CNE Model Answer Paper
CNE Model Answer Paper
CNE Model Answer Paper
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 2 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Importance of Topology:
1. Better Understanding of the network
2. Effective use of resources Any one
3. Easier error detection Importa
4. Effective management of cost of network nce 1M
5. Easy to upgrade/change in the network
(e) Define protocol. State its significance. 2M
Ans. Protocols: Protocols are the rules and conventions used in the
exchange of information between two machines in various layers of a Definitio
network. n 1M
Significance of protocol:
Protocols control the sending and receiving of the information
Any one
with in a network.
Signific
The peer entities communicate using these protocols. Each
ance 1M
protocol belongs to one of the layers and is distributed among the
network entities that implement this protocol.
(f) List any four application layer protocols. 2M
(Note: Any other application layer protocol shall be considered).
Ans.
Page 3 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 4 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Advantages:
1. Avoids traffic problem
2. Robust topology since if one node fails, it does not affect the other
nodes. Any two
3. Point to point connection makes it easier to detect errors. advanta
4. More security and Privacy in connections. ges and
disadvan
Disadvantages: tages
1. More cables are required than other topologies. ½M
2. Cost of the network is high since more number of cables are used. each
3. Installation and re-configuration is difficult.
4. Setup and maintenance of the topology is difficult.
5. Through put and transmission quantity depends on media and
capacity of switching nodes.
(b) Draw OSI model. State function of each layer. 4M
Ans.
Diagram
2M
Page 5 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
OSI model has following 7 layers as Physical layer, Data link layer,
Network layer, Transport layer, Session layer, Presentation layer,
Application layer.
Following are the functions performed by the above layer
1. Physical layer: it deals with the mechanical and electrical
specification of the interface and transmission medium.
Physical characteristics of interfaces and medium.
Representation of bits or signals.
Data rate Functio
Synchronization of bit ns 2M
Line configuration or connection type.
Physical topology
Transmission mode.
Page 6 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Connection control
Flow control is performed end to end
Error control
Page 7 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 8 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 9 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 10 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 11 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
The Network layer, also called the Internet layer, deals with packets
and connects independent networks to transport the packets across
network boundaries. The network layer protocols are the IP and the
Internet Control Message Protocol (ICMP), which is used for error
reporting.
Page 12 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 13 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 14 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
i. The sender sends the ARP query packet on the network which is
broadcasted to all the other host or router present in the network.
ii. The ARP query packet contains the logical and physical address
of the sender and the logical address of the receiver.
iii. All the host and router receiving the ARP query packet process it
but, only the intended receiver identifies its logical address
present in the ARP query packet.
iv. The receiver then sends ARP response packet which contains the
logical (IP) address and physical address of the receiver.
v. The ARP response packet is unicast message sent directly to the
sender whose physical address is present in the ARP query
packet.
RARP
RARP (Reverse Address Resolution Protocol) is also a network layer
protocol. RARP is a TCP/IP protocol that allows any host to obtain
its IP address from the server. RARP is adapted from the ARP
protocol and it is just reverse of ARP.
Page 15 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 16 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 17 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagram
1M
Significance:
There are many reasons why hybrid topologies are used but they
all have one thing in common: flexibility.
There are few constraints on the structure that a hybrid topology Signific
cannot accommodate, and you can incorporate ring, bus, mesh, ance
and star topologies into one hybrid setup. 1M
Hybrid topologies are very scalable. Their scalability makes them
well-suited to larger networks.
(c) Define Interfaces, Services, Packets & Layer. 4M
Ans. Interfaces :
In OSI Reference Model, the mechanism for communication between
adjacent layers in the model is called an interface. Interface refers to
the process by which data is passed between layer N of the model and
layer N-1 or layer N+1.
Definitio
Services: A service is a set of actions that a layer offers to another n 1M
(higher) layer.A service is what the layer provides to the layer above each
it through an interface.
A service is a set of primitives (operations) that a layer provides to
the layer above it.
Packet :
A packet is a small amount of data sent over a network, such as a
LAN or the Internet. Similar to a real-life package, each packet
includes a source and destination as well as the content (or data)
Page 18 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
being transferred. When the packets reach their destination, they are
reassembled into a single file or other contiguous block of data.
A typical packet includes two sections — a header and payload.
Information about the packet is stored in the header.
Layer :
In layered architecture of Network Model, one whole network
process is divided into small tasks. Each small task is then assigned to
a particular layer which works dedicatedly to process the task only.
Every layer does only specific work.
In layered communication system, one layer of a host deals with the
task done by or to be done by its peer layer at the same level on the
remote host. The task is either initiated by layer at the lowest level or
at the top most level.
(d) Give class & subnet address for following IP address: 4M
(i) 191.168.0.1
(ii) 221.45.14.68
(iii) 245.32.14.24
(iv) 10.145.14.68
Ans. For
Sr. IP Address Class Subnet each
No. address address
1 191.168.0.1 Class B 191.168.0.0 ½M for
correct
2 221.45.14.68 Class C 221.45.14.0 Class
and
3 245.32.14.24 Class E Reserved
½M for
4 10.145.14.68 Class A 10.0.0.0 subnet
address
(e) Describe working of Nos. State its salient features. 4M
Ans. Working of NOS :
A network operating system (NOS) is a computer operating system
(OS) that is designed primarily to support workstations, personal Descript
computers and, in some instances, older terminals that are connected ion 2M
on a local area network (LAN). The software behind a NOS allows
multiple devices within a network to communicate and share
resources with each other.
The composition of hardware that typically uses a NOS includes a
number of personal computers, a printer, a server and file server with
a local network that connects them together. The role of the NOS is to
Page 19 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
then provide basic network services and features that support multiple
input requests simultaneously in a multiuser environment.
Page 20 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 21 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SMTP:
SMTP is simple mail transfer protocol.
It is connection-orientedtext-based protocol in which sender Example
communicates with receiver using a command and supplying data 1M
over reliable TCP connection.
SMTP is standard application layer protocol for delivery of email
over TCP/IP network.
SMTP establish a TCP connection between Sender And port
number 25 of receiver.
It is limited in its ability to queue messages at the receiving end, it
is usually used with one of two other protocols, POP3 or IMAP,
that let the user save messages in a server mailbox and download
them periodically from the server.
Page 22 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Diagram
2M
Version: This four-bit field specifies the version of the IP, i.e., 6 in
this case.
Priority: It defines the priority of the packet concerning traffic
congestion. Descript
Page 23 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Flow label: The reason for designing this protocol is to facilitate with ion 2M
special controlling for a certain flow of data.
Payload length: It defines the total length of the IP datagram
excepting the base header.
Next header: It‟s an eight-bit field describe the header that trails the
base header in the datagram. The next header is one of the optional
extension headers which IP uses or the header for an upper layer
protocol such as UDP or TCP.
Hop limit: This eight-bit hop limit field assist with the same
functions at the TTL field in IPv4.
Source address: It is a 16 bytes internet address identifies the source
of the datagram.
Destination address: This is 16-byte internet address that generally
describes the final destination of the datagram.
Page 24 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
provide it.
(c) Differentiate between peer-to-peer, client server and distributed 6M
modes of computing. (Any four points).
Ans.
BASIS PEER-TO- CLIENT- DISTRIBUTED
FOR PEER SERVER MODES
COMPA
RISON
Basic Clients and There is a All nodes are
server are not specific server kept at
distinguished; and specific different/distribut Any
each node act as clients ed location four
client and connected to points
server. the server. 1½M
Service Each node can The client Each node is each
request for request for capable to accept
services and can service and input and produce
also provide the server respond result.
services. with the
service.
Focus Connectivity. Sharing the Sharing
information. Resources and
performing
dedicated task
Data Each peer has The data is Data is stored at
its own data. stored in a local and over
centralized network as well.
server.
Server As the services When several Each node can
are provided by clients request act as dedicated
several servers for the services server if required.
distributed in simultaneously,
the peer-to-peer a server can get
system, a server bottlenecked.
in not
bottlenecked.
Expense Peer-to-peer The client- This is very
areless server are expensive
expensive to expensive to architecture as it
Page 25 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 26 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 27 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
.00001110
Subnet Mask 255. 255. 255.192
(Decimal)
Subnet Mask (Binary) 11111111 . 11111111. 11111111.
10000000 Division
of given
Since we need 4 subnetworks subnet mask of 25 will not work network
because with subnet mask of 25 one can divide network in two parts. 3M
So we borrow a bit from host bit.
Step 2:
IP Address 192.168.14.14
(Decimal)
IP Address 11000000 10101000. 00001110. 00001110
(Binary_ .
Subnet Mask 11111111 11111111 11111111 11000000
(Binary)
Subnet 11000000 10101000 00001110 00000000
Address
(Binary)
Subnet 192.168.14.0
Address
(Decimal)
Step 3:
We know already that for subnetting this Class C address we have
borrowed 2 bits from the Host field. These 2 bits are used to identify
the subnets. The remaining 6 bits are used for defining hosts within a
particular subnet.
Step 4:
Broadcast
Network Address Usable Host Range
Address:
192.168.14.1 -
192.168.14.0 192.168.14.63
192.168.14.62
192.168.14.65 -
192.168.14.64 192.168.14.127
192.168.14.126
192.168.14.128 192.168.14.129 - 192.168.14.191
Page 28 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
192.168.14.190
192.168.14.193 -
192.168.14.192 192.168.14.255
192.168.14.254
Since we want 50 in each subnetwork we can adjust it as follows.
Network
Usable Host Range Broadcast Address:
Address
192.168.14.1 -
192.168.14.0 192.168.14.63
192.168.14.50
192.168.14.65 -
192.168.14.64 192.168.14.127
192.168.14.114
192.168.14.129 -
192.168.14.128 192.168.14.191
192.168.14.178
192.168.14.193 -
192.168.14.192 192.168.14.255
192.168.14.242
(c) Design a network with 15 host divided into 3 equal size sub- 6M
networks each with different network topology. i.e. bus, star and
ring. Connect these sub-networks with suitable network device.
Specify IP address to each sub-network with its Broadcast and
Network address.
(Note: Any other Class of IP address with different set of subnets
shall be considered).
Ans. List of available IP Address, Broadcast and Network Address:
Name of Network Broadcast
Usable Host Range
Topology Address Address:
BUS 192.168.14.1 - List of
192.168.14.0 192.168.14.63
192.168.14.5 Broadcas
RING 192.168.14.65 - t and
192.168.14.64 192.168.14.127 Network
192.168.14.69
address
STAR 192.168.14.129 - for 3
192.168.14.128 192.168.14.191
192.168.14.133 networks
1M each
Page 29 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
192.168.14.65
to
192.168.14.1 192.168.14.69
to
192.168.14.5 Design of
Network
3M
Gateway/Router
192.168.14.129
to
192.168.14.133
Page 30 / 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER – 19 EXAMINATIONS
Subject Name: Computer Network Model Answer Subject Code: 22417
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given
in the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may
vary. The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the
assumed constant values may vary and there may be some difference in the
candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner
of relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program
based on equivalent concept.
Classes:
Class A
Class B
Class C
Class D
Class E
g Draw following topology with five Host: 2M
(i) Ring
(ii) Mesh Topology
Ans 1 M for Ring
Topology,
1 M for
Mesh
topology
Ring Topology
Mesh topology
OR
Ans Data link layer: Data link layer is responsible for converting data 2 M for DLL
stream to signals bit by bit and to send that over the underlying 2 M for
hardware. At the receiving end, Data link layer picks up data from Network
hardware which are in the form of electrical signals assembles them in layer
a recognizable frame format, and hands over to upper layer.
Function of data link layer:
d Describe the Host –to –network layer protocol Slip and PPP. 4M
Ans SLIP means Serial Line Internet Protocol. SLIP is the result of the 2 M for
integration of modem protocols prior to the suite of TCP/IP protocols. SLIP, 2 M
It is a simple Internet link protocol conducting neither address nor For PPP
error control, which is the reason that it is quickly becoming obsolete
in comparison to PPP. Data transmission with SLIP is very simple: this
protocol sends a frame composed only of data to be sent followed by
an end of transmission character (i.e. the END character, the ASCII
code 192). A SLIP frame looks like this:
The padding data is used to adapt the length of the frame for certain
protocols. A PPP session (from opening to closure) takes place as
follows. Upon connection, an LCP packet is sent. In the event of an
authentication request from the server, a packet relating to an
authentication protocol may be sent i.e. </bold>PAP (Password
Authentication Protocol), CHAP (Challenge Handshake
Authentication Protocol), or Kerberos. Once communication is
established, PPP sends configuration information using the NCP
protocol. Datagrams to be sent are transmitted as packets. Upon
disconnection, an LCP packet is sent to end the session.
Router:
Router is network layer device that routes packets based on
their logical address (host to host address).
Router normally connects LAN and WANS in the internet
using route information stored in routing table Routing table of
router is tabular database which stores information about
destination and path (next Hop address through with to reach)
information routing table is updated dynamically depending on
changes in network.
Messages are stored in the routers before re-transmission,
routers are said to implement a store-and-forward technique.
Star Topology
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans 1 M each
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)