zero bits to the lower order end of data word(m) where r is Full
less than the number of bits pre-decided divisor by 1 bit i.e. if divisor = 5 bits then r
marks
= 4 zeros. Now data word contains m+r bits has to be
2. Divide the newly generated data unit in step 1 by the divisor. It is module – 2 given
division even if
3. The remainder obtained after division is the r bit CRC. they
4. This CRC will replace the r zeros appended to the data unit to get the code word explain
to be transmitted. the
method
NOTE: The polynomial code for calculation of redundant bits is not given .hence or do the
the data given is insufficient for calculating redundant bits and the ratio of useful problem
bits to total bits. with
assumpti
ons’.
b Describe the process of DHCP server configuration. 6M
ans DHCP (Dynamic Host Configuration Protocol) is a client-server protocol that uses Diagram
DHCP servers and DHCP clients. A DHCP server is a machine that runs a service 2M,
Explanati
that can lease out IP addresses and other TCP/IP information to any client that
on 4 M
requests them. The DHCP server typically has a pool of IP addresses that it is
allowed to distribute to clients, and these clients lease an IP address from the pool
for a specific period of time, usually several days. Once the lease is ready to expire,
the client contacts the server to arrange for renewal. DHCP clients are client
machines that run special DHCP client software enabling them to communicate
with DHCP server.
DHCP clients obtain a DHCP lease for an IP address, a subnet mask, and various
DHCP options from DHCP servers in a four-step process:
Page No: 16 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
DHCPACK: The DHCP server that the client responds to acknowledges the client,
assigns it any configured DHCP options, and updates its DHCP database. The
client then initializes and binds its TCP/IP protocol stack and can begin network
communication.
c What is the MAC protocol used in TOKEN ring LAN’s? What happens if the 6M
token is lost?
ans Token ring local area network (LAN) network is a communication protocol for Descripti
local area networks.it uses special three-byte frame called a “token” that travels
on of
MAC
around a logical ring of workstations or servers. This token passing is a channel
protocol
access method providing fair access for all stations, and eliminating the collision
4 M,
of contention-based access methods. Explanati
on of
Introduced by IBM in 1984, it was then standardized with protocol IEEE 802.5
token lost
and was fairly successful, particularly in the corporate environments, but 2 M
gradually eclipsed by the later versions of Ethernet.
The IEEE 802.5 Token ring technology provides for data transfer rates of either 4
or 16 Mbps.
4. When the frame gets back to originator, it sees that message has been copied
and received.
The Fibre Distributed Data Interface (FDDI) also uses a Token ring protocol.
If one device does not receive a token within a specified period, it can issue an
alarm. The alarm alerts the network administrator to the problem and its location.
Then, network administrator generates a new , free token
OR
Page No: 17 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
· There are two error conditions that could cause the token ring to break down.
One is the lost token in which case there is no token in the ring.
Other is the busy token that circulates endlessly.
To overcome these problems, the IEEE 802 standard specifies that one of the
stations must be designated as “active monitor”. The monitor detects the lost
condition using a timer by time-out mechanism and recovers by using a new
free token
Page No: 18 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: bit rate : It is defined as the number of bits transmitted per second. 1M
baud rate : It is defined as the number of signal units per second. each
Page 1/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(d) Name the layer of the OSI model that is responsible for moving of data in and out of 2M
physical link in network. State its functions.
Ans: Physical layer is responsible for moving of data in and out of physical link in network. Name
of
Function of Physical layer
layer
1. It defines the physical characteristics and functions of the physical devices and interfaces 1M
so that transmission can occur.
2. It defines the procedure of encoding of the bits. Any
3. It states the data transmission rate and the duration of a bit.
one
4. It defines the topology.
5. It also states the direction of transmission valid
functi
on 1M
Page 2/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
The Internet has experienced a phenomenal increase of devices accessing the Internet.
Because of this increase, IPv4 addresses are running out.Traditional model of classful
addressing does not allow the address space to be used to its maximum potential.The solution
is IPv6 which can accommodate the increased demand by providing a much larger
address space IPv6 has 128-bit address space or 4 times more address bits compared to
IPv4's 32-bit address space. This large address space will provide enough address
space for many decades to come.
Page 3/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) Name the components of data communication system . State the function of each 4M
component.
Ans: Following are the building blocks (components) of Data Communication System: 2M
1. Message:The message is the information (data) to be communicated. Popular forms
Explana
of information include text, numbers, pictures, audio, and video.
tion
2. Sender:The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
3. Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, etc
4. Transmission medium: the transmission medium is the physical path by which a
message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fibre-optic cable, and radio waves.
b) Explain the terms Synchronous, and Asynchronous transmission of data with a neat 4M
diagram
Page 4/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
c) State the functions performed by the Network layer and application layer in a TCP/I 4M
protocol.
Page 5/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
up. ns of
(ii) Logical-physical Address Mapping: It translates logical addresses, or names, into Networ
physical addresses. k Layer
(iii) Subnet Usage Accounting: It has accounting functions to keep track of frames forwarded &
by subnet intermediate systems.
Applica
(iv) Internetworking: One of the main responsibilities of network layer is to provide
tion
internetworking between different networks. It provides logical connection between different
Layer
types of network. It is because of this layer, we can combine various different networks to
form a bigger network.
(v) Logical Addressing: Large number of different networks can be combined together to
from bigger networks or internetwork. In order to identify each device on internetwork
uniquely, network layer defines an addressing scheme. Such an address distinguishes each
device uniquely and universally.
(vi) Routing: When independent networks or links are combined together to create internet
works, multiple routes are possible from source machine to destination machine. The network
layer protocols determine which route or path is best from source to destination. This function
of network layer is known as routing. Routes frames among networks.
(vii) Packetizing: The network layer receives the data from the upper layers and creates its
own packets by encapsulating these packets. The process is known as packetizing. This
packetizing in done by Internet Protocol (IP) that defines its own packet format.
(viii) Fragmentation: Fragmentation means dividing the larger packets into small fragments.
The maximum size for a transportable packet in defined by physical layer protocol. For this,
network layer divides the large packets into fragments so that they can be easily sent on the
physical medium. If it determines that a downstream router's maximum transmission unit
(MTU) size is less than the frame size, a router can fragment a frame for transmission and
reassembly at the destination station.
Page 6/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(iii) Mail Service: This application provides the basis for e-mail forwarding and storage.
(iv) Remote Logins: This layer allows logging into a host which is remote.
(v) Network Abstraction: Provides an abstraction of the underlying network to an end user
and an application.
(vi) Directory Services: This application provides distributed database sources and access for
global information about various objects and services.
Ans: Checksum: 2M
Explan
1.Checksum is an error-detecting technique in data communication that can be applied to a
message of any length. In the Internet, this technique is mostly used at the network and ation
transport layer rather than the data link layer. and
2.In checksum error detection scheme, the data is divided into k segments each of m bits. In the 2M
sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum Examp
is complemented to get the checksum.
3.The checksum segment is sent along with the data segments. At the receiver’s end, all le
received segments are added using 1’s complement arithmetic to get the sum. The sum is
complemented. If the result is zero, the received data is accepted; otherwise discarded.
Page 7/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) Name the layer of the OSI model that perform the following functions 4M
i) Bitrate control
ii) Framing
iii) Logical Addressing
iv) Encryption / Decryption
b) Calculate the CRC for the frame of data to be transmitted in 100100 and the generator 4M
3 2
polynomial is x + x + 1. Generate the Codeword for the transmitted frame.
Correc
t
divisor
1M &
Correc
t
calcula
tion of
CRC
code
word is
3M
Page 8/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) Bridge
ii) Routes
iii) Gateway
iv) Hub
d) Compare classless and classful addressing. State the disadvantages of classful addressing. 4M
Page 9/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It supports Classless
It does not support Classless Inter-Domain Routing
6. CIDR Inter-Domain Routing (CIDR). (CIDR).
Network
Host Host
9. Division of Address Subnet Subnet
Page 10/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page 11/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: 1. One bit sliding window uses Stop and Wait protocol for delivery of data frames. 2M
2.The sender and receiver’s windows size is 1 and the frames are alternately numbered Diagra
3.One bit sliding window uses Stop and Wait protocol
m&
.4.Sender transmit a frame with sequence number and waits for acknowledgment from the
receiver. 2M
5.Receiver send back an acknowledgement with sequence number. Explan
6.If sequence number of acknowledgement matches with sequence number of frame.
ation
7.Sender transmit the next frame.
8.Else sender re-transmit the previous frame.
9.Its bidirectional protocol.(full duplex communication)
Normal Operation:In normal operation thesender sends a frame and waits for
acknowledgement from receiver .The acknowledgement should be received before the timer for
the frame expires.The sequence number of acknowledgement should match the sequence
number of next frame to be transmitted.If it matches the next frame is transmitted otherwise
previous frame is transmitted
Lost or Damaged frame :.When the receiver receives a damaged frame it discards it which
means the frame is lost .The receiver remains silent about the lost frame .After the timer
expires for that frame the sender retransmits the same frame .
Lost or Delayed acknowledgement:In case of lost or delayed acknowledgement after the timer
for the frame expires the sender retransmits the frame .The receiver takes care of
discarding duplicate copy
Page 12/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(c) With neat diagram explain the concept of datagram approach of switching. 4M
Page 13/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: FTP (File Transfer Protocol) :FTP is a standard mechanism provided by the Internet for 2M
copying a file from one host to the other It uses the services of TCP Concep
User Interface :Most operating systems provide user interface to to access the services t & 2M
of FTP. The interface prompts user for appropriate input Archite
Control Connection :The well known port 21 is used for control connection . It is
cture
opened once and maintained during entire FTP session
Data Connection :The well known port 20 is used for data connection .The connection can be and
opened and closed multiple times. Diagra
The data connection in FTP means one of the following
m of
1) A file can be copied from server to client under the supervision of RETR command
2) A file is transferred from client to server under the supervision of STOR command FTP
3) A list of directory or filename is sent to the client under the supervision of LIST command
For communication over data connection client must define the type of file , structure of data
and transmission mode
Architecture of FTP:
(e) Compare coaxial cable and twisted pair cable on the basis of- 4M
i) Bandwidth
ii) Electromagnetic interference
iii) Construction
iv) applications
Page 14/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Construction point
Page 15/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) Draw a diagram and describe the following topologies stating their applications. 6M
i) Hybrid
ii) Bus
Hybrid Topology
A hybrid topology is a kind of network topology that is a combination of two or more
network topologies, such as Mesh topology, Bus topology, and Ring topology.
Its usage and choice are dependent on its deployments and requirements like the
performance of the desired network, and the number of computers, their locations
This topology presents a blend of characteristics of all basic types. In this type,
whole Computer Network is divided into Network Segments. Each Network
Segments connects with Network Backbone
Diagra
m 1m
explain
ation
Page 16/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b) Draw the seven layered architecture of the OSI model and explain. 6M
Page 17/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans:
2M for
diagra
m
Physical Layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It Provides physical interface for transmission of information. . It Defines rules by
which bits are passed from one system to another on a physical communication medium.
It Covers all -mechanical, electrical, functional and procedural -aspects for physical 4m for
Page 18/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
communication. Explai
n-ation
Data Link Layer: The data link layer is responsible for moving frames from one hop (node) to
the next. It Breaks the outgoing data into frames and re-assemble the received frames. It Handle
errors by implementing an acknowledgement and retransmission scheme.
Network Layer: The network layer is responsible for receiving frames from the data link layer,
and delivering them to their intended destinations among based on the addresses contained
inside the frame. The network layer finds the destination by using logical addresses, such as IP
(internet protocol). At this layer, routers are a important component used to route information
where it needs to go between networks.
Transport Layer: The transport layer manages the delivery and error checking of data packets.
It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts.
One of the most common examples of the transport layer is TCP or the Transmission Control
Protocol.
Session Layer: The session layer controls the conversations between different computers. A
session or connection between devices is set up, managed, and terminated at layer 5. Session
layer services also include authentication and reconnections.
Presentation Layer: The presentation layer formats or translates data for the application layer
based on the syntax or semantics that the application accepts. Because of this, it at times also
called the syntax layer. This layer can also handle the encryption and decryption required by the
application layer.
Application Layer: The application layer is used by end-user software such as web browsers
and email clients. It provides protocols that allow software to send and receive information and
present meaningful data to users. A few examples of application layer protocols are
the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol
(POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS).
c) Draw the labeled construction of Fibre optic cable. State four advantages compared to 6M
copper cables.
Ans: Figure shows the labeled diagram for Fiber Optic Cable 2M for
Diagra
m
Page 19/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1M
each
for any
4
applica
tions
)
These are not affected by electromagnetic interference, so noise and distortion is very
less.
Optical fiber cable are often made cheaper than equivalent lengths of copper wire.
Used for both analog and digital signals
Highly secured
Provides high quality transmission of signals at very high speed (bandwidth 2 Gbps
Smaller size and light weight
Less power loss and allows data transmission for extended distances
Bandwidth is high
a) Draw and describe architecture for a network using star topology to establish a 6M
Page 20/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: The architecture for a network using star topology is as shown in the figure
3M for
Diagra
m
3 M for
descrip
tion
A star topology is a topology where every node in the network is connected to one
central switch. Every device in the network is directly connected to the switch and
indirectly connected to every other node.
The relationship between these elements is that the central network hub is a server and
other devices are treated as clients.
The central node has the responsibility of managing data transmissions across the whole
network and acts as a repeater.
With star topologies, computers are connected with a coaxial cable, twisted pair, or
Page 21/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
In this method the size of sender and receiver window is same
In selective repeat ARQ only damaged frames are resent
This method uses negative acknowledgement to report sequence number of damaged frame 3M for
before timer expires Diagra
Selective repeat uses both positive and negative acknowledgement m
Normal Operation : Frames 0 and 1 are accepted when received because they are in the
receiver window range.The sender’s window shifts toward right and transmits frames 2 and 3
.The receiver accepts frame 3 as it is in receiver’s window . The receiver sends NAK2 to show
that frame 2 is lost .The sender then sends only frame 2
Lost and delayed acknowledgement and NAK (Negative Acknowledgement)
If the window capacity is reached and acknowledgements are not received because of delay or
loss within the time period the sender retransmits every frame in the window Similarly if NAK
are lost or delayed the sender retransmits all the frames after last acknowledged frame
Page 22/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3M on
explain
ation
c) Draw the block diagram of Symmetric Key Cryptography and state the function of 6M
various components. Compare symmetric and Asymmetric Key Cryptography
Ans: Figure illustrating the block diagram of Symmetric Key Cryptography 2M for
Symmetric key encryption also termed as shared -key ,single-key, secret-key in this type both diagra
the sender and receiver share same key which is used to both encrypt and decrypt messages
mm
There are five main components of a symmetric cryptography system: plaintext, encryption
algorithm, secret key, ciphertext, and the decryption algorithm. 2M for
Explai
nation
2 M for
any 2
valid
points
of
Page 23/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
compa
rison
1. Plaintext
The term plaintext refers to the original message to be sent for encryption . Here the original
message, referred to as plaintext, is converted into apparently random nonsense, referred to as
cipher text. The security depends on several factor.
2. Encryption Algorithm
The encryption algorithm takes the plaintext and converts it into an unreadable format. The
encryption process s consists of an algorithm and a key. The key is a value independent of the
plaintext. Changing the key changes the output of the algorithm. Once the cipher text is
produced, it may be.
3. Key
Think of the key as a decoder ring: the secret of the scrambled text cannot be read without the
key. The key holds the information on all the switches and substitutions made to the original
plain text.
In symmetric encryption, the key is actually bundled with the algorithm; in this sense, the
decoder ring is not universal. The changes and substitutions depend on the key, and vice versa
because the sender and recipient share the key.
4. Ciphertext
The ciphertext is the text that is now scrambled and ready to be sent. It may look like a random
stream of data, and is unreadable.
5. Decryption Algorithm
In the decryption algorithm, the secret key is applied to the ciphertext. It converts it back to
plaintext, basically performing the encryption in reverse. .. Upon reception, the cipher text can
Page 24/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
be transformed back to the original plaintext by using a decryption algorithm and the same key
that was used for encryption.
Comparison of Symmetric and Asymmetric Key Cryptography is given as
Page 25/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
SUMMER – 2022 EXAMINATION
Subject Name:Data Communication & Computer Network Model Answer Subject Code: 22414
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in the model
XXXXX
answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to
assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance
(Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the
figure. The figures drawn by candidate and model answer may vary. The examiner may give
credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant
values may vary and there may be some difference in the candidate’s answers and model
answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant
answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi and
Bilingual (English + Marathi) medium is introduced at first year of AICTE diploma Programme
from academic year 2021-2022. Hence if the students in first year (first and second semesters)
write answers in Marathi or bilingual language (English +Marathi), the Examiner shall consider
the same and assess the answer based on matching of concepts with model answer.
Ans A computer network is a system that connects various independent computers in order to Correct
share information (data) and resources. definition-2
M
OR
A computer network is a collection of two or more computer systems that are linked
together. A network connection can be established using either cable or wireless media.
OR
A computer network is defined as a system that connects two or more computing devices
for transmitting and sharing information.
Page No: 1 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Ans Following are the types of multiplexing: Correct
1. Frequency-Division Multiplexing types-2 M
2. Wavelength-Division Multiplexing
3. Time-Division Multiplexing
a) Synchronous Time-Division Multiplexing
b) Asynchronous Time-Division Multiplexing
c) List different types of errors 2M
Page No: 2 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
ii) Bandwidth:
The bandwidth of a composite signal is the difference between the highest and the
lowest frequencies contained in that signal.
For example, if a composite signal contains frequencies between 1000 and 5000, its
bandwidth is 5000 - 1000, or 4000.
Ans o The way in which data is transmitted from one device to another device is known List-1M
as transmission mode. All 3 modes
o The transmission mode is also known as the communication mode. Explanation
with figure-
3M
The Transmission mode is divided into three categories:
o Simplex mode
o Half-duplex mode
o Full-duplex mode
Simplex mode
Page No: 3 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
o In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction.
o A device can only send the data but cannot receive it or it can receive the data but
cannot send the data.
o This transmission mode is not very popular as mainly communications require the
two-way exchange of data. The simplex mode is used in the business field as in
sales that do not require any corresponding reply.
o The radio station is a simplex channel as it transmits the signal to the listeners but
never allows them to transmit back.
o Keyboard and Monitor are the examples of the simplex mode as a keyboard can
only accept the data from the user and monitor can only be used to display the data
on the screen.
Half-Duplex mode
o In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and
receive the data as well.
o Messages flow in both the directions, but not at the same time.
o The entire bandwidth of the communication channel is utilized in one direction at a
time.
o In half-duplex mode, it is possible to perform the error detection, and if any error
occurs, then the receiver requests the sender to retransmit the data.
o A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party
speaks, and another party listens. After a pause, the other speaks and first party
listens. Speaking simultaneously will create the distorted sound which cannot be
understood.
Page No: 4 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Full-duplex mode
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in both
the directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving in one
direction, and another channel has traffic flowing in the opposite direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network. When
two people are communicating with each other by a telephone line, both can talk and
listen at the same time.
Architecture: ESS:
The standard defines two kinds of services: the basic service set (BSS) and the extended
explanation
service set (ESS).
with fig:2M
In this architecture, stations can form a network without the need of an AP; they can
locate one another and agree to be part of a BSS. A BSS with an AP is sometimes
referred to as an infrastructure network.
When BSSs are connected, the stations within reach of one another can communicate
without the use of an AP. However, communication between two stations in two
different BSSs usually occurs via two APs. The idea is similar to communication in a
cellular network if we consider each BSS to be a cell and each AP to be a base station.
Note that a mobile station can belong to more than one BSS at the same time.
c) Explain Bluetooth Architecture. 4M
Ans Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15 Explanation
standard. of Piconet
Page No: 6 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
with
Architecture diagram-2M
Bluetooth defines two types of networks: piconet and scatternet.
Piconets: Explaination
of Scatternet
A Bluetooth network is called a piconet, or a small net. A piconet can have up to eight
with
stations, one of which is called the primary;t the rest are called secondaries. All the
diagram-2M
secondary stations synchronize their clocks and hopping sequence with the primary. Note
that a piconet can have only one primary station. The communication between the primary
and the secondary can be one-to-one or one-to-many. Figure shows a piconet.
Fig: Piconet
Scatternet:
Piconets can be combined to form what is called a scatternet. A secondary station in one
piconet can be the primary in another piconet. This station can receive messages from
the primary in the first piconet (as a secondary) and, acting as a primary, deliver them to
secondaries in the second piconet. A station can be a member of two piconets. Figure
illustrates a scatternet.
Page No: 7 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Fig: Scatternet
d) Draw a neat diagram of twisted pair cable and state its types. 4M
Ans A twisted pair consists of two conductors (normally copper), each with its own plastic Diagram with
insulation, twisted together, as shown in Figure. naming-2 m
Unshielded Twisted Pair (UTP): These generally comprise of wires and insulators.
Category 1 − UTP used in telephone lines with data rate < 0.1 Mbps
Category 2 − UTP used in transmission lines with a data rate of 2 Mbps
Category 3 − UTP used in LANs with a data rate of 10 Mbps
Category 4 − UTP used in Token Ring networks with a data rate of 20 Mbps
Category 5 − UTP used in LANs with a data rate of 100 Mbps
Category 6 − UTP used in LANs with a data rate of 200 Mbps
Category 7 − STP used in LANs with a data rate of 10 Mbps
Shielded Twisted Pair ( STP ): STP cable has a metal foil or braided mesh covering
Page No: 8 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
that encases each pair of insulated conductors.
2. Sender - It is the device which sends the data messages. It can be a computer,
workstation, telephone handset etc.
3. Receiver - It is the device which receives the data messages. It can be a computer,
workstation, telephone handset etc.
4. Transmission Medium - It is the physical path by which a message travels from sender
to receiver. Some examples include twisted-pair wire, coaxial cable, radio waves etc.
Page No: 9 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Example
If a block of 32 bits is to be transmitted, it is divided into matrix of four rows and eight
columns which as shown in the following figure:
Figure: LRC
In this matrix of bits, a parity bit (odd or even) is calculated for each column. It means 32
bits data plus 8 redundant bits are transmitted to receiver. Whenever data reaches at the
destination, receiver uses LRC to detect error in data.
Advantage:
LRC is used to detect burst errors.
c) Describe line of sight transmission. 4M
Page No: 10 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
the transmitting and receiving antennas must be within an effective line of sight of
each other.
The figure depicts this mode of propagation very clearly. The line-of-sight propagation will
not be smooth if there occurs any obstacle in its transmission path. As the signal can travel
only to lesser distances in this mode, this transmission is used for infrared or microwave
transmissions.
Speeds up to 2.4 kbps
Poor voice quality
Large phones with limited battery life
No data security
Used analog signals
2G-Second generation
2G refers to the second generation of mobile telephony which used digital signals for the
first time. It was launched in Finland in 1991 and used GSM technology.
2G networks used digital technology.
It implemented the concept of CDMA and GSM. Provided small data services like sms and
mms.
2G capabilities are achieved by allowing multiple users on a single channel via
multiplexing.
Page No: 11 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Features:
Page No: 12 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Features
It provides an all IP packet switched network for transmission of voice, data,
signals and multimedia.
It aims to provide high quality uninterrupted services to any location at any
time.
As laid down in IMT-Advanced specifications, 4G networks should have
peak data rates of 100Mbps for highly mobile stations like train, car etc., and
1Gbps for low mobility stations like residence etc.
It also lays down that 4G networks should make it possible for 1 Gbps
downlink over less than 67 MHz bandwidth.
They provide have smooth handoffs across heterogeneous network areas.
5G is the 5th generation mobile network. It is a new global wireless standard after
1G, 2G, 3G, and 4G networks. 5G enables a new kind of network that is designed to
connect virtually everyone and everything together including machines, objects, and
devices.
5G wireless technology is meant to deliver higher multi-Gbps peak data
speeds, ultra low latency, more reliability, massive network capacity, increased
availability, and a more uniform user experience to more users. Higher performance
and improved efficiency empower new user experiences and connects new
industries.
Features
High Speed, High Capacity 5G technology providing large broadcasting of data in
Gbps.
Multi - Media Newspapers, watch T. V pro clarity as to that of an HD Quality.
Faster data transmission that of the previous generations.
Large Phone Memory, Dialing Speed, clarity in Audio/Video.
Support interactive multimedia, voice, streaming video, Internet and other
5G is More Effective and More Attractive.
Ans In the question it is given that we are supposed to consider eight computers. Both For valid
architecture can be considered depending upon the requirement. for eight explanation
computers I would like to prefer Peer to Peer network architecture. 4M : either
peer to peer
Because
or client-
Page No: 13 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
The number of computers or devices in the network is less than 15. For peer to peer server
network less than 10 devices shows good performance.
Data security is not the top priority
Networking is mainly required for hardware sharing.
Advanced sharing is not required.
Additional networking features are not required.
The administrator personally knows all users of the network.
The above conditions are usually fulfilled in home and small office networks. Thus,
peer-to-peer networking is mostly used in home and small office networks.
Less costly
Also if security is in priority and cost is not the consideration then I would prefer client
server network it will provide a stable network.
Page No: 14 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
handling bilateral traffic. bilateral traffic.
In-Circuit switching, the charge depends on
time and distance, not on traffic in the In Packet switching, the charge is based on
network. the number of bytes and connection time.
Recording of packets is never possible in Recording of packets is possible in packet
circuit switching. switching.
In-Circuit Switching there is a physical In Packet Switching there is no physical
path between the source and the destination path between the source and the destination
Circuit Switching does not support store Packet Switching supports store and
and forward transmission forward transmission
No call setup is required in packet
Call setup is required in circuit switching. switching.
In-circuit switching each packet follows the In packet switching packets can follow any
same route. route.
The circuit switching network is Packet switching is implemented at the
implemented at the physical layer. datalink layer and network layer
Circuit switching requires simple protocols Packet switching requires complex
for delivery. protocols for delivery.
c) List the protocols related to all layers of OSI reference model 4M
Page No: 15 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Ans 1. Satellite is a manmade system which is kept in continuous rotation around the earth 2M diagram
in a specific orbit at a specific height above the earth and with specific speed.
2M for
2. In satellite communication, signal transferring between the sender and receiver is
explanation
done with the help of satellite.
3. In this process, the signal which is basically a beam of modulated microwaves is
sent towards the satellite called UPLINK (6 GHz).
4. Then the satellite amplifies the signal and sent it back to the receiver’s antenna
present on the earth’s surface called as DOWNLINK (4Ghz), as shown in the
diagram given
5 . As the entire signal transferring is happening in space. Thus this type of communication
is known as space communication. The satellite does the functions of an antenna and the
Page No: 16 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
repeater together. If the earth along with its ground stations is revolving and the satellite is
stationery, the sending and receiving earth stations and the satellite can be out of sync over
time.
6. Therefore Geosynchronous satellites are used which move at same RPM as that of the
earth in the same direction.
7. So the relative position of the ground station with respect to the satellite never changes.
1. From the Control Panel, go to Administrative Tools >> Computer Management >>
Services and Application >> DHCP.
2. From the Action menu, select New Scope. The New Scope wizard is displayed.
7. Select BOOTP only, set the lease duration to Unlimited, and click OK.
10. Enter the IP address and the MAC address for Controller B. Click Add. The
controllers are added to the right of the Reservations listing.
Page No: 17 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
11. Right-click Scope [iPad dress] scope-name to disable the scope.
Working:
A hub has many ports in it. A computer which intends to be connected to the network is
plugged in to one of these ports. When a data frame arrives at a port, it is broadcast to every
other port, without considering whether it is destined for a particular destination device or
not.
Features of Hubs
A hub operates in the physical layer of the OSI model.
A hub cannot filter data. It is a non-intelligent network device that sends message to
all ports.
It primarily broadcasts messages. So, the collision domain of all nodes connected
through the hub stays one.
Transmission mode is half duplex.
Page No: 18 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
II. Switch:
Switches are networking devices operating at layer 2 or a data link layer of the OSI model.
They connect devices in a network and use packet switching to send, receive or forward
data packets or data frames over the network.
Working:
A switch has many ports, to which computers are plugged in. When a data frame arrives at
any port of a network switch, it examines the destination address, performs necessary
checks and sends the frame to the corresponding device(s). It supports unicast, multicast as
well as broadcast communications.
Page No: 19 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Features of Switches
It is an intelligent network device that can be conceived as a multiport network
bridge.
It uses MAC addresses (addresses of medium access control sublayer) to send data
packets to selected destination ports.
It uses packet switching technique to receive and forward data packets from the
source to the destination device.
It is supports unicast (one-to-one), multicast (one-to-many) and broadcast (one-to-
all) communications
III. Bridge:
Bridges are used to connect similar network segments.
It combines two LANs to form an extended LAN.
Working:
A bridge accepts all the packets and amplifies all of them to the other side. The bridges are
intelligent devices that allow the passing of only selective packets from them. A bridge only
passes those packets addressed from a node in one network to another node in the other
network.
Page No: 20 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Ans Before beginning configuration procedure, the following are the prerequisites. Step by step
procedure -
Network hardware is installed and cabled. 6M
TCP/IP software is installed.
To configure your TCP/IP network, the following steps are followed:
Page No: 21 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
6) Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in Client network
services if you wish to make a particular service unavailable.
7) Decide which hosts on the network will be servers, and which services a
particular server will provide. Follow the instructions in Server network
services to start the server daemons you wish to run.
Ans Multiplexing is the set of techniques that allows the simultaneous transmission of multiple 2 M for 3
signals across a single data link. multiplexing
technique
with diagram
Frequency-Division Multiplexing
Page No: 22 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
In above figure, the transmission path is divided into three parts, each representing a
channel that carries one transmission.
Wavelength-Division Multiplexing
WDM is conceptually the same as FDM, except that the multiplexing and de-multiplexing
involve optical signals transmitted through fiber-optic channels. The idea is the same: We
are combining different signals of different frequencies. The difference is that the
frequencies are very high.
Time-Division Multiplexing
Figure gives a conceptual view of TDM. Note that the same link is used as in FDM; here,
however, the link is shown sectioned by time rather than by frequency. In the figure,
portions of signals 1,2,3, and 4 occupy the link sequentially.
Page No: 23 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
We also need to remember that TDM is, in principle, a digital multiplexing technique.
Digital data from different sources are combined into one timeshared link. However, this
does not mean that the sources cannot produce analog data; analog data can be sampled,
changed to digital data, and then multiplexed by using TDM.
In this type of network topology, all the nodes of a network are connected to a common
transmission medium having two endpoints.
All the data that travels over the network is transmitted through a common transmission
medium known as the bus or the backbone of the network.
When the transmission medium has exactly two endpoints, the network topology is known
by the name, 'linear bus topology'. A network that uses a bus topology is referred to as a
“Bus Network”.
Fig.shows bus topology. The central cable is the backbone of the network and is known as
Bus (thus the name). Every workstation or node communicates with the other device
through this Bus.
A signal from the source is broadcasted and it travels to all workstations connected to bus
cable. Although the message is broadcasted but only the intended recipient, whose MAC
Page No: 24 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
address or IP address matches, accepts it.
If the MAC/IP address of machine does not match with the intended address, machine
discards the signal. A terminator is added at ends of the central cable, to prevent bouncing
of signals. A barrel connector can be used to extend it.
II.Ring Topology:
Ring topology is a network topology that is set-up in circular fashion. It is called ring
topology because it forms a ring as each computer is connected to another computer, with
the last one connected to the first. Exactly two neighbors for each device.
Each node in this topology contains repeater. A signal passes node to node, until it reaches
its destination. If a node receives a signal intended for another node its repeater regenerates
the signal and passes it.
Token is a special three-byte frame that travels around the ring network. It can flow
clockwise or anticlockwise. Ring topology is a point to point network.
In dual ring topology, two ring networks are formed, and data flow is in opposite direction
in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
In a ring network, the data and the signals that pass over the network travel in a single
direction. In ring topology network arrangement, a signal is transferred sequentially using a
‘token’ from one node to the next.
Fig. shows a ring topology. The token travels along the ring until it reaches its destination.
Once, token reaches destination, receiving computer acknowledges receipt with a return
message to the sender. The sender then releases the token for the token for use by another
computer.
Page No: 25 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Tree Topology:
As its name implies in this topology devices make a tree structure. Tree topology integrates
the characteristics of star and bus topology.
• In tree topology, the number of star networks are connected using Bus. This main cable
seems like a main stem of a tree, and other star networks as the branches.
• It is also called expanded star topology. Ethernet protocol is commonly used in this type
of topology.
• Fig. shows tree topology. A tree topology can also combine characteristics of linear bus
and star topologies. It consists of groups of star configure workstations connected to a linear
bus backbone cable.
• Tree topologies allow for the expansion of an existing network and enable schools to
configure a network to meet their needs.
Page No: 26 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Ans Layered Architecture of ISO-OSI Model: 1M for
Diagram and
1. The basic idea of a layered architecture is to divide the ISO-OSI model into small pieces. 5M for
Each layer adds to the services provided by the lower layers in such a manner that the explanation
highest layer is provided a full set of services to manage communications and run the
applications.
3. In an n-layer architecture, layer n on one machine carries on conversation with the layer n
on other machine. The rules and conventions used in this conversation are collectively
known as the layer-n protocol.
2. It is responsible for transmission and reception of the unstructured raw data over
network.
3. Voltages and data rates needed for transmission is defined in the physical layer.
Page No: 27 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Layer2: Data Link Layer
1. Data link layer synchronizes the information which is to be transmitted over the physical
layer.
2. The main function of this layer is to make sure data transfer is error free from one node to
another, over the physical layer.
4. This layer sends and expects acknowledgements for frames received and sent
respectively. Resending of no acknowledgement received frames is also handled by this
layer.
1. Network Layer routes the signal through different channels from one node to other.
4. It divides the outgoing messages into packets and assembles the incoming packets into
messages for higher levels.
1. Transport Layer decides if data transmission should be on parallel path or single path.
2. Functions such as Multiplexing, Segmenting or Splitting on the data are done by this
layer
3. It receives messages from the Session layer above it, converts the message into smaller
units and passes it on to the Network layer.
4. Transport layer can be very complex, depending upon the network requirements.
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
1. Session Layer manages and synchronizes the conversation between two different
applications.
2. Transfer of data from source to destination session layer streams of data are marked and
are resynchronized properly, so that the ends of the messages are not cut prematurely and
data loss is avoided.
Page No: 28 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Layer 6: The Presentation Layer
1. Presentation Layer takes care that the data is sent in such a way that the receiver will
understand the information (data) and will be able to use the data.
2. While receiving the data, presentation layer transforms the data to be ready for the
application layer.
2. Transferring of files disturbing the results to the user is also done in this layer. Mail
services, directory services, network resource etc are services provided by application layer.
3. This layer mainly holds application programs to act upon the received and to be sent data.
ARP finds the hardware address, also known as Media Access Control (MAC) address, of
a host from its known IP address.
It is responsible to find the hardware address of a host from a know IP address there are
three basic ARP terms.
Page No: 29 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
The important terms associated with ARP are:
(i) Reverse ARP
(ii) Proxy ARP
(iii) Inverse ARP
Subnetting:
Dividing the network into smaller contiguous networks or subnets is called subnetting.
Suppose we take a network of class A. So, in class A, we have 2²⁴ hosts. So to manage
such a large number of hosts is tedious. So if we divide this large network into the smaller
network then maintaining each network would be easy.
So, in subnetting we will divide these 254 hosts logically into two networks. In the above
class C network, we have 24 bits for Network ID and the last 8 bits for the Host ID.
Supernetting:
For example:
Page No: 30 | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Page No: 31 | 31