CNE Model Answer Paper

Download as pdf or txt
Download as pdf or txt
You are on page 1of 47

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model
answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to
assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance
(Not applicable for subject English and Communication Skills).
4) While assessing figures, examiner may give credit for principal components indicated in the
figure. The figures drawn by candidate and model answer may vary. The examiner may give
credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant
values may vary and there may be some difference in the candidate‟s answers and model
answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant
answer based on candidate‟s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.

Q. Sub Answer Marking


No Q.N. Scheme
.
1. Attempt any FIVE of the following: 10
(a) List advantages & disadvantages of Computer Network. 2M
Ans.
Advantages of Computer Network:
1. Resource sharing
2. Information Sharing
3. High reliability communication
Any two
3. Cost effective
advanta
4. Powerful communication medium
ges &
5. Centralised management
disadvan
6. Data Backup
tages
7. Increased Storage capacity
½M
Disadvantages of Computer Network: each
1. Social issues regarding privacy of data, information etc..
2. Broadcasting of anonymous messages
3. Security threats
4. Need for efficient handler
5. Lack of Robustness

Page 1 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

(b) State features of Nos. 2M


Ans. Features of NOS (Network Operating System).:
A network operating systems salient features are:

 Basic support for operating systems like protocol and processor


support, hardware detection and multiprocessing.
 Printer and application sharing. Any two
 Common file system and database sharing. features
 Network security capabilities such as user authentication and 1M each
access control.
 Directory Services
 Backup and web services.
 Internetworking of various resources connected in the network
 Providing access to remote printers, managing which users are
using which printers when, managing how print jobs are queued,
and recognizing when devices aren't available to the network.
 Enabling and managing access to files on remote systems, and
determining who can access what—and who can't.
 Granting access to remote applications and resources, such as the
Internet, and making those resources seem like local resources to
the user (the network is ideally transparent to the user).
 Providing routing services, including support for major
networking protocols, so that the operating system knows what
data to send where.
 Monitoring the system and security, so as to provide proper
security against viruses, hackers, and data corruption.
 Providing basic network administration utilities (such as SNMP,
or Simple Network Management Protocol), enabling an
administrator to perform tasks involving managing network
resources and users.

(c) Define host and access point in computer network. 2M


Ans. Host: Host is the end system of WAN which contains a collection of
machines intended for running user (application) programs.
OR
Host is an end device such a computer which is connected for Each
communication. definitio
n 1M
Access point: Access point is the system in network which allows

Page 2 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

user to use application programs stored at HOST machine.


OR
An access point is a device that creates a wireless local area network,
or WLAN, usually in an office or large building.
OR
An access point connects to a wired router, switch, or hub via an
Ethernet cable, and projects a Wi-Fi signal to a designated area.
(d) State Computer topology. Give its importance. 2M
Ans. Computer topology is the network configuration. The term
„topology‟ refers to the way a network is laid out either physically or
logically.
OR Definitio
The topology of network is the geometric representation of the n 1M
relationship of all the links and linked devices usually called nodes to
each other.
OR
Network Topology is the way in which the devices and connected to
each other in a computer network.

Importance of Topology:
1. Better Understanding of the network
2. Effective use of resources Any one
3. Easier error detection Importa
4. Effective management of cost of network nce 1M
5. Easy to upgrade/change in the network
(e) Define protocol. State its significance. 2M
Ans. Protocols: Protocols are the rules and conventions used in the
exchange of information between two machines in various layers of a Definitio
network. n 1M
Significance of protocol:
 Protocols control the sending and receiving of the information
Any one
with in a network.
Signific
 The peer entities communicate using these protocols. Each
ance 1M
protocol belongs to one of the layers and is distributed among the
network entities that implement this protocol.
(f) List any four application layer protocols. 2M
(Note: Any other application layer protocol shall be considered).
Ans.

Page 3 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

Protocols used at application layer are:


1.TELNET (Terminal Network) Any
2. FTP (File Transfer Protocol) four
3. SMTP (Simple Mail Transfer Protocol) applicati
4. DNS (Domain Name System) on ½M
5. HTTP (Hyper Text Transfer Protocol) each
6. SNMP (Simple Network Management Protocol)
7. DHCP (Dynamic Host Configuration Protocol)
(g) Explain the logical address and physical address in computer 2M
network.
Ans. Logical Address:
Logical Address is network layer generated 32 bit address (for IPv4) Logical
interpreted by protocol handler. Logical addresses are used by Address
networking software to allow packets to travel through WAN 1M
(Internet). It makes packets to travel independently.
Physical Address: Physical
Physical address is 48 bit MAC address of system. This is hardware Address
level address used by “Ethernet” interface to communicate on LAN 1M
(Local Area Network) NIC card carries this address. This address is
specified by the manufacturer of NIC.
2. Attempt any THREE of the following: 12
(a) Describe working of Mesh topology. Give its advantages and 4M
disadvantages.
Ans. Mesh topology: In mesh topology there are multiple paths between /
nodes. Mesh networks are most commonly employed for long
distance transmission of data between nodes, which act as message
switch, circuit switch or packet switch. Working
A fully connected mesh, linking „n‟ nodes requires n (n-1) / 2 links 2M
but it is unusual for all possible or connections to be provided.

Page 4 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

Advantages:
1. Avoids traffic problem
2. Robust topology since if one node fails, it does not affect the other
nodes. Any two
3. Point to point connection makes it easier to detect errors. advanta
4. More security and Privacy in connections. ges and
disadvan
Disadvantages: tages
1. More cables are required than other topologies. ½M
2. Cost of the network is high since more number of cables are used. each
3. Installation and re-configuration is difficult.
4. Setup and maintenance of the topology is difficult.
5. Through put and transmission quantity depends on media and
capacity of switching nodes.
(b) Draw OSI model. State function of each layer. 4M
Ans.

Diagram
2M

Fig. ISO-OSI reference model

Page 5 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

OSI model has following 7 layers as Physical layer, Data link layer,
Network layer, Transport layer, Session layer, Presentation layer,
Application layer.
Following are the functions performed by the above layer
1. Physical layer: it deals with the mechanical and electrical
specification of the interface and transmission medium.
 Physical characteristics of interfaces and medium.
 Representation of bits or signals.
 Data rate Functio
 Synchronization of bit ns 2M
 Line configuration or connection type.
 Physical topology
 Transmission mode.

2. Data link layer: It performs node to node delivery of the data.


It is responsible for transmitting group of bits between the adjacent
nodes. The group of bits is called as frame.
 Framing
 Physical addressing
 Flow control
 Error control
 Media access control
 Node to node delivery

3. Network layer: It is responsible for routing the packets within the


subnet i.e. from source to destination. It is responsible for source to
destination delivery of individual packets across multiple networks. It
ensures that packet is delivered from point of origin to destination.
 Logical addressing
 Routing.
 Congestion control
 Accounting and billing
 Address transformation
 Source host to destination host error free delivery of packet.

4. Transport layer: Responsibility of process to process delivery of


message ensures that whole message arrives in order.
 Service point addressing
 Segmentation and reassembly

Page 6 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

 Connection control
 Flow control is performed end to end
 Error control

5. Session layer: Establishes, maintains, and synchronizes the


interaction among communication systems It is responsible for dialog
control and synchronization.
 Dialog control
 Synchronization
 Token Management
 Activity Management
 Data Exchange

6. Presentation layer: It is concerned with syntax, semantics of


information exchanged between the two systems.
 Translation: Presentation layer is responsible for converting
various formats into required format of the recipient
 Encryption: Data encryption and decryption is done by
presentation layer for security.
 Compression and Decompression: data is compressed while
sending and decompress while receiving for reducing time of
transmission.
7. Application layer: It enables user to access the network. It
provides user interfaces and support for services like email, remote
file access.
Functions of Application layer:
 Network virtual terminal
 File transfer access and management
 Mail services and directory services.
(c) Describe design issue for layering in computer network. 4M
Ans.
Design issue for layering in computer network:
Reliability: Network channels and components may be unreliable,
resulting in loss of bits while data transfer. So, an important design
Any
issue is to make sure that the information transferred is not distorted.
four
Scalability: Networks are continuously evolving. The sizes are design
continually increasing leading to congestion. Also, when new issues
technologies are applied to the added components, it may lead to 1M each

Page 7 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

incompatibility issues. Hence, the design should be done so that the


networks are scalable and can accommodate such additions and
alterations.
Addressing: At a particular time, innumerable messages are being
transferred between large numbers of computers. So, a naming or
addressing system should exist so that each layer can identify the
sender and receivers of each message.
Error Control: Unreliable channels introduce a number of errors in
the data streams that are communicated. So, the layers need to agree
upon common error detection and error correction methods so as to
protect data packets while they are transferred.
Flow Control: If the rate at which data is produced by the sender is
higher than the rate at which data is received by the receiver, there are
chances of overflowing the receiver. So, a proper flow control
mechanism needs to be implemented.
Resource Allocation: Computer networks provide services in the
form of network resources to the end users. The main design issue is
to allocate and deallocate resources to processes. The allocation/
deallocation should occur so that minimal interference among the
hosts occurs and there is optimal usage of the resources.
Statistical Multiplexing: It is not feasible to allocate a dedicated
path for each message while it is being transferred from the source to
the destination. So, the data channel needs to be multiplexed, so as to
allocate a fraction of the bandwidth or time to each host.
Routing: There may be multiple paths from the source to the
destination. Routing involves choosing an optimal path among all
possible paths, in terms of cost and time. There are several routing
algorithms that are used in network systems.
Security: A major factor of data communication is to defend it
against threats like eavesdropping and surreptitious alteration of
messages. So, there should be adequate mechanisms to prevent
unauthorized access to data through authentication and cryptography.
(d) Describe working of SLIP protocol and PPP protocol. 4M
Ans. SLIP (Serial Line Internet Protocol):
SLIP (Serial Line Internet Protocol) is designed to work over serial
ports and routers with TCP/IP suit. It is a simple protocol which

Page 8 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

provides communication between machines which are previously


configured for direct communication with each other. E.g Telephone
lines to be use for computer networks
SLIP transmission has a very simple format comprising of payload
and a flag that act as an end delimiter. The flag in generally a special Descript
character equivalent to decimal 192. If the flag is present in data then ion of
an escape sequence precedes it, so that the receiver does not consider SLIP &
it as the end of frame. PPP 2M
each
Data ENDFlag

PPP (Point to Point protocol):

PPP (Point to Point protocol) is a layer 2 or data link layer protocol


which is used to establish a direct communication between two nodes
in network. This protocol is used to create a simple link between two
peers in a network to transmit packets. It provides authentication,
encryption and compression.
PPP links are full duplex and deliver packets in order. PPP works in 5
phases.
1) Link Dead Phase: PPP begin with Link Dead phase. At this
phase link establishment initiates.
2) Link Establishment Phase: Configured packets with link control
protocol are handed over to Network Layer.
3) Authentication Phase: PPP link needs authentication before
exchange packets which network layer. Two types of
authentication protocols used-
a) Password Authentication Protocol
b) Challenge Handshake Authentication Protocol.
4) Link Transmission Phase: PPP packets travels over network
layer with IP, IPX and other Network Layer Protocol

Page 9 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

5) Line Termination Phase: Closing the link is the task at this


phase. PPP packet is configured to instruct network layer for
proper termination.

3. Attempt any THREE of the following: 12


(a) Describe the classification of networks based on transmission 4M
technology.
Ans. The Computer networks can be classified on the basis of transmission
technology used by them.
There are two types of Computer networks in this category:
1. Broadcast Networks: In broadcast networks, a single
communication channel is shared among all the computers of the
network. This means, all the data transportation occurs through this
shared channel. The data is transmitted in the form of packets. The
packets transmitted by one computer are received by all others in the
network. The destination of packet is specified by coding the address
Descript
of destination computer in the address field of packet header.
ion of
On receiving a packet, every computer checks whether it is intended two
for it or not. If the packet is intended for it, it is processed otherwise, categori
it is discarded. There is another form of broadcast networks in which es 2M
the packets transmitted by a computer are received by a particular each
group of computers. This is called as "Multicasting".
2. Point to Point or Store and Forward Networks: The store and
forward networks consist of several interconnected computers and
networking devices. The data is transmitted in the form of packets.
Each packet has its own source and destination address.
To go from a source to a destination, a packet on this type of network
may first have to visit one or more intermediate devices or computers
that are generally called as "routers". The packets are stored on an
intermediate router unless the output line is free. When the output line
is free, it is forwarded to the next router. The routing algorithms are
used to find a path from the source to destination. The routing
algorithms play a very important role in this type of network.
(b) State NIC and Access Point. How it differs? 4M
Ans. NIC :
A network interface card (NIC) is a hardware component without
which a computer cannot be connected over a network. It is a circuit

Page 10 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

board installed in a computer that provides a dedicated network


connection to the computer. It is also called network interface
controller, network adapter or LAN adapter.

Access Point : Definitio


An access point is a device that creates a wireless local area network, n of NIC
or WLAN, usually in an office or large building. An access point and AP
connects to a wired router, switch, or hub via an Ethernet cable, and 1M each
projects a Wi-Fi signal to a designated area.

For example, if you want to enable Wi-Fi access in your company's


reception area but don‟t have a router within range, you can install an
access point near the front desk and run an Ethernet cable through the
ceiling back to the server room.

NIC Access Point


1. NIC is a computer hardware 1. AP is a networking
component that connects a hardware device that allows
computer to a computer other Wi-Fi devices to
network connect to a wired network
Any
2. A NIC connects one System 2. An Access Point used to Two
to Computer Network connect many devices to differen
form Computer Network. ce 1M
each
3. Primary function of NIC is 3. Primary function of AP is to
to provide interface between bridge 802.11 WLAN
PC and Computer Network. traffic to 802.3 Ethernet
traffic.

4. Example : Ethernet card 4. Example : Wifi (802.11) AP

(c) Describe working of TCP/IP model. How it differs from OSI. 4M


Ans.
Working of TCP/IP Model :
TCP/IP uses the client/server model of communication in which a Descript
user or machine (a client) is provided a service (like sending a ion 2M

Page 11 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

webpage) by another computer (a server) in the network.


Collectively, the TCP/IP suite of protocols is classified as stateless,
which means each client request is considered new because it is
unrelated to previous requests. Being stateless frees up network paths
so they can be used continuously.

The transport layer itself, however, is stateful. It transmits a single


message, and its connection remains in place until all the packets in a
message have been received and reassembled at the destination.

TCP/IP model layers

TCP/IP functionality is divided into four layers, each of which


include specific protocols.

The application layer provides applications with standardized data


exchange. Its protocols include the Hypertext Transfer Protocol
(HTTP), File Transfer Protocol (FTP), Post Office Protocol 3 (POP3),
Simple Mail Transfer Protocol (SMTP) and Simple Network
Management Protocol (SNMP).

The transport layer is responsible for maintaining end-to-end


communications across the network. TCP handles communications
between hosts and provides flow control, multiplexing and reliability.
The transport protocols include TCP and User Datagram Protocol
(UDP), which is sometimes used instead of TCP for special purposes.

The Network layer, also called the Internet layer, deals with packets
and connects independent networks to transport the packets across
network boundaries. The network layer protocols are the IP and the
Internet Control Message Protocol (ICMP), which is used for error
reporting.

The physical layer consists of protocols that operate only on a link --


the network component that interconnects nodes or hosts in the
network. The protocols in this layer include Ethernet for local area
networks (LANs) and the Address Resolution Protocol (ARP).

Page 12 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

OSI (Open System TCP/IP (Transmission


Interconnection) Control Protocol / Internet
Protocol)
1. OSI is a generic, protocol 1. TCP/IP model is based on
independent standard, acting as standard protocols around which
a communication gateway the Internet has developed. It is
between the network and end a communication protocol,
user. which allows connection of
hosts over a network.
2. In OSI model the transport 2. In TCP/IP model the transport
layer guarantees the delivery of layer does not guarantees Differen
packets. delivery of packets. Still the ce any
TCP/IP model is more reliable. two
3. Follows vertical approach. 3. Follows horizontal approach. points
4. OSI model has a separate 4. TCP/IP does not have a 1M
Presentation layer and Session separate Presentation layer or each
layer. Session layer.
5. Transport Layer is 5. Transport Layer is both
Connection Oriented. Connection Oriented and
Connection less.
6. Network Layer is both 6. Network Layer is Connection
Connection Oriented and less.
Connection less.
7. OSI is a reference model 7. TCP/IP model is, in a way
around which the networks are implementation of the OSI
built. Generally it is used as a model.
guidance tool.
8. Network layer of OSI model 8. The Network layer in TCP/IP
provides both connection model provides connectionless
oriented and connectionless service.
service.
9. OSI model has a problem of 9. TCP/IP model does not fit
fitting the protocols into the any protocol
model.
10. OSI model defines services, 10. In TCP/IP, services,
interfaces and protocols very interfaces and protocols are not
clearly and makes clear clearly separated. It is also

Page 13 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

distinction between them. It is protocol dependent.


protocol independent.
11. It has 7 layers 11. It has 4 layers
12. OSI model has a separate 12. TCP/IP does not have a
Presentation layer and Session separate Presentation layer or
layer Session layer

Diagrammatic Comparison between OSI Reference Model and


TCP/IP Reference Model

(d) Explain working of ARP and RARP to assign IP addresses. 4M


Ans. ARP :
ARP (Address Resolution Protocol) is a network layer protocol. As Working
ARP is a dynamic mapping protocol, each host in the network knows of ARP
the Logical address of another host. Now, suppose a host needs to and
send the IP datagram to another host. But, the IP datagram must be RARP
encapsulated in a frame so that it can pass through the physical 2M each
network between sender and receiver. Here, the sender needs the

Page 14 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

physical address of the receiver so that it is being identified that to


which receiver the packet belong to when the packet travel in the
physical network.
For retrieving the physical address of the receiver the sender performs
the following action.

i. The sender sends the ARP query packet on the network which is
broadcasted to all the other host or router present in the network.
ii. The ARP query packet contains the logical and physical address
of the sender and the logical address of the receiver.
iii. All the host and router receiving the ARP query packet process it
but, only the intended receiver identifies its logical address
present in the ARP query packet.
iv. The receiver then sends ARP response packet which contains the
logical (IP) address and physical address of the receiver.
v. The ARP response packet is unicast message sent directly to the
sender whose physical address is present in the ARP query
packet.

RARP
RARP (Reverse Address Resolution Protocol) is also a network layer
protocol. RARP is a TCP/IP protocol that allows any host to obtain
its IP address from the server. RARP is adapted from the ARP
protocol and it is just reverse of ARP.

Page 15 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

RARP perform following steps to obtain an IP address from the


server.
i. The sender broadcast the RARP request to all the other host
present in the network.
ii. The RARP request packet contains the physical address of the
sender.
iii. All the host receiving the RARP request packet process it but,
the authorized host only which can serve RARP service,
responds to the RARP request packet such host are known as
RARP Server.
iv. The authorized RARP server replies directly to requesting host
with the RARP response packet which contains IP address for
the sender.

4. Attempt any THREE of the following: 12


(a) List and describe any four benefits of Computer network. 4M
Ans.
1. File sharing: -files can be centrally stored and used by multiple
users. Shared directory or diskdrive is used. If many users access Any
same file on network and make changes at same time andconflict four
occurs. Network operating system performs file sharing and provides benefits
security to sharefiles. 1M each

Page 16 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

2. Printer sharing: Printer connected in a network can be shared in


many ways. Use printerqueues on server. Here printer is connected to
server. Each work station can access printerdirectly. Printer can be
connected to server. Connect a printer to a computer in a network
andrun special print server software. Use built in print server. Use
dedicated print server. Byprinter sharing reduces no. of printers
needed. Share costly and high quality printers.

3. Application services: Share application on a network. When


applications are centralized,amount of memory required on disk of
work station is reduced. It is easier to administer anapplication. It is
more secure and reliable. It is faster and convenient.

4. E-mail services. Two types of email systems are available:

1) File based system: Files are stored in shared location on server.


Server provides access tofile. Gate way server connects from file
based email system to internet.

2) Client server e-mail system: E-mail server contains message and


handles e-mailinterconnections. E-mail client functions (also consider
other e-mail functions): read mail,send, compose, forward, delete.
E-mail protocols: SMTP, POP etc.
5. Remote access: Set up remote access service on network operating
system. Setup VPN (virtualprivate network) on internet terminal
services (TELNET). User can access files from remotelocation. User
can access centralized application or share files on LAN.
(b) Draw and describe graphical representation of Hybrid topology. 4M
Give it significance.
Ans. Hybrid topology is an interconnection of two or more basic network
topologies, each of which contains its own nodes. The resulting
interconnection allows the nodes in a given basic topology to
communicate with other nodes in the same basic topology as well as Descript
those in other basic topologies within the hybrid topology. ion 2M
Advantages of a hybrid network include increased flexibility as new
basic topologies can easily be added or existing ones removed and
increased fault tolerance.

Page 17 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

Diagram
1M

Hybrid Topology (Star-Ring)

Significance:

 There are many reasons why hybrid topologies are used but they
all have one thing in common: flexibility.
 There are few constraints on the structure that a hybrid topology Signific
cannot accommodate, and you can incorporate ring, bus, mesh, ance
and star topologies into one hybrid setup. 1M
 Hybrid topologies are very scalable. Their scalability makes them
well-suited to larger networks.
(c) Define Interfaces, Services, Packets & Layer. 4M
Ans. Interfaces :
In OSI Reference Model, the mechanism for communication between
adjacent layers in the model is called an interface. Interface refers to
the process by which data is passed between layer N of the model and
layer N-1 or layer N+1.
Definitio
Services: A service is a set of actions that a layer offers to another n 1M
(higher) layer.A service is what the layer provides to the layer above each
it through an interface.
A service is a set of primitives (operations) that a layer provides to
the layer above it.

Packet :
A packet is a small amount of data sent over a network, such as a
LAN or the Internet. Similar to a real-life package, each packet
includes a source and destination as well as the content (or data)

Page 18 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

being transferred. When the packets reach their destination, they are
reassembled into a single file or other contiguous block of data.
A typical packet includes two sections — a header and payload.
Information about the packet is stored in the header.
Layer :
In layered architecture of Network Model, one whole network
process is divided into small tasks. Each small task is then assigned to
a particular layer which works dedicatedly to process the task only.
Every layer does only specific work.
In layered communication system, one layer of a host deals with the
task done by or to be done by its peer layer at the same level on the
remote host. The task is either initiated by layer at the lowest level or
at the top most level.
(d) Give class & subnet address for following IP address: 4M
(i) 191.168.0.1
(ii) 221.45.14.68
(iii) 245.32.14.24
(iv) 10.145.14.68
Ans. For
Sr. IP Address Class Subnet each
No. address address
1 191.168.0.1 Class B 191.168.0.0 ½M for
correct
2 221.45.14.68 Class C 221.45.14.0 Class
and
3 245.32.14.24 Class E Reserved
½M for
4 10.145.14.68 Class A 10.0.0.0 subnet
address
(e) Describe working of Nos. State its salient features. 4M
Ans. Working of NOS :
A network operating system (NOS) is a computer operating system
(OS) that is designed primarily to support workstations, personal Descript
computers and, in some instances, older terminals that are connected ion 2M
on a local area network (LAN). The software behind a NOS allows
multiple devices within a network to communicate and share
resources with each other.
The composition of hardware that typically uses a NOS includes a
number of personal computers, a printer, a server and file server with
a local network that connects them together. The role of the NOS is to

Page 19 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

then provide basic network services and features that support multiple
input requests simultaneously in a multiuser environment.

Types of network operating systems


There are two basic types of network operating systems, the peer-to-
peer NOS and the client/server NOS:

Features of network operating systems


Features of network operating systems are typically associated with
user administration, system maintenance and resource management
functionality.
This includes:

 Basic support for operating systems like protocol and processor


support, hardware detection and multiprocessing.
 Printer and application sharing.
 Common file system and database sharing.
 Network security capabilities such as user authentication and
access control. Any 2
 Directory Services features
 Backup and web services. 1M each
 Internetworking of various resources connected in the network
 Providing access to remote printers, managing which users are
using which printers when, managing how print jobs are queued,
and recognizing when devices aren't available to the network.
 Enabling and managing access to files on remote systems, and
determining who can access what—and who can't.
 Granting access to remote applications and resources, such as the
Internet, and making those resources seem like local resources to
the user (the network is ideally transparent to the user).
 Providing routing services, including support for major
networking protocols, so that the operating system knows what
data to send where.
 Monitoring the system and security, so as to provide proper
security against viruses, hackers, and data corruption.
 Providing basic network administration utilities (such as SNMP,
or Simple Network Management Protocol), enabling an
administrator to perform tasks involving managing network

Page 20 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

resources and users.

5. Attempt any TWO of the following: 12


(a) Describe working of DNS and SMTP protocols with suitable 6M
example.
(Note: Any other diagram showing the DNS concept shall also be
considered).
Ans.
DNS:
 The Domain Name System (DNS) is a client/server application
that identifies each host on the Internet with a unique user-
friendly name.
 DNS organizes the name space in a hierarchical structure to
decentralize the responsibilities involved in naming.
 Each node in the tree has a domain name. Working
 A domain is defined as any subtree of the domain name space. of DNS
 Domain Name system has top level domains such as .edu, .org, 2M
.com etc
 The name space information is distributed among DNS servers. Example
 A domain name server is simply a computer that contains the 1M
database and the software of mapping between domain names and
IP addresses.
Functions of DNS:
 Accept request from programs for converting domain names into
IP addresses.
 Accept request from other DNS servers to convert domain names
into IP addresses.

Page 21 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

As shown in Diagram Stub receiver wants to access


www.example.com; this request is forwarded to Recursive resolver. Working
The Recursive resolver forwards the request to all connected of
machines with request via its IP address. Server which is connected to SMTP
specified IP address will respond back with said request. 2M

SMTP:
 SMTP is simple mail transfer protocol.
 It is connection-orientedtext-based protocol in which sender Example
communicates with receiver using a command and supplying data 1M
over reliable TCP connection.
 SMTP is standard application layer protocol for delivery of email
over TCP/IP network.
 SMTP establish a TCP connection between Sender And port
number 25 of receiver.
 It is limited in its ability to queue messages at the receiving end, it
is usually used with one of two other protocols, POP3 or IMAP,
that let the user save messages in a server mailbox and download
them periodically from the server.

Page 22 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

(b) Draw & explain structure of IPV6 address. Highlights major 6M


enhancement w.r.f. IPV4.
Ans.

Diagram
2M

Version: This four-bit field specifies the version of the IP, i.e., 6 in
this case.
Priority: It defines the priority of the packet concerning traffic
congestion. Descript

Page 23 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

Flow label: The reason for designing this protocol is to facilitate with ion 2M
special controlling for a certain flow of data.
Payload length: It defines the total length of the IP datagram
excepting the base header.
Next header: It‟s an eight-bit field describe the header that trails the
base header in the datagram. The next header is one of the optional
extension headers which IP uses or the header for an upper layer
protocol such as UDP or TCP.
Hop limit: This eight-bit hop limit field assist with the same
functions at the TTL field in IPv4.
Source address: It is a 16 bytes internet address identifies the source
of the datagram.
Destination address: This is 16-byte internet address that generally
describes the final destination of the datagram.

Major enhancement in IPv6.


1. IPv4 has 32-bit address length whereas IPv6 has 128-bit address
length.
2. IPv4 addresses represent the binary numbers in decimals. On the
other hand, IPv6 addresses express binary numbers in
hexadecimal.
3. IPv6 uses end-to-end fragmentation while IPv4 requires an List of
intermediate router to fragment any datagram that is too large. Any 4
4. Header length of IPv4 is 20 bytes. In contrast, header length of Enhanc
IPv6 is 40 bytes. ement
5. IPv4 uses checksum field in the header format for handling error 2M
checking. On the contrary, IPv6 removes the header checksum
field.
6. In IPv4, the base header does not contain a field for header
length, and 16-bit payload length field replaces it in the IPv6
header.
7. The option fields in IPv4 are employed as extension headers in
IPv6.
8. The Time to live field in IPv4 refers to as Hop limit in IPv6.
9. The header length field which is present in IPv4 is eliminated in
IPv6 because the length of the header is fixed in this version.
10. IPv4 uses broadcasting to transmit the packets to the destination
computers while IPv6 uses multicasting and anycasting.
11. IPv6 provides authentication and encryption, but IPv4 doesn‟t

Page 24 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

provide it.
(c) Differentiate between peer-to-peer, client server and distributed 6M
modes of computing. (Any four points).
Ans.
BASIS PEER-TO- CLIENT- DISTRIBUTED
FOR PEER SERVER MODES
COMPA
RISON
Basic Clients and There is a All nodes are
server are not specific server kept at
distinguished; and specific different/distribut Any
each node act as clients ed location four
client and connected to points
server. the server. 1½M
Service Each node can The client Each node is each
request for request for capable to accept
services and can service and input and produce
also provide the server respond result.
services. with the
service.
Focus Connectivity. Sharing the Sharing
information. Resources and
performing
dedicated task
Data Each peer has The data is Data is stored at
its own data. stored in a local and over
centralized network as well.
server.
Server As the services When several Each node can
are provided by clients request act as dedicated
several servers for the services server if required.
distributed in simultaneously,
the peer-to-peer a server can get
system, a server bottlenecked.
in not
bottlenecked.
Expense Peer-to-peer The client- This is very
areless server are expensive
expensive to expensive to architecture as it

Page 25 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

implement. implement. requires special


hardware
Stability Peer-toPeer Client-Server is Extremely stable
suffers if the more stable and and scalable.
number of peers scalable.
increases in the
system.

6. Attempt any TWO of the following: 12


(a) Enlist steps to share a printer in a network and share a scanner 6M
within two computers.
Ans. 1. Install the printer drivers: In order to share a printer, it must be
installed on the computer it is connected to. Most modern printers Steps to
connect via USB and will install automatically when they are share
connected. printer
2. Open the Control Panel: You can access the Control Panel in 4M
Windows 7 by clicking the Start menu and selecting Control
Panel. In Windows, press ⊞Win+X and select Control Panel
from the menu.
3. Open the Network and Sharing Center: If your Control Panel
is in Category view, click "Network and Internet", and then select
"Network and Sharing Center". Click on "Network and Internet".
If your Control Panel is in Icon view, click the "Network and
Sharing Center" icon.
4. Click the "Change advanced sharing settings" link. This is
located in the left navigation pane of the Network and Sharing
Center.
5. Expand the profile you need to change. You will see three
different options when you open the "Advanced share settings":
Private, Guest or Public, and All Networks. If you are on a Home
network, expand the Private section.
6. Enable "File and printer sharing". Toggle this on to allow
other devices to connect to your printer. This will also allow you
to share files and folders with other computers on the network.
7. Toggle the password protection. You can decide whether or not
you want to enable password protection for your printer. If it is
turned on, only users who have a user account on your computer
will be able to access the printer. You can toggle password

Page 26 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

protection in the "All Networks" section.


8. Share the printer. Now that file and printer sharing has been
turned on, you will need to share the printer itself. To do this, go
back to the Control Panel and open the Devices and Printers
option. Right-click on the printer you want to share and click
"Printer properties". Click the Sharing tab, and then check the
"Share this printer" box.

Sharing Scanner within two machine:


1. Open the Start menu and select "Control Panel." Steps to
2. Type "network" in the search box share
3. Find the scanner in the list of devices, right-click it, then select scanner
"Install." 2M
4. Follow the on-screen instructions to finish adding the scanner.
(b) Elaborate the procedure to divide networks into subnets. Divide 6M
given network address in four equal part to hold maximum 50
devices in each subnet.
IP address 192.168.14.14/25
(Note: The problem is solved considering the given address as Host
address with class C type and 2 bits considered for subnetting. Any
other correct solution shall be considered).
Ans. 1. Convert to binary: Convert given IP address and Subnet mask
into binary equivalent values.
2. Calculate the subnet address: To calculate the subnet address
perform a bit-wise AND operation (1 .1=1, 1 . 0 or 0 . 1 =0, 0 .
0=0) on the host IP address and subnet mask. The result is the Procedu
subnet address in which the host is situated. re to
3. Find host range.The Subnet address is identified by all 0 bits in divide
the Host part of the address. The first host within the subnet is network
identified by all 0s and a 1. The last host is identified by all 1s 3M
and a 0. The broadcast address is the all 1s.
4. Calculate the total number of subnets and the hosts per subnet.
Knowing the number of Subnet and Host bits we can now
calculate the total number of possible subnets and the total
number of hosts per subnet. We assume in our calculations that
all-zeros and all-ones subnets can be used.
Step 1:
IP Address (Decimal) 192.168.14.14
IP Address (Binary) 11000000 .10101000 .00001110

Page 27 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

.00001110
Subnet Mask 255. 255. 255.192
(Decimal)
Subnet Mask (Binary) 11111111 . 11111111. 11111111.
10000000 Division
of given
Since we need 4 subnetworks subnet mask of 25 will not work network
because with subnet mask of 25 one can divide network in two parts. 3M
So we borrow a bit from host bit.
Step 2:
IP Address 192.168.14.14
(Decimal)
IP Address 11000000 10101000. 00001110. 00001110
(Binary_ .
Subnet Mask 11111111 11111111 11111111 11000000
(Binary)
Subnet 11000000 10101000 00001110 00000000
Address
(Binary)
Subnet 192.168.14.0
Address
(Decimal)

Step 3:
We know already that for subnetting this Class C address we have
borrowed 2 bits from the Host field. These 2 bits are used to identify
the subnets. The remaining 6 bits are used for defining hosts within a
particular subnet.
Step 4:

Broadcast
Network Address Usable Host Range
Address:
192.168.14.1 -
192.168.14.0 192.168.14.63
192.168.14.62
192.168.14.65 -
192.168.14.64 192.168.14.127
192.168.14.126
192.168.14.128 192.168.14.129 - 192.168.14.191

Page 28 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

192.168.14.190
192.168.14.193 -
192.168.14.192 192.168.14.255
192.168.14.254
Since we want 50 in each subnetwork we can adjust it as follows.

Network
Usable Host Range Broadcast Address:
Address
192.168.14.1 -
192.168.14.0 192.168.14.63
192.168.14.50
192.168.14.65 -
192.168.14.64 192.168.14.127
192.168.14.114
192.168.14.129 -
192.168.14.128 192.168.14.191
192.168.14.178
192.168.14.193 -
192.168.14.192 192.168.14.255
192.168.14.242
(c) Design a network with 15 host divided into 3 equal size sub- 6M
networks each with different network topology. i.e. bus, star and
ring. Connect these sub-networks with suitable network device.
Specify IP address to each sub-network with its Broadcast and
Network address.
(Note: Any other Class of IP address with different set of subnets
shall be considered).
Ans. List of available IP Address, Broadcast and Network Address:
Name of Network Broadcast
Usable Host Range
Topology Address Address:
BUS 192.168.14.1 - List of
192.168.14.0 192.168.14.63
192.168.14.5 Broadcas
RING 192.168.14.65 - t and
192.168.14.64 192.168.14.127 Network
192.168.14.69
address
STAR 192.168.14.129 - for 3
192.168.14.128 192.168.14.191
192.168.14.133 networks
1M each

Page 29 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2019 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

192.168.14.65
to
192.168.14.1 192.168.14.69
to
192.168.14.5 Design of
Network
3M
Gateway/Router

192.168.14.129
to
192.168.14.133

Page 30 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 19 EXAMINATIONS
Subject Name: Computer Network Model Answer Subject Code: 22417
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given
in the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may
vary. The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the
assumed constant values may vary and there may be some difference in the
candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner
of relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program
based on equivalent concept.

Q. Sub Answer Marking


No. Q. Scheme
N.
1 Attempt any Five of the following: 10 M
a List network classification based on network geographic area. 2M
Ans Listing-2 M

 Personal Area Network


 Local Area Network
 Wide Area Network
 Metropolitan Area Network
 Campus Area Network
b State any two differences between switch and hub. 2M
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Ans Hub Switch 2 M for any


It uses broadcast technology. It uses point to point two relevant
technology/Unicast technology. points
It send the received packet to all It only send packet to only
ports. destination port.
Hub is less intelligent device. Switch is more intelligent
device.
Hub is passive device (without Switch is active device (with
Software) software)
Hub is less expensive Expensive
4/12 port 24/48 ports
Manufacturers are: Sun Systems, Manufacturers are: Cisco and D-
Oracle and Cisco Link
It cannot learn or store MAC Switch store MAC address in
address. lookup table.
c Define meaning of layered approach. 2M
Ans Layered Approach: The complex task of communication is broken
into simpler subtask or modules. Each layer performed a subset of the
required communication function.
d State the application of computer network. 2M
Ans  Marketing and sales 2 M any four
 Financial services
 Information services
 Banking
 Television
 E-mail
 Electronic data interchange(EDI)
 Teleconferencing
e List any four application layer protocol. 2M
Ans  SMTP-Simple mail transfer protocol. 2 M for any
 POP- Post office protocol four
 HTTP- Hypertext transfer protocol.
 FTP- File transfer protocol.
 TELNET-Terminal Network
 DNS- Domain Name system BOOTP-BOOT protocol
f Define IP address. State IP addresses classes. 2M
Ans IP address: An Internet Protocol address (IP address) is a numerical Definition
label assigned to each device connected to a computer network that 1 M, List
uses the Internet Protocol for communication. classes 1 M
Or
An IP address is an address used to uniquely identify a device on an IP
network.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Classes:
Class A
Class B
Class C
Class D
Class E
g Draw following topology with five Host: 2M
(i) Ring
(ii) Mesh Topology
Ans 1 M for Ring
Topology,
1 M for
Mesh
topology

Ring Topology

Mesh topology

2 Attempt any Three of the following: 12 M


a Draw constructional structure of fiber optic cable. Write any four 4M
features.
Ans 2M
Diagram,
2 M Features
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

OR

Features of Fiber optic cable:


 Long-haul trunks-increasingly common in telephone network
(Sprint ads)
 Metropolitan trunks-without repeaters (average 8 miles in
length)
 Rural exchange trunks-link towns and villages
 Local loops-direct from central exchange to a subscriber
(business or home)
 Local area networks-100Mbps ring networks.
b Draw TCP/IP reference model. Write the function of each layer. 4M
Ans 2 M TCP/IP
Model, 2M
functions of
layer.

TCP/IP Reference Model is a four-layered suite of communication


protocols.
The four layers in the TCP/IP protocol suite are:
 Host-to- Network Layer: It is the lowest layer that is
concerned with the physical transmission of data. TCP/IP does
not specifically define any protocol here but supports all the
standard protocols.
 Internet Layer: It defines the protocols for logical
transmission of data over the network. The main protocol in
this layer is Internet Protocol (IP) and it is supported by the
protocols ICMP, IGMP, RARP, and ARP.
 Transport Layer: It is responsible for error-free end-to-end
delivery of data. The protocols defined here are Transmission
Control Protocol (TCP) and User Datagram Protocol (UDP).
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Application Layer: This is the topmost layer and defines the


interface of host programs with the transport layer services.
This layer includes all high-level protocols like Telnet,HTTP,
FTP, SMTP, etc.
c Describe the working of following OSI Model: 4M

(i)Data Link layer


(ii) Network layer

Ans Data link layer: Data link layer is responsible for converting data 2 M for DLL
stream to signals bit by bit and to send that over the underlying 2 M for
hardware. At the receiving end, Data link layer picks up data from Network
hardware which are in the form of electrical signals assembles them in layer
a recognizable frame format, and hands over to upper layer.
Function of data link layer:

 Framing: Data-link layer takes packets from Network Layer


and encapsulates them into Frames. Then, it sends each frame
bit-by-bit on the hardware. At receiver’ end, data link layer
picks up signals from hardware and assembles them into
frames.
 Addressing: Data-link layer provides layer-2 hardware
addressing mechanism. Hardware address is assumed to be
unique on the link. It is encoded into hardware at the time of
manufacturing.
 Synchronization: When data frames are sent on the link, both
machines must be synchronized in order to transfer to take
place.
 Error Control: Sometimes signals may have encountered
problem in transition and the bits are flipped. These errors are
detected and attempted to recover actual data bits. It also
provides error reporting mechanism to the sender.
 Flow Control: Stations on same link may have different speed
or capacity. Data-link layer ensures flow control that enables
both machines to exchange data on same speed.
 Multi-Access: When host on the shared link tries to transfer
the data, it has a high probability of collision. Data-link layer
provides mechanism such as CSMA/CD to equip capability of
accessing a shared media among multiple Systems.

Network layer: The network layer (Layer 3) controls the source to


destination delivery of data packets across multiple hops (nodes). It
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

controls the operation of the subnet.

The main functions of the network layer are as follows:


 It is responsible for routing packets from the source host to the
destination host. The routes can be based upon static tables that
are rarely changed, or they can be automatically updated
depending upon network conditions.
 The data link layer assigns the physical address locally. When
the data packets are routed to remote locations, a logical
addressing scheme is required to differentiate between the
source system and the destination system. This is provided by
the network layer.
 This layer also provides mechanisms for congestion control.
 The network layer tackles issues like transmission delays,
transmission time, avoidance of jitters, etc.

d Describe the Host –to –network layer protocol Slip and PPP. 4M
Ans SLIP means Serial Line Internet Protocol. SLIP is the result of the 2 M for
integration of modem protocols prior to the suite of TCP/IP protocols. SLIP, 2 M
It is a simple Internet link protocol conducting neither address nor For PPP
error control, which is the reason that it is quickly becoming obsolete
in comparison to PPP. Data transmission with SLIP is very simple: this
protocol sends a frame composed only of data to be sent followed by
an end of transmission character (i.e. the END character, the ASCII
code 192). A SLIP frame looks like this:

PPP means Point to Point Protocol. It is a much more developed


protocol than SLIP (which is why it is replacing it), insofar as it can
transfer additional data and is better suited to data transmission over
the Internet.
(The addition of data in a frame is mainly due to the increasing
bandwidth).
In reality, PPP is a collection of three protocols: a datagram
encapsulation protocol; an LCP, or Link Control Protocol, enabling
testing and communication configuration; a collection of NCPs,
or Network Control Protocols, allowing integration control of PPP
within the protocols of the upper layers. Data encapsulated in a PPP
frame is called a packet. These packets are generally datagrams, but
they can also be different (hence the specific designation of packet
instead of datagram). As such, one field of the frame is reserved for
the type of protocol to which the packet belongs. A PPP frame looks
like this:
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

The padding data is used to adapt the length of the frame for certain
protocols. A PPP session (from opening to closure) takes place as
follows. Upon connection, an LCP packet is sent. In the event of an
authentication request from the server, a packet relating to an
authentication protocol may be sent i.e. </bold>PAP (Password
Authentication Protocol), CHAP (Challenge Handshake
Authentication Protocol), or Kerberos. Once communication is
established, PPP sends configuration information using the NCP
protocol. Datagrams to be sent are transmitted as packets. Upon
disconnection, an LCP packet is sent to end the session.

3 Attempt any three of the following: 12 M


a State the classification of network based on: 4M
i) Transmission technology
ii) Network Relationship

Ans Classification of networks based on transmission technology: 2 M for


The can be categorized broadly into two types: transmission
 Broadcast networks: Broadcast networks have a single technology
communication channel that is shared or used by all the and 2 M for
machines on the network. Short messages called packets sent Network
by any machine are received by all the others. Broadcast Relationship.
systems generally use a special code in the address field for
addressing a packet to all the concerned computers. This mode
of operation is called broadcasting.
 Point-to-point networks: Point to point networks consists of
many connections between individual pairs of machines. To go
from the source to the destination a packet on these types of
network may have to go through intermediate computers before
they reach the desired computer.

Classification of networks based on Network Relationship:


i)Client Server network
ii) Peer to peer network
 Client Server Network: In this network, a centralized
computer, server is used for sharing the resources and
providing services to other computers, clients. Thus the name
Client Server. The servers stores all the network's shared files
and applications programs, such as word processor documents,
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

compilers, database applications, spreadsheets, and the network


operating system. Client will send request to access
information from the server. Based on the request, server will
send the required information to the client.

 Peer to peer network: In this type of network, each


computer/node shares its resources using its own file system.
There are no servers required in this network. Thus there is no
centralized management, but each system owns its resources
and services to be shared with other computers.
b Write any two specifications of following: 4M
i)Switch
ii)Router
Ans Switch: Any two
 A switch is a multi-port bridge with a buffer and a design that specifications
can boost its efficiency (large number of ports implies less of switch:
traffic) and performance. 2M
 Switch is data link layer device. Switch can perform error
checking before forwarding data that makes it very efficient as Any two
it does not forward packets that have errors and forward good specifications
packets selectively to correct port only. of Router:
 In other words, switch divides collision domain of hosts, 2M
but broadcast domain remains same.
 The basic function that any switch is supposed to perform is to
receive information from any source connected to it and
dispatch that information to the appropriate destination only.
This thing differentiates switches from hubs.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Router:
 Router is network layer device that routes packets based on
their logical address (host to host address).
 Router normally connects LAN and WANS in the internet
using route information stored in routing table Routing table of
router is tabular database which stores information about
destination and path (next Hop address through with to reach)
information routing table is updated dynamically depending on
changes in network.
 Messages are stored in the routers before re-transmission,
routers are said to implement a store-and-forward technique.

Two types of routers are:


1. Static routers: A router with manually configured routing tables is
known as a static router.
2. Dynamic routers: A router with dynamically configured routing
tables is known as a dynamic router. Dynamic routing consists of
routing tables that are built and maintained automatically through an
ongoing communication between routers.
c Describe major functions of Transport layer in TCP/IP model. 4M
Ans Functions of Transport Layer Any 4
functions
1. Service Point Addressing: Transport Layer header includes (1 function
service point address which is port address. This layer gets the 1 M)
message to the correct process on the computer unlike Network
Layer, which gets each packet to the correct computer.
2. Segmentation and Reassembling: A message is divided into
segments; each segment contains sequence number, which enables
this layer in reassembling the message. Message is reassembled
correctly upon arrival at the destination and replaces packets which
were lost in transmission.
3. Connection Control: It includes 2 types:
o Connectionless Transport Layer: Each segment is
considered as an independent packet and delivered to the
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

transport layer at the destination machine.


o Connection Oriented Transport Layer: Before delivering
packets, connection is made with transport layer at the
destination machine.
4. Flow Control: In this layer, flow control is performed end to end.
5. Error Control: Error Control is performed end to end in this layer
to ensure that the complete message arrives at the receiving
transport layer without any error. Error Correction is done through
retransmission.

d Describe the function of ARP with suitable diagram. 4M


Ans  Address Resolution Protocol (ARP) 1 M diagram
 ARP is a network-layer protocol. and 3 M
 ARP maps IP address to its corresponding MAC address. explanation
 The sender knows the IP address of the target; and it wants to
know the hardware address of the target.
 So, the sender creates an ARP request message in which it fills
the following fields:
o Sender Hardware Address
o Sender IP address
o Target IP Address
 ‘Target Hardware Address’ field is filled with 0’s since it does
not know that.
 This ARP request message is broadcast to all hosts on the
network.
 All hosts on the network receive and process the ARP packet.
Only the host whose IP address matches with the value in the
‘Target IP address’ field sends an ARP reply.
 The ARP reply message sent by the target machine contains its
hardware address. This ARP reply is unicast.
 The sender receives this reply message and now it knows the
hardware address of the target machine.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

4 Attempt any three of the following: 12 M


a Describe any four benefits of Computer Network. 4M
Ans Benefits of computer network: Any 4
 File sharing: Computer networks allow file sharing and benefits
remote file access. A person sitting at one workstation (1 benefit
connected to a network can easily see files present on another 1 M)
workstation, provided he/she is authorized to do so.
 Resource Sharing: A computer network provides a cheaper
alternative by the provision of resource sharing. All the
computers can be interconnected using a network and just one
modem & printer can efficiently provide the services to all
users.
 Inexpensive set-up: Shared resources means reduction in
hardware costs. Shared files means reduction in memory
requirement, which indirectly means reduction in file storage
expenses.
 Flexible Handling: A user can log on to a computer anywhere
on the network and access his/her files. This offers flexibility
to the user as to where he/she should be during the course of
his/her routine. Centralized Management- Networking allows
the management of various resources in the organization,
centrally through architectures such as client server
architecture.
 Backing up data: Creating backup files and restoring them
becomes much easier using computer networks.
 E-mail Services: E-mail is extremely valuable & important
feature for communication within organization or outside the
people in world. Networking allows file based or client based
systems for communication.
b Describe star topology with suitable diagram. List two advantages 4M
of star topology.
Ans Star Topology: 2 M for
explanation
and 1 M for
diagram and
1 M for
advantages

Star Topology
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 In a star topology, each device has a dedicated point-to-point


link only to a central controller, usually called a hub. The
devices are not directly linked to one another.
 A star topology does not allow direct traffic between devices.
The controller acts as an exchange. If one device wants to send
data to another, it sends the data to the controller, which then
relays the data to the other connected device. A star topology
is less expensive than a mesh topology.
 In a star, each device needs only one link and one I/O port to
connect it to any number of others. This factor also makes it
easy to install and reconfigure.
 One big disadvantage of a star topology is the dependency of
the whole topology on one single point, the hub. If the hub
goes down, the whole system is dead. Although a star requires
far less cable than a mesh, each node must be linked to a
central hub. The star topology is used in local-area networks
(LANs). High-speed LANs often use a star topology with a
central hub.
Advantages of star topology:
 Centralized management allows better monitoring the network
 Easy to manage as connection of nodes and removing can be
done easily, without affecting the network.
 Failure of one link doesn’t affect the rest of the network.
 Easy to detect the failure and troubleshoot.
 Better performance as the signal sent by the node doesn’t
necessarily get transmitted to all workstations.
c Write stepwise procedure to share file on network. 4M
Ans Step 1: Create File 4 M for
Create a file/folder on the desktop. relevant steps
Step 2: Advanced Sharing
Right-click on the file, select properties. Click over to the "Sharing"
tab and select advanced sharing. Check the box marked "Share folder".
Step 3: Permissions
Select which permissions you want other users to have for this file.
You will retain full access, but others will have either read-only, edit,
or executable permissions, depending on what you select.
Step 4: Open Sharing
Go to control panel, select network & internet, then select network &
sharing center. Go to Advanced sharing settings. Scroll down, and
select "Turn on sharing so anyone with network access can read and
write files in the Public folders" and "Turn off password protected
sharing".
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Step 5: Accessing the File


On the 2nd PC, open file explorer. Go to network. Your file should be
there.
d Calculate broadcast address for the following: 4M
i) Network of class ‘C’ with network address 192.168.10.0
ii) Network of class ‘B’ with network address 172.16.20.0
Ans Network address: 192.168.10.0 2 M each
Net mask: 255.255.255.0 = 24
Therefore, we can represent it as,
192.168.10.0/24
In Binary:
Network address : 11000000.10101000.00001010.00000000
Subnet mask : 11111111.11111111.11111111.00000000
Inverse Mask : 00000000.00000000.00000000.11111111
Broadcast address : 11000000.10101000.00001010.11111111
Broadcast address in decimal: 192.168.10.255
Network address: 172.16.20.0
Net mask: 255.255.0.0 = 16
Therefore, we can represent it as,
172.16.0.0/16
In Binary:
Network address : 10101100.00010000.00010100.00000000
Subnet mask : 11111111.11111111.00000000.00000000
Inverse Mask : 00000000.00000000.11111111.11111111
Broadcast address : 10101100.00010000.11111111.11111111
Broadcast address in decimal: 172.16.255.255

e State difference between peer to peer and client server network. 4M

Ans 1 M each
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

5 Attempt any three of the following: 12 M


a Write step wise procedure to configure DHCP server. 6M
Ans Steps to configure DHCP server:
 When the client detects it has connected to the DHCP server, it Proper steps
send the DHCPDISCOVER request. 6M
 The router either receives the request or redirects it to the
appropriate DHCP server.
 If the server accepts the new device, it will send a
DHCPOFFER message back to the client which contains the
client device’s MAC address and the IP address being offered.
 The client returns the DHCPREQUEST message to the server
confirming it will use the IP Address.
 Finally, server responds with a DHCPACK acknowledgement
message that confirms the client has been given access for a
certain amount of time.

b State difference between IPv4 and IPv6. 6


Ans IPv4 IPv6 Any Six
Source and Destination Source and Destination Points: 1
addresses are 32 bits in length. addresses are 128 bits in length. Point one M
IPv4 addresses are binary IPv6 addresses are binary
numbers represented in numbers represented in
decimals. hexadecimals.
IPsec supports in optional IPsec support is required.
Security is dependent on IPsec is inbuilt in IPv6 protocol.
application.
No packet flow identification. Packet flow identification is
available within the IPv6 header
using flow label field
Header includes a checksum. Header does not include a
checksum.
Encryption and Authentication is Encryption and Authentication is
not provided. provided.
Must be configured either Does not require manual
manually or through DHCP. configuration or DHCP.
Header includes options. All optional data is moved to
IPv6extension headers.
Most support a 576 byte packet Must support 1280 byte packet
size.(Usually fragmented) size(Without Fragmentation)

c Design suitable network layout for an organization with four 6M


departments (6 users each), shared print server and network
printer.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Ans Any relevant


diagram: 6 M

6 Attempt any three of the following: 12 M


a Differentiate between OSI Model and TCP/IP Model. 6
Ans OSI TCP/IP Any Six
OSI is a generic, protocol TCP/IP model is based on Points: 1
independent standard, acting as a standard Point one M
communication gateway Protocols around which the
between the network and end Internet has developed. It is a
User. communication protocol, which
allows connection of hosts over
a network.
In OSI model the transport layer In TCP/IP model the transport
Guarantees the delivery of layer does not guarantee delivery
packets. of packets. Still the TCP/IP
model is more reliable.
Follows vertical approach. Follows horizontal approach.
OSI model has a separate TCP/IP does not have a separate
Presentation layer and Session Presentation layer or Session
layer. layer.
OSI is a reference model around TCP/IP model is, in a way
Which the networks are built. implementation of the OSI
Generally, it is used as a model.
guidance
Tool.
Network layer of OSI model The Network layer in TCP/IP
provides both connection model
oriented Provides connectionless service.
And connectionless service.
OSI model has a problem of TCP/IP model does not fit any
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

fitting the protocols into model. protocol


b Design a network class ‘c’ with network address 192.156.5.0 with 2 6
subnet. State the subnet mask and subnet address.

Ans 192.156.5.0/2 Design: 2 M,


In Binary IP Address: Subnet
11000000 10011100 0000001 00000000 Mask: 2 M ,
We will use class C address which takes 1 bit from Host field for Subnet
subnetting and leaves 7 bits for defining hosts. Having 7 bits available Address: 2 M
for defining subnets means we have up to 2(21) different subnets.
8 bits 8 bits 8 bits
8 bits
N/W N/W N/W N/W

8 bits 8 bits 8 bits 1 bit


7 bits
N/W N/W N/W Subnet Host

Let’s use IP address 192.156.5.0 with subnet mask 255.255.255.128

Step 1: convert to binary


192 156 5 0
11000000 10011100 00000101 00000000
255 255 255 128
11111111 11111111 11111111 100000000

Subnet Mask is: 255.255.255.128


Step 2: Calculate subnet address
To calculate the subnets IP address you need to perform bit wise
AND operation (1+1=1, 1+0=0 or 0+1=0, 0+0=0) on the host IP
address and subnet mask:
IP address:

11000000 10011100 00000101 00000000


AND
11111111 11111111 11111111 10000000

11000000 10011100 00000101 00000000

Subnet Address is: 192.156.5.0


MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

c Draw Suitable network layout with star topology for a computer 6M


lab with 10 hosts and a wireless printer. List all components in the
layout.
Ans Any relevant
diagram: 6M

You might also like