Download as pdf or txt
Download as pdf or txt
You are on page 1of 50

Zeal Education Society’s

ZEAL POLYTECHNIC, PUNE.


NARHE │PUNE -41 │ INDIA

SECOND YEAR (SY)


DIPLOMA IN COMPUTER ENGINEERING
SCHEME: I SEMESTER: IV

NAME OF SUBJECT: DATA COMMUNICATION AND COMPUTER


NETWORK
SUBJECT CODE: 22414

MSBTE QUESTION PAPERS & MODEL ANSWERS


1. MSBTE SUMMER -19 EXAMINATION
2. MSBTE WINTER -19 EXAMINATION
22414
21819
3 Hours / 70 Marks Seat No.

Instructions – (1) All Questions are Compulsory.


(2) Answer each next main Question on a new page.
(3) Illustrate your answers with neat sketches wherever
necessary.
(4) Figures to the right indicate full marks.
(5) Mobile Phone, Pager and any other Electronic
Communication devices are not permissible in
Examination Hall.

Marks

1. Attempt any FIVE of the following: 10


a) Define Computer Network and state it’s types.
b) State various Computer Network applications.
c) List any four Unguided Transmission Media.
d) State types of Errors.
e) List IEEE 802 X standards for networks.
f) Compare Router and Repeater.
g) State functions of Network layer.

2. Attempt any THREE of the following: 12


a) Classify the network based on geographical area and
transmission technology.
b) Draw structural diagram of fiber optic cable and write its
functions.
c) Describe various IEEE standards for network topologies.
d) Draw and explain layered architecture of OSI model.

P.T.O.
22414 [2]
Marks
3. Attempt any THREE of the following: 12
a) What advantages does TDM have over FDM in a circuit
switched Network.
b) Compare Analog and Digital signals.
c) With suitable diagram describe:
(i) STAR topology
(ii) RING topology
d) Describe major functions of network layer in TCP/IP protocol
suite.

4. Attempt any THREE of the following: 12


a) Draw and describe architecture for network using tree topology
for an office in 3-storey’s building.
b) Describe functions of physical layer and data link layer of
OSI model.
c) Differentiate between FDM and TDM.
d) Describe types of IP address classes.
e) Design suitable network layout for an organization with five
department (ten users each)

5. Attempt any TWO of the following: 12


a) Describe the process of data communication in various modes.
b) Why is circuit switching preferred over packet switching in
voice communication?
c) Your company has the network id 165.130.0.0. You are
responsible for creating subnets on the network, and each
subnet must provide at least 1000 host ids.
What subnet mask meets the requirement for the minimum
number of host ids and provides the highest number of
subnets?
22414 [3]
Marks
6. Attempt any TWO of the following: 12
a) A system uses CRC on a block of 8 bytes. How many
redundant bits are sent per block? What is the ratio of useful
bits to the total bits?
b) Describe the process of DHCP server configuration.
c) What is the MAC protocol used in Token Ring LAN’s? What
happens if the token is lost?
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 19 EXAMINATION
Subject Name: Data Communication Network Model Answer Subject Code: 22414

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given
in the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may
vary. The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the
assumed constant values may vary and there may be some difference in the
candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner
of relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program
based on equivalent concept.

Q. Sub Answer Marking


No. Q. Scheme
N.
Q.1 Attempt any five of the following: 10 M

a Define Computer Network and state its types. 2M


Ans Definition: 1M
A computer network is a group of computer systems and other computing hardware definition
devices that are linked together through communication channels to facilitate , 1M for
communication and resource sharing among a wide range of users. types

Types of Computer Networks:

 Local Area Networks (LAN)


 Personal Area Networks (PAN)
 Home Area Networks (HAN)
 Wide Area Networks (WAN)
 Metropolitan Area Networks (MAN)
 The Internet

b State various Computer Network applications 2M


Ans Computer Network Applications: Any
1. File Sharing Four- 1/2

Page No: 1 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

2. Printer Sharing M each


3. Application Services
4. E-mail Services
5. Remote access
6. Internet & Intranet

C List any four Unguided Transmission Media. 2M


Ans Unguided Media or Wireless media: ½ M each

(a) Radio wave

(b) Microwave

(c) infrared

(d) Satellite

d State types of Errors


Ans Content Error 1 M each

Flow Integrity error

e List IEEE 802 X standards for networks 2M


Ans 1. 802.3: Ethernet 1/2 M
each
2. 802.4:Token Bus

3. 802.5:Token Ring

4. 802.11:Wi Fi(Wireless Fidelity)

f Compare Router and Repeater. 2M


Ans Router Repeater any 2
points 1
A router is a device like a Repeater regenerates the M each
switch that routes data packets signal over the same
based on their IP addresses. network before the signal
becomes too weak or
corrupted so as to extend the
length to which the signal
can be transmitted over the
same network.
Router is mainly a Network A repeater operates at the
Layer device. physical layer.

Page No: 2 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

g State functions of Network layer 2M


Ans Functions of network layer: 1/2M
each
1. logical addressing

2. Routing.

3. Congestion control

4. Accounting and billing

5. Address transformation

6. Source host to destination host error free delivery of packet.

Q2 Attempt any THREE of the following : 12 M


a Classify the network based on geographical area and transmission technology 4M
Ans Classification of networks based on geography: 2 M for
geographi
LAN - Local Area Network cal area
and 2 M
MAN - Metropolitan Area Network for
transmiss
WAN - Wide Area Network ion
technolog
CAN - Campus Area Network
y.
PAN - Personal Area Network Explanati
on
LAN: LAN is local area network. LAN is privately-owned networks covering a optional
small geographic area(less than 1 km), like a home, office, building or group of
buildings. LAN transmits data with a speed of several megabits per second.

MAN: A Metropolitan Area Network (MAN) is a large computer network that


spans a metropolitan area or campus. 2. A MAN typically covers an area up to 10
kms (city). The best example of MAN is the cable Television network, available in
many cities.

Page No: 3 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WAN: WAN is wide area network. WAN is a long-distance communication


network that covers a wide geographic area, such as state or country. The most
common example is internet.

The transmission technology can be categorized broadly into two types:

1. Broadcast networks

Broadcast networks have a single communication channel that is shared or used by


all the machines on the network. Short messages called packets sent by any
machine are received by all the others. Broadcast systems generally use a special
code in the address field for addressing a packet to all the concerned computers.
This mode of operation is called broadcasting.

2. Point-to-point networks
Point to point networks consists of many connections between individual pairs of
machines. To go from the source to the destination a packet on these types of
network may have to go through intermediate computers before they reach the
desired computer.

b Draw structural diagram of fiber optic cable and write its functions 4M
Ans 2 M for
diagram
and 2 M
for
functions

Fig. Structural diagram for Fibre Optic Cable

Functions of Optical Cable:

1. Single-mode fibers - Used to transmit one signal per fiber (used in telephones
and cable TV)

2. Multi-mode fibers - Used to transmit many signals per fiber (used in computer

Page No: 4 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

networks, local area networks)

c Describe various IEEE standards for network topologies. 4M


Ans A set of network standards developed by the IEEE. They include: 1 Mark
for 1
standard
 IEEE 802.1: Standards related to network management. each
 IEEE 802.2: General standard for the data link layer in the OSI Reference
Model. The IEEE divides this layer into two sublayers -- the logical link
control (LLC) layer and the media access control (MAC) layer. The MAC
layer varies for different network types and is defined by standards IEEE
802.3 through IEEE 802.5.
 IEEE 802.3: Defines the MAC layer for bus networks that use CSMA/CD.
This is the basis of the Ethernet standard.
 EEE 802.4: Defines the MAC layer for bus networks that use a token-
passing mechanism (token bus networks).
 IEEE 802.5: Defines the MAC layer for token-ring networks.
 IEEE 802.6: Standard for Metropolitan Area Networks (MANs).
 IEEE 802.11 Wireless Network Standards: 802.11 is the collection of
standards setup for wireless networking.

d Draw and explain layered architecture of OSI model. 4M


Ans OSI model (Open System Interconnection) model was developed by ISO 1M
(international standard organization) which provides way to understand how diagram
internetwork operates. It gives guidelines for creating network standard. and 3 M
explanati
OSI model has 7 layers as shown in the figure. Application Layer, Presentation on
Layer ,Session Layer ,Transport Layer ,Network Layer ,Data link Layer and
Physical Layer

Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical impulse,
light or radio signal — through the network at the electrical and mechanical level.
It provides the hardware means of sending and receiving data on a carrier,
including defining cables, cards and physical aspects.

Data Link (Layer 2) At OSI Model, Layer 2, data packets are encoded and
decoded into bits. It furnishes transmission protocol knowledge and management
and handles errors in the physical layer, flow control and frame synchronization.
The data link layer is divided into two sub layers: The Media Access Control
(MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer
controls how a computer on the network gains access to the data and permission to
transmit it. The LLC layer controls frame synchronization, flow control and error

Page No: 5 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

checking.

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data link Layer

Physical Layer

OSI Model

Network (Layer 3) Layer 3 provides switching and routing technologies, creating


logical paths, known as virtual circuits, for transmitting data from node to node.
Routing and forwarding are functions of this layer, as well as addressing,
internetworking, error handling, congestion control and packet sequencing.

Transport (Layer 4) Model, Layer 4, provides transparent transfer of data


between end systems, or hosts, and is responsible for end-to-end error recovery and
flow control. It ensures complete data transfer from source to destination.

Session (Layer 5) This layer establishes, manages and terminates connections


between applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at each end. It
deals with session and connection coordination.

Presentation (Layer 6) This layer provides independence from differences in data


representation (e.g., encryption) by translating from application to network format,
and vice versa. The presentation layer works to transform data into the form that
the application layer can accept. This layer formats and encrypts data to be sent
across a network, providing freedom from compatibility problems. It is sometimes
called the syntax & semantics.

Application (Layer 7) OSI Model, Layer 7, supports application and end-user


processes. Everything at this layer is application-specific. This layer provides

Page No: 6 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

application services for file.

Q3 Attempt any THREE of the following : 12 M


a What advantages does TDM have over FDM in a circuit switched network? 4M
Ans In TDM, each signal uses all of the bandwidth some of the time, while for FDM, consider
each signal uses a small portion of the bandwidth all of the time. 4 points
for 4 M
TDM uses the entire frequency range but dynamically allocates time, certain jobs
might require less or more time, which TDM can offer but FDM is unable to as it
cannot change the width of the allocated frequency.

TDM provides much better flexibility compared to FDM.

TDM offers efficient utilization of bandwidth

Low interference of signal and minimizes cross talk

b Compare Analog and Digital signal 4M


Ans Analog signal Digital signal 1 M for
An analog signal is a continuous A digital signal is a discrete wave that each
wave that changes over a time carries information in binary form. differenc
period. e
Consider
An analog signal is represented by a A digital signal is represented by square any 4
sine wave. waves. valid
Analog signal has no fixed range. Digital signal has a finite numbers i.e. 0 points
and 1.
An analog signal is described by the A digital signal is described by bit rate
amplitude, period or frequency, and and bit intervals.
phase.
An analog signal is more prone to A digital signal is less prone to distortion.
distortion.
An analog signal transmits data in A digital signal carries data in the binary
the form of a wave. form i.e. 0 and 1.

c With suitable diagram describe


Ans (i) STAR Topology (ii) RING Topology 2M star
topology-
Star topology is a network topology where each individual piece of a network is 1M for

Page No: 7 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

attached to a central node (often called a hub or switch). The attachment of these diagram
network pieces to the central component is visually represented in a form similar to and 1
a star. mark for
descriptio
The hub and hosts, and the transmission lines between them, form a graph with n ,2M
the topology of a star. Data on a star network passes through the hub before ring
topology-
continuing to its destination. The hub manages and controls all functions of the
1 M for
network. It also acts as a repeater for the data flow. diagram
and 1
Mark for
descriptio
n

Fig a: Star topology

The star network is one of the most common computer network topologies.

(ii)RING Topology

A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node - a
ring.

Data travels from node to node, with each node along the way handling every
packet.

Page No: 8 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Fig b: Ring Topology

Ring topology refers to a specific kind of network setup in which devices are
connected in a ring and pass information to or from each other according to their
adjacent proximity in the ring structure. This type of topology is highly efficient
and handles heavier loads better than bus topology.

d Describe the major functions of network layer in TCP/IP protocol suite


Ans Internetworking: This is the main duty of network layer. It provides the logical 1 M for
connection between different types of networks. each
function
Addressing: Addressing is necessary to identify each device on the internet
uniquely. This is similar to telephone system. The address used in the network
layer should uniquely and universally define the connection of a computer.
Routing: In a network, there are multiple roots available from a source to a
destination and one of them is to be chosen. The network layer decides the root to
be taken. This is called as routing.
Packetizing: The network layer encapsulates the packets received from upper layer
protocol and makes new packets. This is called as packetizing. It is done by a
network layer protocol called IP (Internetworking Protocol).

Q4 Attempt any Five of the following: 12 M


a Draw and describe architecture for network using tree topology for an office 4M
in 3-storeys building.
Ans A tree topology is a special type of structure in which many connected elements are Explain
arranged like the branches of a tree 1M
,Diagram
Here in the diagram the main switch is connected with three separate switches.
3M
For each floor separate switch is connected with multiple terminals.

Page No: 9 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

b Describe the functions of physical and data link layer of OSI model 4M
ans Functions of Physical Layer 2M for
Physical
 Physical layer is the actual carrier of information between computers layer
 Communication between computers happens due to physical layer Function
and 2 M
 Data is actually carried between every adjacent node for Data
(computers/routers) by transmission of electromagnetic/optical signals at link
the physical layer over wired/wireless media layer)(4

Page No: 10 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Physical layer therefore encompasses the set of all protocols/standards used functions
in different types of Wired/Wireless interfaces and the telecommunication each)
links connecting them
 It also includes the mechanical, electrical and timing specifications for
different network interfaces
Functions of Data Link Layer
 Data link layer receives the data from the network layer & divide it into
manageable units called frames.
 It then provides the addressing information by adding header to each
frame.
 Physical addresses of source & destination machines are added to each
frame.
 It provides flow control mechanism to ensure that sender is not sending the
data at the speed that the receiver cannot process.
 It also provide error control mechanism to detect & retransmit damaged,
duplicate, or lost frame, thus adding reliability to physical layer.
 Another function of data link layer is access control. When two or more
devices are attached to the same link, data link layer protocols determine
which device has control over the link at any given time.

c Differentiate between FDM and TDM 4M


ans Frequency Division Multiplexing Time division Multiplexing 1M for
each
FDM divides the channel into two TDM divides and allocates certain differenc
or more frequency ranges that do time periods to each channel in an e
not overlap alternating manner
Frequency is shared Times scale is shared
Used with Analog signals Used with both Digital signals and
analog signals
Interference is high Interference is Low or negligible
Utilization is Ineffective Efficiently used

d Describe types of IP address classes. 4M


ans Class A: Explain 4
Class A range for first byte is 0-127. Class A type of IP addresses have First byte M

Page No: 11 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

consisting of Network address with first bit as 0 and the next 3 bytes with host id.
Hence, number of hosts are more when compared to number of networks. The
default subnet masks for class A networks is 255.0.0.0. Class A networks have
their network addresses from 1.0.0.0 to 126.0.0.0, with the zero's being replaced by
node addresses.

Class B: Class B range for first byte is 128-191. This type has first two bytes
specifying network ID with starting two bits as 10 and last two bytes referring to
host ID. The default subnet masks for class B is 255.255.0.0. Network addresses
for these ranges from 128.0.0.0 to 191.0.0.0.

Class C: Class C range for first byte is 192-223. This class has first three bytes
referring to network with starting bits as 110 and last byte signifies Host ID. Here,
number of networks is more when compared to number of hosts in each network.
The default subnet masks for class C is 255.255.255.0 The network IP addresses
for these range from 192.0.0.0 to 223.0.0.0.
Class D: Class D range for first byte is 224-239 Class D is used for multicasting
and its starting bits are 1110

Class E: Class E range for first byte is 240-255 .Class E is reserved for future use
and its starting bits are 1111

Fig : IP address classes

e Design suitable network layout for an organization with five department 4M

Page No: 12 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

ans ten users


each)
(Correct
dia 4M)
Consider
any
suitable
diagram

Q5 Attempt any TWO of the following: 12 M


a Describe the process of data communication in various modes 6M
ans Transmission mode refers to the mechanism of transferring of data between two mode
devices connected over a network. It is also called Communication Mode. These explanati
modes direct the direction of flow of information. There are three types of on 1 M
each &
transmission modes.
diagram
They are: 1 M each

 Simplex Mode
 Half duplex Mode
 Full duplex Mode
a. In Simplex mode, the communication is unidirectional, as on a one-way street.
Only one of the two devices on a link can transmit; the other can only receive. The
simplex mode can use the entire capacity of the channel to send data in one
direction.
-Keyboards, traditional monitors and printers are examples of simplex
devices.

Page No: 13 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

a. In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of
the channel can be utilized for each direction
-for example :Walkie-talkies.

b. In full-duplex mode both stations can transmit and receive data


simultaneously. The transmission medium sharing can occur in two ways,
namely, either the link must contain two physically separate transmission
paths or the capacity of the channel is divided between signals traveling in
both directions.
-One common example of full-duplex communication is the telephone
network. When two people are communicating by a telephone line, both can
talk and listen at the same time.

b Why is circuit switching preferred over packet switching in voice 6M


communication?
ans Switching is a mechanism by which data/information sent from source towards Any six
destination which are not directly connected. Networks have interconnecting points 1
devices, which receives data from directly connected sources, stores data, analyse it M each
and then forwards to the next interconnecting device closest to the destination.
Switching can be categorized as:
 Circuit switching
 Packet switching

Page No: 14 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Message switching
Circuit switching is preferred over packet switching in voice communication
because:
 In circuit switching, a dedicated path is established between sender and
receiver which is maintained for entire duration of conversation.
 It provides continuous and guaranteed delivery of data.
 During the data transfer phase, no addressing is needed.
 Delays are small.
 It uses connection oriented service.
 Message received in order to the destination

c Your company has the network id 165.130.0.0. You are responsible for 6M
creating subnets on the network, and each subnet must provide at least 1000
host ids. What subnet mask meets the requirement for the minimum number
of host ids and provides the highest number of subnets?
ans The given network id 165.130.0.0 is class B (Range of class B is 128.0.0.0 to Explanati
191.255.255.255) with subnet mask of 255.255.252.0 creates 62 subnets with 1022 on 6 M
host each.

In binary format subnet mask reads:

11111111.11111111.11111100.00000000.

To calculate the number of host ids available for each subnet is based on the
number of digits remaining in the network address.

The number of possible host ids in each subnet ranges from 00000001 through
11111110.

So, in the network 165.130.0.0/22, host addresses can range from 165.130.0.1
through 165.130.254

Q6 Attempt any TWO of the following:


a A system uses CRC on a block of 8 bytes. How many redundant bits are sent 6M
per block? What is the ratio of useful bits to total bits?
ans CRC is one of the most common and powerful error detecting code which can be Descripti
describe as follows. The polynomial code also known as CRC with co-efficient of on 6 M
0s and 1s. In this method the sender and receiver must agree upon generator *The
polynomial g(x) in advance. Both the high and low order bits of the generator student
(divisor) must be 1. To compute the checksum for some frame (data) with m bits, may
the frame must be longer than generator polynomial. The idea is to append assume a
checksum to the end of frame in such a way that the polynomial represented by the polynomi
checksum frame is divisible by g(x). When the receiver gets the checksum frame it al or a

Page No: 15 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

tries dividing it by g(x). If there is remainder there has been a transmission error divisor
and zero remainder means no error in the transmission. r is degree of g(x) and do
polynomial. the
Step by step procedure: problem.
1. Append a string of r zero bits to the lower order end of data word(m) where r is Full
less than the number of bits pre-decided divisor by 1 bit i.e. if divisor = 5 bits then r
marks
= 4 zeros. Now data word contains m+r bits has to be
2. Divide the newly generated data unit in step 1 by the divisor. It is module – 2 given
division even if
3. The remainder obtained after division is the r bit CRC. they
4. This CRC will replace the r zeros appended to the data unit to get the code word explain
to be transmitted. the
method
NOTE: The polynomial code for calculation of redundant bits is not given .hence or do the
the data given is insufficient for calculating redundant bits and the ratio of useful problem
bits to total bits. with
assumpti
ons’.
b Describe the process of DHCP server configuration. 6M
ans DHCP (Dynamic Host Configuration Protocol) is a client-server protocol that uses Diagram
DHCP servers and DHCP clients. A DHCP server is a machine that runs a service 2M,
Explanati
that can lease out IP addresses and other TCP/IP information to any client that
on 4 M
requests them. The DHCP server typically has a pool of IP addresses that it is
allowed to distribute to clients, and these clients lease an IP address from the pool
for a specific period of time, usually several days. Once the lease is ready to expire,
the client contacts the server to arrange for renewal. DHCP clients are client
machines that run special DHCP client software enabling them to communicate
with DHCP server.

DHCP clients obtain a DHCP lease for an IP address, a subnet mask, and various
DHCP options from DHCP servers in a four-step process:

DHCP DISCOVER: The client broadcasts a request for a DHCP server.

DHCPOFFER: DHCP servers on the network offer an address to the client.

DHCPREQUEST: The client broadcasts a request to lease an address from one of

Page No: 16 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

the offering DHCP servers.

DHCPACK: The DHCP server that the client responds to acknowledges the client,
assigns it any configured DHCP options, and updates its DHCP database. The
client then initializes and binds its TCP/IP protocol stack and can begin network
communication.
c What is the MAC protocol used in TOKEN ring LAN’s? What happens if the 6M
token is lost?
ans Token ring local area network (LAN) network is a communication protocol for Descripti
local area networks.it uses special three-byte frame called a “token” that travels
on of
MAC
around a logical ring of workstations or servers. This token passing is a channel
protocol
access method providing fair access for all stations, and eliminating the collision
4 M,
of contention-based access methods. Explanati
on of
Introduced by IBM in 1984, it was then standardized with protocol IEEE 802.5
token lost
and was fairly successful, particularly in the corporate environments, but 2 M
gradually eclipsed by the later versions of Ethernet.

The IEEE 802.5 Token ring technology provides for data transfer rates of either 4
or 16 Mbps.

It works in the following manner:

1. Empty information frames are continuously circulated on the ring.

2. When a computer has a message to send, it inserts a token in an empty frame


(simply changing a 0 to a 1 in the token bit part of the frame) and a message
and a destination identifier in the frame.

3. The frame is the examined by each successive workstation. If workstation


sees that it is the destination of the message, it copies the message from the
frame and changes the token back to 0.

4. When the frame gets back to originator, it sees that message has been copied
and received.

The Fibre Distributed Data Interface (FDDI) also uses a Token ring protocol.

If one device does not receive a token within a specified period, it can issue an
alarm. The alarm alerts the network administrator to the problem and its location.
Then, network administrator generates a new , free token

OR

Page No: 17 / 1 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

· There are two error conditions that could cause the token ring to break down.

 One is the lost token in which case there is no token in the ring.
 Other is the busy token that circulates endlessly.

To overcome these problems, the IEEE 802 standard specifies that one of the
stations must be designated as “active monitor”. The monitor detects the lost
condition using a timer by time-out mechanism and recovers by using a new
free token

Page No: 18 / 1 8
22414
11920
3 Hours / 70 Marks Seat No.

Instructions – (1) All Questions are Compulsory.


(2) Illustrate your answers with neat sketches wherever
necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data, if necessary.
(5) Mobile Phone, Pager and any other Electronic
Communication devices are not permissible in
Examination Hall.

Marks

1. Attempt any FIVE of the following: 10


a) Define bit rate and baud rate.
b) List different characteristics of data communication system.
(Any two)
c) Define guided and unguided communication media.
d) Classify mobile generations.
e) Compare LRC and CRC (Any two points each.)
f) State different types of Network topologies.
g) List classes of IP addressing with their IP address range.

2. Attempt any THREE of the following: 12


a) Differentiate between synchronous and asynchronous
communication. (Any four points.)
b) Draw and explain fiber optic cable.
c) Explain wireless LAN 802.17 architecture.
d) State the functions of any two layers of OSI model.

P.T.O.
22414 [2]
Marks
3. Attempt any THREE of the following: 12
a) State the two advantages and two disadvantages of unguided
media.
b) Draw and explain block diagram of communication system.
c) Describe different connecting devices used in computer network.
d) Draw and explain OSI reference model.

4. Attempt any THREE of the following: 12


a) Describe multiplexing techniques.
b) Compare IPV4 and IPV6. (Any four points.)
c) Explain circuit switching network with neat sketch.
d) Draw and explain TCP/IP model.
e) Explain various IEEE communication standards.

5. Attempt any TWO of the following: 12


a) Explain simplex, half duplex and full duplex modes in data
communication.
b) Describe the principles of packet switching and circuit
switching techniques with neat diagram.
c) Explain configuration of TCP/IP protocol in network.

6. Attempt any TWO of the following: 12


a) Describe bluetooth architecture technologies.
b) Explain the process of DHCP server configuration.
c) Describe wireless infrastructure components in detail.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 19 EXAMINATION
Subject Name: Data Communication and Network

Model Answer

Subject Code: 22414


Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in
the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may vary.
The examiner may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s
answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based
on equivalent concept.

Q. Sub Answer Marking


No. Q. Scheme
N.
1. Attempt any Five of the following: 10M
a Define bit rate and baud rate. 2M
Ans Bit Rate: Bit rate is simply the number of bits (i.e., 0's and 1's) transmitted per 1M-Bit rate
unit time. 1M-Baud Rate
Baud Rate: Baud rate is the number of signal units transmitted per unit time that
is needed to represent those bits.
b List different characteristics of data communication system.(Any two) 2M
Ans 1. Delivery 1 M for 1
2. Accuracy characteristic
3. Timeliness
4. Jitter
c Define guided and unguided communication media. 2M
Ans Guided communication media: Guided transmission media are known as the 1M-Guided
wired communication. The electromagnetic signals travel between the media
communicating devices through a physical medium/conductor. 1M-Unguided
Unguided communication media: The unguided media is also called wireless media
communication. It does not require any physical medium to transmit
electromagnetic signals. In unguided media, the electromagnetic signals are
broadcasted through air to everyone.

1|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

d Classify mobile generations. 2M

Ans First Generation (1G) All


Second Generation (2G) generations to
Third Generation (3G) be mentioned-
Fourth Generation (4G) or LTE 2M
Fifth Generation (5G)
e Compare LRC and CRC(Any two points each) 2M
Ans 2 M for any
LRC CRC relevant 2
Longitudinal Redundancy Cyclic Redundancy Check points
Check (LRC)is a method in (CRC) is one of the most
which a block of bits is common and powerful error
organized in table(rows and detecting codes in which a
columns)calculate the parity sequence of redundant bits,
called the CRC is appended to
bit for each column and the the end of the unit so that the
set of this parity bit is also resulting data unit become
sending with original data. exactly divisible by a second,
From the block of parity we predetermined binary number.
can check the redundancy
LRC of n bits can easily CRC is more powerful than
detect
Burst error of n bits. VRC and LRC in detecting
errors.
A longitudinal redundancy CRC is based on binary
check (LRC) is an error- division.
detection method based on
binary addition
f State different types of Network topologies. 2M
Ans 1. Mesh Topology Mention of all
2. Star Topology Topologies-
3. Bus Topology 2M
4. Ring Topology
5. Hybrid Topology
g List classes of IP addressing with their IP address range. 2M
Ans An IP address is an address used to uniquely identify a device on an IP List1M,correct
network. range 1M
Classes and range:
Class A- 1.0.0.1 to 126.255.255.254
Class B - 128.1.0.1 to 191.255.255.254
Class C - 192.0.1.1 to 223.255.254.254
Class D- 224.0.0.0 to 239.255.255.255
Class E - 240.0.0.0 to 254.255.255.254

2|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

2. Attempt any Three of the following: 12M


a Differentiate between synchronous and asynchronous 4M
communication.(Any four points)
Ans
Synchronous communication Asynchronous communication 1M for 1
In Synchronous Transmission, data is In Asynchronous Transmission, point
sent in form of blocks or frames. data is sent in form of byte or
character.
Sender and Receiver use the same clock Does not need clock signal
signal between the sender and the
receiver

It is more efficient and more reliable In this transmission start bits and
than asynchronous transmission to stop bits are added with data.
transfer the large amount of data.

Synchronous transmission is fast. Asynchronous transmission is


slow.
In Synchronous transmission, time In asynchronous transmission,
interval of transmission is constant. time interval of transmission is
not constant, it is random.
b Draw and explain fiber optic cable. 4M
Ans 2 M Labelled
Diagram,2 M
explanation

Fiber optic cable:


 A fiber-optic cable is made up of glass or plastic.
 It transmits signals in the form of light.
 The outer jacket is made up of PVC or Teflon.
 Kevlar strands are placed inside the jacket to strengthen the cable.
 Below the Kevlar strands, there is another plastic coating which acts as a
cushion.
 The fiber is at the center of the cable, and it consists of cladding and glass core.
 The density of the cladding is less than that of the core.

3|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Optical fibers use the principle of ‘reflection’ to pass light through a channel.
c Explain wireless LAN 802.17 architecture. 4M
Ans Consider
Wireless LAN 802.11: IEEE 802.11
The IEEE 802.11 standard defines the physical layer and media access control instead of
(MAC) layer for a wireless local area network. Wireless LANs transmit and 802.17
receive data over the atmosphere, using radio frequency (RF) or infrared optical
technology, thereby; eliminating the need for fixed wired connections.
802.11 Architecture: BSS diagram
1M,
The 802.11architecture defines two types of services: Explanation -
1M-
1. Basic services set (BSS) ESS diagram
1M,
2. Extended Service Set (ESS) Explanation -
1M
1. Basic Services Set (BSS)

• The basic services set contain stationary or mobile wireless stations and a *Note:
central base station called access point (AP). If student
• The use of access point is optional. attempted to
• If the access point is not present, it is known as stand-alone network. Such a solve the
BSS cannot send data to other BSSs. This type of architecture is known as adhoc answer give
architecture. appropriate
• The BSS in which an access point is present is known as an infrastructure marks.
network.

2. Extend Service Set (ESS)


An extended service set is created by joining two or more basic service sets (BSS)
having access points (APs).

4|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

These extended networks are created by joining the access points of basic services
sets through a wired LAN known as distribution system.

There are two types of stations in ESS:

(i) Mobile stations: These are normal stations inside a BSS.

(ii) Stationary stations: These are AP stations that are part of a wired LAN.

d State the functions of any two layers of OSI Model 4M


Ans The functions of the physical layer are : Functions of
each layer-
1. Bit synchronization: The physical layer provides the synchronization of
2M
the bits by providing a clock. This clock controls both sender and receiver
thus providing synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e.
the number of bits sent per second.
3. Physical topologies: Physical layer specifies the way in which the
different, devices/nodes are arranged in a network i.e. bus, star or mesh
topology.
4. Transmission mode: Physical layer also defines the way in which the data
flows between the two connected devices. The various transmission modes
possible are: Simplex, half-duplex and full-duplex.

5|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Functions of data link layer:

 Framing: Data-link layer takes packets from Network Layer and


encapsulates them into Frames. Then, it sends each frame bit-by-bit on
the hardware. At receiver’ end, data link layer picks up signals from
hardware and assembles them into frames.
 Addressing: Data-link layer provides layer-2 hardware addressing
mechanism. Hardware address is assumed to be unique on the link. It is
encoded into hardware at the time of manufacturing.
 Synchronization: When data frames are sent on the link, both machines
must be synchronized in order to transfer to take place.
 Error Control: Sometimes signals may have encountered problem in
transition and the bits are flipped. These errors are detected and
attempted to recover actual data bits. It also provides error reporting
mechanism to the sender.
 Flow Control: Stations on same link may have different speed or
capacity. Data-link layer ensures flow control that enables both
machines to exchange data on same speed.
 Multi-Access: When host on the shared link tries to transfer the data, it
has a high probability of collision. Data-link layer provides mechanism
such as CSMA/CD to equip capability of accessing a shared media
among multiple Systems.
Functions of the Network layer are as follows:
 It is responsible for routing packets from the source host to the
destination host. The routes can be based upon static tables that are rarely
changed, or they can be automatically updated depending upon network
conditions.
 The data link layer assigns the physical address locally. When the data
packets are routed to remote locations, a logical addressing scheme is
required to differentiate between the source system and the destination
system. This is provided by the network layer.
 This layer also provides mechanisms for congestion control.
 The network layer tackles issues like transmission delays, transmission
time, avoidance of jitters, etc.
Functions of Transport Layer

 Service Point Addressing: Transport Layer header includes service


point address which is port address. This layer gets the message to the
correct process on the computer unlike Network Layer, which gets each
packet to the correct computer.
 Segmentation and Reassembling: A message is divided into segments;
each segment contains sequence number, which enables this layer in
reassembling the message. Message is reassembled correctly upon

6|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

arrival at the destination and replaces packets which were lost in


transmission.
 Connection Control: It includes 2 types:
 Connectionless Transport Layer: Each segment is considered as an
independent packet and delivered to the transport layer at the destination
machine.
 Connection Oriented Transport Layer: Before delivering packets,
connection is made with transport layer at the destination machine.
 Flow Control: In this layer, flow control is performed end to end.
 Error Control: Error Control is performed end to end in this layer to
ensure that the complete message arrives at the receiving transport layer
without any error. Error Correction is done through retransmission.

The functions of the Session layer are :


1. Session establishment, maintenance and termination: The layer allows
the two processes to establish, use and terminate a connection.
2. Synchronization: This layer allows a process to add checkpoints which
are considered as synchronization points into the data. These
synchronization point help to identify the error so that the data is re-
synchronized properly, and ends of the messages are not cut prematurely
and data loss is avoided.
3. Dialog Controller: The session layer allows two systems to start
communication with each other in half-duplex or full-duplex.
The functions of the presentation layer are :
1. Translation: For example, ASCII to EBCDIC.
2. Encryption/ Decryption: Data encryption translates the data into another
form or code. The encrypted data is known as the cipher text and the
decrypted data is known as plain text. A key value is used for encrypting
as well as decrypting data.
3. Compression: Reduces the number of bits that need to be transmitted on
the network.
The functions of the Application layer are :
1. Network Virtual Terminal
2. FTAM-File transfer access and management
3. Mail Services
4. Directory Services

3. Attempt any Three of the following: 12M


a State the two advantages and disadvantages of unguided media 4M
Ans Advantages: 2M
advantages
1 .Use for long distance communication.

7|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

2. High speed data transmission. 1 mark for


each
3. Many receiver stations can receive signals from same sender station advantage
2M
Disadvantages :1..Radio waves travel through Lowest portion of atmosphere
Disadvantages
which can have lot of noise and interfering signals
1mark for
2. Radio wave communication through unguided media is an insecure each
communication. disadvantage

3.Radio wave propagation is susceptible to weather effects like rain, thunder and
storm etc.
b Draw and explain block diagram of communication system. 4M
Ans 1 M diagram.
3M
explanation

Considering the communication between two computers , the communication


system is as shown in above diagram

It has following five components:

1. Message
2. Sender
3. Medium
4. Receiver
5. Protocol

Message:

 Message is the information or data which is to be sent from sender to the


receiver
 A message can be in the form of sound, text, picture, video or
combination of them(multimedia)

Sender: Sender is device such as host, camera, workstation, telephone etc.


which sends the message over medium

Medium: The message originated from sender needs a path over which it can
travel to the receiver. Such path is called as medium or channel

8|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Receiver: It is the device which receives the message and reproduces it. A
receiver can be host, camera, workstation, telephone etc.

Protocol: A protocol is defined as set of rules agreed by sender and receiver.


Protocol governs the exchange of data in true sense.
c Describe different connecting devices used in computer network. 4M
Ans Network Connecting devices are: Any 4 devices.
1 M each
1. Repeater
2. Hub

3. Switch
4. Bridge
5. Router
6. Gateway
7. Modem

Repeater:

It is used to take the distorted, weak and corrupt input signal and regenerate
this signal at its output.

It ensures that the signals are not distorted or weak before it reaches the
destination.

It recreates the bit pattern of the signal, and puts this regenerated signal back
on to the transmission medium

It works in the physical layer with no intelligent function.

Hub:

It is also known as multiport repeater.

It is normally used for connecting stations in a physical star topology.

It is the broadcasting device.

It sends packets to all nodes in the network.

Switch: It is used to connect multiple computers in which it can direct a


transmission toits specific destination. (Unicast the signals).

9|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

It is a unicasting device.

It avoids unnecessary network traffic.

It operates in both the physical and the data link layer.

Bridge:

It is a device which connects two or more segment of a network.

A bridge filters data traffic at a network boundary.

Bridges reduces the amount of traffic on a LAN by dividing it into two


segments.

It inspects incoming traffic and decides whether to forward or discard it.

It sends packets between two networks of same type.

A bridge operates in both the physical and the data link layer.

Gateway:

It is a node in a computer network, a key stopping point for data on its way to
or from other networks.

Gateway is protocol converter.

Gateway enables communication between different network architecture and


environments.

It works at all layers of OSI model.

Router:

It is a device that helps in determining the best and shortest path out of the
available paths, for a particular transmission.

Routers use logical and physical addressing to connect two or more logically
separate networks.

Router read complex network address in packet and efficiently directs packets
from one network to another, reducing excessive traffic.

It works at Physical, Data-Link and Network Layer of OSI model

It Connect dissimilar networks.

Modem:

10 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Modem works as modulator as well as demodulator.

It is the device used to converts digital signals generated by the computer into
analog signals which can be transmitted over a telephone or cable line
transforms incoming analog signals into their digital equivalents.

A two way communication is established.


d Draw and explain OSI reference model. 4M
Ans OSI model (Open System Interconnection) model was developed by ISO
(international standard organization) which provides way to understand how
internetwork operates. It gives guidelines for creating network standard.
OSI model has 7 layers as shown in the figure. 1 M diagram

Application Layer, Presentation Layer ,Session Layer, Transport Layer and 3 M


,Network Layer ,Data link Layer and Physical Layer
explanation
Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical
impulse, light or radio signal — through the network at the electrical and
mechanical level. It provides the hardware means of sending and receiving data
on a carrier, including defining cables, cards and physical aspects.
Data Link (Layer 2) At OSI Model, Layer 2, data packets are encoded and
decoded into bits. It furnishes transmission protocol knowledge and
management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media
Access Control (MAC) layer and the Logical Link Control (LLC) layer. The
MAC sub layer controls how a computer on the network gains access to the data
and permission to transmit it. The LLC layer controls frame synchronization,
flow control and error checking.

Network (Layer 3) Layer 3 provides switching and routing technologies,


creating logical paths, known as virtual circuits, for transmitting data from node
to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and packet
sequencing.
Transport (Layer 4) Layer 4, provides transparent transfer of data between end
systems, or hosts, and is responsible for end-to-end error recovery and flow
control. It ensures complete data transfer from source to destination.
Session (Layer 5) This layer establishes, manages and terminates connections
between applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at each end.
It deals with session and connection coordination

11 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Presentation (Layer 6) This layer provides independence from differences in


data representation (e.g., encryption) by translating from application to network
format, and vice versa. The presentation layer works to transform data into the
form that the application layer can accept. This layer formats and encrypts data
to be sent across a network, providing freedom from compatibility problems. It
is sometimes called the syntax & semantics.
Application (Layer 7) OSI Model, Layer 7, supports application and end-user
processes. Everything at this layer is application-specific. This layer provides
application services for file.

4. Attempt any Three of the following: 12M


a Describe Multiplexing techniques 4M
Ans Multiplexing is a technique by which different analog and digital streams of 2 M each
transmission can be simultaneously processed over a shared link. Multiplexing technique
divides the high capacity medium into low capacity logical medium which is explanation
then shared by different streams. Communication is possible over the air (radio
frequency), using a physical media (cable), and light (optical fiber). All
mediums are capable of multiplexing. When multiple senders try to send over a
single medium, a device called Multiplexer divides the physical channel and
allocates one to each. On the other end of communication, a De-multiplexer
receives data from a single medium, identifies each, and sends to different
receivers.

Different multiplexing techniques are

1.Frequency Division multiplexing

2.Time division multiplexing

Frequency Division Multiplexing: When the carrier is frequency, FDM is


used. FDM is an analog technology. FDM divides the spectrum or carrier

12 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

bandwidth in logical channels and allocates one user to each channel. Each user
can use the channel frequency independently and has exclusive access of it. All
channels are divided in such a way that they do not overlap with each other.
Channels are separated by guard bands. Guard band is a frequency which is not
used by either channel.

Time Division Multiplexing: TDM is applied primarily on digital signals but


can be applied on analog signals as well. In TDM the shared channel is divided
among its user by means of time slot. Each user can transmit data within the
provided time slot only. Digital signals are divided in frames, equivalent to time
slot i.e. frame of an optimal size which can be transmitted in given time slot.
TDM works in synchronized mode. Both ends, i.e. Multiplexer and De-
multiplexer are timely synchronized and both switch to next channel
simultaneously.

When channel A transmits its frame at one end, the De-multiplexer provides
media to channel A on the other end. As soon as the channel A’s time slot
expires, this side switches to channel B. On the other end, the De-multiplexer

13 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

works in a synchronized manner and provides media to channel B. Signals from


different channels travel the path in interleaved manner

b Compare IPV4 and IPV6 (any four point) 4M


Ans Any 4 correct
IPV4 IPv6 points1M each

Source and destination Source and destination


addresses are 32 bits (4 bytes) addresses are 128Bits (16
in length. bytes) in length.

No. addresses are limited to Larger addressing area


number of bits (32 bits)

Uses broadcast addresses to There are no IPv6 broadcast


send traffic to all nodes on a addresses. Instead, multicast
subnet. scoped addresses aroused

Fragmentation is supported at Fragmentation is not


Originating hosts and supported at routers. It is only
intermediate routers. supported at the originating
host

IP header includes a IP header does not include a


checksum checksum.

IP header includes options All optional data is moved to


IPv6extension headers

IPv4 has classful addressing Classless addressing scheme.


scheme, includes classes like
A,B,C,D and E.

Uses decimal dotted notation Uses hexadecimal notation

c Explain circuit switching networks with neat sketch. 4M


Ans Circuit switching is a connection-oriented network switching technique. Here, a 1 M for
dedicated route is established between the source and the destination and the diagram.
entire message is transferred through it. 3 M for
explaination
Phases of Circuit Switch Connection:

 Circuit Establishment: In this phase, a dedicated circuit is established


from the source to the destination through a number of intermediate
switching centers. The sender and receiver transmits communication
signals to request and acknowledge establishment of circuits.

14 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Data Transfer: Once the circuit has been established, data and voice are
transferred from the source to the destination. The dedicated connection
remains as long as the end parties communicate.
 Circuit Disconnection: When data transfer is complete, the connection
is relinquished. The disconnection is initiated by any one of the user.
Disconnection involves removal of all intermediate links from the sender
to the receiver.

The diagram represents circuit established between two telephones


connected by circuit switched connection. The blue boxes represent the
switching offices and their connection with other switching offices. The
black lines connecting the switching offices represent the permanent link
between the offices.
d Draw and explain TCP/IP model. 4M
Ans TCP/IP that is Transmission Control Protocol and Internet Protocol has 1 M for
following features diagram.
3 M for
●Support for a flexible architecture. Adding more machines to a network was explaination
easy.
●The network is robust, and connections remained intact until the source and
destination machines were functioning. The main idea was to allow one
application on one computer to talk to (send data packets) another application
running on different computer.

Different Layers of TCP/IP Reference Model Below:

15 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Fig: TCP/IP reference model

Layer 1: Host-to-network Layer

1. Lowest layer of the all.

2. Protocol is used to connect to the host, so that the packets can be sent over it.

3. Varies from host to host and network to network.

Layer 2: Internet layer

1. Selection of a packet switching network which is based on a connectionless


internetwork layer is called a internet layer.

2. It is the layer which holds the whole architecture together.

3. It helps the packet to travel independently to the destination.

4. Order in which packets are received is different from the way they are sent.

5. IP (Internet Protocol) is used in this layer.

6. The various functions performed by the Internet Layer are:

o Delivering IP packets
o Performing routing
o Avoiding congestion

Layer 3: Transport Layer

16 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

1. It decides if data transmission should be on parallel path or single path.

2. Functions such as multiplexing, segmenting or splitting on the data is done


by transport layer.

3. The applications can read and write to the transport layer.

4. Transport layer adds header information to the data.

5. Transport layer breaks the message (data) into small units so that they are
handled more efficiently by the network layer.

6.Transport layer also arrange the packets to be sent, in sequence

Layer 4: Application Layer

The TCP/IP specifications described a lot of applications that were at the top of
the protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
1. Telnets a two-way communication protocol which allows connecting to a
remote machine and run applications on it.

2. FTP (File Transfer Protocol) is protocol that allows File transfer amongst
computer users connected over a network. It is reliable, simple and efficient.
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to
transport electronic mail between a source and destination, directed via a route.
4. DNS (Domain Name Server) resolves an IP address into a textual address for
Hosts connected over a network.

5. It allows peer entities to carry conversation.6.It defines two end-to-end


protocols: TCP and UDP.
e Explain various IEEE communication standards. 4M
Ans A set of network standards developed by the IEEE. They include: 1 M for 1
standard each
 IEEE 802.1: Standards related to network management.
 IEEE 802.2: General standard for the data link layer in the OSI
Reference Model. The IEEE divides this layer into two sublayers -- the
logical link control (LLC) layer and the media access control (MAC)
layer. The MAC layer varies for different network types and is defined
by standards IEEE 802.3 through IEEE 802.5.
 IEEE 802.3: Defines the MAC layer for bus networks that use
CSMA/CD. This is the basis of the Ethernet standard.
IEEE 802.4: Defines the MAC layer for bus networks that use a token
passing mechanism (token bus networks).

17 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 IEEE 802.5: Defines the MAC layer for token-ring networks.


 IEEE 802.6: Standard for Metropolitan Area Networks (MANs).
 IEEE 802.11 Wireless Network Standards: 802.11 is the collection of
standards setup for wireless networking.

5. Attempt any Two of the following: 12M


a Explain simplex, half duplex and full duplex modes in data 6M
communication.
Ans Transmission mode refers to the mechanism of transferring of data between two for each mode
devices connected over a network. It is also called Communication Mode. These 1M for
modes direct the direction of flow of information. There are three types of diagram 1M
transmission modes. for
explanation
They are:

 Simplex Mode
 Half duplex Mode
 Full duplex Mode
1. In Simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit; the other can
only receive. The simplex mode can use the entire capacity of the
channel to send data in one direction.
Keyboards, traditional monitors and printers are examples of simplex devices.

2. In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of the
channel can be utilized for each direction
-for example: Walkie-talkies.

3. In full-duplex mode both stations can transmit and receive data


simultaneously. The transmission medium sharing can occur in two ways,

18 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

namely, either the link must contain two physically separate transmission
paths or the capacity of the channel is divided between signals traveling in
both directions .One common example of full-duplex communication is the
telephone network. When two people are communicating by a telephone
line, both can talk and listen at the same time.

b Describe the principles of packet switching and circuit switching 6M


techniques with neat diagram.
Ans Circuit Switching: When two nodes communicate with each other over a Circuit
dedicated communication path, it is called circuit switching. There 'is a need of switching-3M
pre-specified route from which data will travels and no other data is permitted. 1 M –diagram,
In circuit switching, to transfer the data, circuit must be established so that the 2M
data transfer can take place. explanation:
Packet
Circuits can be permanent or temporary. Applications which use circuit
switching-3 M
switching may have to go through three phases:
1M- diagram,
 Establish a circuit 2M
explanation
 Transfer the data
 Disconnect the circuit

19 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Circuit switching was designed for voice applications. Telephone is the best
suitable example of circuit switching. Before a user can make a call, a virtual
path between callers and called is established over the network.

Packet Switching: The entire message is broken down into smaller chunks
called packets. The switching information is added in the header of each packet
and transmitted independently.
It is easier for intermediate networking devices to store small size packets and
they do not take much resource either on carrier path or in the internal memory
of switches.

Packet switching enhances line efficiency as packets from multiple applications


can be multiplexed over the carrier. The internet uses packet switching
technique. Packet switching enables the user to differentiate data streams based
on priorities. Packets are stored and forwarded according to their priority to
provide quality of service.
c Explain configuration of TCP/IP protocol in network. 6M
Ans Before beginning configuration procedure, the following are the prerequisites. Step by step
 Network hardware is installed and cabled. . procedure -6M
 TCP/IP software is installed.
To configure your TCP/IP network, the following steps are followed:
 Read TCP/IP protocols for the basic organization of TCP/IP.

20 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

 Minimally configure each host machine on the network.


This means adding a network adapter, assigning an IP address, and assigning a
host name to each host, as well as defining a default route to your network. For
background information on these tasks, refer to TCP/IP network
interfaces, TCP/IP addressing, and Naming hosts on your network.

 Configure and start the intend daemon on each host machine on the
network. Read TCP/IP daemons and then follow the instructions
in Configuring the intend daemon.
 Configure each host machine to perform either local name resolution or to
use a name server. If a hierarchical Domain Name networks being set up,
configure at least one host to function as a name server.

 If the network needs to communicate with any remote networks, configure


at least one host to function as a gateway. The gateway can use static routes
or a routing daemon to perform inters network routing.

 Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in Client network
services if you wish to make a particular service unavailable.

 Decide which hosts on the network will be servers, and which services a
particular server will provide.Follow the instructions in Server network
services to start the server daemons you wish to run.

 Configure any remote print servers that are needed.


 Optional: If desired, configure a host to use or to serve as the master time
server for the network.

6. Attempt any Three of the following: 12M


a Describe Bluetooth architecture technologies. 6M
Ans Piconet 3M
Bluetooth Architecture
(1M diagram,
Bluetooth architecture defines two types of networks: 2M for
1. Piconet explanation);
Scatternet-
2. Scatternet
3M(1M
1. Piconet diagram, 2M
• Piconet is a Bluetooth network that consists of one primary (master) node and for
seven active secondary (slave) nodes. explanation
• Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or
stations within the distance of 10 meters.
• There can be only one primary or master station in each piconet.

21 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

• The communication between the primary and the secondary can be one-to-one
or one-to-many.

• All communication is between master and a slave. Salve-slave communication


is not possible.
• In addition to seven active slave station, a piconet can have upto 255 parked
nodes. These parked nodes are secondary or slave stations and cannot take part
in communication until it is moved from parked state to active state.
2. Scatternet
• Scattemet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station or node can receive messages from the master in the first piconet
and deliver the message to its slaves in other piconet where it is acting as master.
This node is also called bridge slave.
• Thus a station can be a member of two piconets.
• A station cannot be a master in two piconets.

b Explain the process of DHCP server configuration. 6M

22 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Ans Step by step


procedure- 6M
Configuring the DHCP Server

To configure the DHCP server:

1. From the Control Panel, go to Administrative Tools >> Computer


Management >> Services and Application >> DHCP.

2. From the Action menu, select New Scope.

The New Scope wizard is displayed.

3. Enter the following information as prompted:

 Scope name and description:


 IP address range (for example, 192.168.0.170 to 192.168.0.171)
 Subnet mask (for example, 255.255.255.0)
 Add exclusions (do not exclude any IP addresses)
 Lease duration (accept the default of 8 days)
 Router (default gateway) of your subnet (for
example, 192.168.0.1)
 Domain name, WINS server (these are not needed)
 Activate Scope? (select “Yes, I want to activate this scope now”)

4. Click Finish to exit the wizard.

The contents of the DHCP server are listed.

5. Right-click Scope [iPad dress] scope-name and select Properties.

6. In the Scope Properties box, click the Advanced tab.

7. Select BOOTP only, set the lease duration to Unlimited, and click OK.

8. Right-click Reservations.

The Controller A Properties box is displayed.

9. Enter the IP address and the MAC address for Controller A. Click
Add.

The Controller B Properties box is displayed.

23 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

10. Enter the IP address and the MAC address for Controller B. Click
Add.

The controllers are added to the right of the Reservations listing.

11. Right-click Scope [iPad dress] scope-name to disable the scope.

12. Click Yes to confirm disabling of the scope.

13. Right-click Scope and select Activate.


c Describe wireless infrastructure components in detail. 6M

Ans 4 components-
Wireless Network Infrastructures
11/2M each
The infrastructure of a wireless network interconnects wireless users and end
systems. The infrastructure might consist of base stations, access controllers,
application connectivity software, and a distribution system. These components
enhance wireless communications and fulfill important functions necessary for
specific applications.
1. Base Stations
The base station is a common infrastructure component that interfaces the
wireless communications signals traveling through the air medium to a wired
network? Often referred to as a distribution system. Therefore, a base station
enables users to access a wide range of network services, such as web browsing,
e-mail access, and database applications. A base station often contains a wireless
NIC that implements the same technology in operation by the user's wireless
NIC.
Residential gateways and routers are more advanced forms of base stations that
enable additional network functions.
As show in Figure a base station might support point-to-point or point-to-
multipoint communications.

24 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Base Stations Support Different Configurations

Access Controllers
In the absence of adequate security, quality of service (QoS), and roaming
mechanisms in wireless network standards, companies offer access-control
solutions to strengthen wireless systems. The key component to these solutions
is an access controller, which is typically hardware that resides on the wired
portion of the network between the access points and the protected side of the
network. Access controllers provide centralized intelligence behind the access
points to regulate traffic between the open wireless network and important
resources. In some cases, the access point contains the access control function.
Application Connectivity Software
Web surfing and e-mail generally perform well over wireless networks. All it
takes is a browser and e-mail software on the client device. Users might lose a
wireless connection from time to time, but the protocols in use for these
relatively simple applications are resilient under most conditions.
Special application connectivity software is necessary as an interface between
a user's computer device and the end system hosting the application's software
or database.

25 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

Distribution System
A wireless network is seldom entirely free of wires. The distribution system,
which often includes wiring, is generally necessary to tie together the access
points, access controllers, and servers. In most cases, the common Ethernet
comprises the distribution system.

26 | 2 6

You might also like