You are on page 1of 27

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the
model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try
to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the
figure. The figures drawn by candidate and model answer may vary. The examiner may give
credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s answers and
model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant
answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi
and Bilingual (English + Marathi) medium is introduced at first year of AICTE diploma
Programme from academic year 2021-2022. Hence if the students in first year (first and
second semesters) write answers in Marathi or bilingual language (English +Marathi), the
Examiner shall consider the same and assess the answer based on matching of concepts
with model answer.

Q. Sub Answer Marking


No Q.N. Scheme
1. Attempt any FIVE of the following: 10
a) Enlist four advantages of LAN 2M
Ans. Advantages of LAN: 1/2M
1. Resource Sharing each,
2. Software applications sharing any four
3. Local area network can be used for easy & cheap communication. can be
4. Centralized data. consider
5. Data security ed
6. Internet sharing
7. Reliability
b) Explain the advantages of Repeater 2M
Ans. Advantages of Repeater: 1/2M
1. Repeater passes all traffic in bi-directions. each,
2. It is least expensive for expanding a network. any four
3. It can connect different transmission media. can be

Page 1 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

4. Repeater can reduce the effect of noise. consider


5. It can extend the network. ed
6. It can regenerate the desired information.

c) List any two functions of presentation layer 2M


Ans. Functions of presentation layer are: 1M
1. Translation each,
2. Encryption any two
3. Decryption function
4. Compression s

d) State any two differences between LAN and WAN 2M


Ans. LAN WAN
LAN stands for Local Area WAN stands for Wide Area 1M for
Network. Network. each
LAN is a group of devices WAN is an arrangement of point,
connected in a small geographic several devices attached over a any two
area, such as houses, offices, or network covering a broad area. points
buildings. can be
LAN covers a small WAN covers a large distance consider
geographical area, and it does geographical area that usually ed
not require any leased crosses regional or metropolitan
telecommunication lines. boundaries and requires leased
telecommunication lines.
LAN provides a comparatively WAN has a slower speed as
higher speed. compared to LAN.
LAN provides a high data WAN provides a relatively
transfer rate than WAN. It can slower data transfer rate. It can
reach up to 1000 Mbps. reach up to 150mbps.
LAN is owned, managed, and WAN can be either private or
used by an individual or an public. The Internet is the best
organization. Therefore, it is a example of public WAN.
private network.
The main components of LAN The main components of WAN
include Layer 1 devices (e.g., include Layer 3 devices (e.g.,
hubs, repeaters) and Layer 2 Routers, Multi-layer switches)
devices (e.g., switches, bridges). and technology-specific devices
(e.g., AM, Frame-relay
switches).

Page 2 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

LAN offers high bandwidth for WAN offers low bandwidth for
the transmission. the transmission.
It works on the principle of It operates on the principle of
broadcasting. point-to-point.
If there is a requirement to When it comes to WAN, the
connect more devices in a LAN, setup of additional devices will
it can be easily done. It will not cost high because networks in
cost much. remote areas must be
connected.
e) List four commands of SMTP. 2M
Ans. Commands of SMTP: ½M
1. HELO each,
2. EHLO any four
3. MAIL FROM correct
4. RCPT TO comman
5. SIZE ds
6. DATA
7. VRFY
8. TURN
9. AUTH
10. RSET
11. EXPN
12. HELP
13. QUIT

f) Define IP address. State IP address classes. 2M


Ans. An IP address is a unique address that identifies a device on the 1M for
internet or a local network. IP stands for Internet Protocol. definitio
IP address classes: n
1. class A 1M for
2. class B IP
3. class C address
4. class D class
5. class E

g) Draw the following topology with five host. 2M


i) Ring ii) Star

Page 3 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

Ans. i) Ring 1M for


each
diagram

ii) Star

2. Attempt any THREE of the following: 12


a) Describe the construction of fiber optic cable with a neat 4M
diagram.
Ans. 1. Fibre optic is a glass cabling media that sends network signals 2M for
using light. A medium consists of hair-width strand of silicon or correct
glass and the signal consists of pulses of light. explanat
2. Fibre optic cabling has higher bandwidth capacity than copper ion
cabling and is used mainly for high speed network asynchronous 2M for
transfer mode (ATM) or fibre distributed data interface (FDDI) diagram
backbones, long cable runs and connections high performance
workstations.
3. Light travels in a straight line as long as it is moving through a

Page 4 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

single uniform substance.


Construction of fibre optic cable:

Fig: Fibre Optic Cable


Optical fibre cable carries light signals instead of electric signal.
Following are the parts of fibre optic cable:
1. Core
This is the physical medium that transports optical data signals
from an attached light source to a receiving device. The core is a
single continuous strand of glass or plastic that is measured in
microns by the size of its outer diameter. The larger the core, the
more light the cable can carry.

2. Cladding
This is the thin layer that surrounds the fibre core and serves as a
boundary that contains the light waves and causes the refractions,
enabling data to travel throughout the length of fibre segment.

3. Coating
This is a layer of plastic that surrounds the core and cladding to
reinforce and protect the fibre core. Coatings are measured in
microns and can range from 250 to 900 microns.

4. Strengthening Fibres
These components help to protect the core against crushing forces
and excessive tension during installation.

5. Cable Jacket
This is the outer layer of any cable. Most fibre optic cables have
an orange jacket, although some types can have black or yellow
jackets.

Page 5 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

b) Explain ISO-OSI reference model with diagram 4M


Ans. 2M for
diagram
2M for
explanat
ion

OSI model has following 7 layers as Physical layer, Data link layer,
Network layer, Transport layer, Session layer, Presentation layer,
Application layer.
Following are the functions performed by the above layers.
1. Physical layer:
It deals with the mechanical and electrical specification of the
interface and transmission medium.
 Physical characteristics of interfaces and medium.
 Representation of bits or signals.
 Data rate
 Synchronization of bit
 Line configuration or connection type.
 Physical topology
 Transmission mode.
2. Data link layer
It performs node to node delivery of the data. It is responsible
for transmitting group of bits between the adjacent nodes. The
group of bits is called as frame.
 Framing
 Physical addressing
 Flow control
 Error control
 Media access control
 Node to node delivery

Page 6 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

3. Network layer:
It is responsible for routing the packets within the subnet i.e.
from source to destination. It is responsible for source to
destination delivery of individual packets across multiple
networks. It ensures that packet is delivered from point of
origin to destination.
 Logical addressing
 Routing
 Congestion control
 Accounting and billing
 Address transformation
 Source host to destination host error free delivery of
packet.

4. Transport layer:
Responsibility of process to process delivery of message
ensures that whole message arrives in order.
 Service point addressing
 Segmentation and reassembly
 Connection control
 Flow control is performed end to end
 Error control

5. Session layer: Establishes, maintains, and synchronizes the


interaction among communication systems It is responsible
for dialog control and synchronization.
 Dialog control
 Synchronization
 Token Management
 Activity Management
 Data Exchange

6. Presentation layer:
It is concerned with syntax, semantics of information
exchanged between the two systems.
 Translation: Presentation layer is responsible for
converting various formats into required format of the

Page 7 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

recipient.
 Encryption: Data encryption and decryption is done by
presentation layer for security.
 Compression and Decompression: data is compressed
while sending and decompress while receiving for
reducing time of transmission.

7. Application layer: It enables user to access the network. It


provides user interfaces and support for services like email,
remote file access.
Functions of Application layer:
 Network virtual terminal
 File transfer access and management
 Mail services and directory services.
c) Describe the working of following layers of OSI model. 4M
i) Data link layer
ii) Network layer

Ans. i. Data link layer: 2M for


Data link layer is responsible for converting data stream to signals bit each
by bit and to send that over the underlying hardware. At the receiving working
end, Data link layer picks up data from hardware which are in the
form of electrical signals assembles them in a recognizable frame
format, and hands over to upper layer.
Functions of data link layer:
 Framing: Data-link layer takes packets from Network Layer
and encapsulates them into Frames. Then, it sends each frame
bit-by-bit on the hardware. At receiver’ end, data link layer
picks up signals from hardware and assembles them into
frames.
 Addressing: Data-link layer provides layer-2 hardware
addressing mechanism. Hardware address is assumed to be
unique on the link. It is encoded into hardware at the time of
manufacturing.
 Synchronization: When data frames are sent on the link, both
machines must be synchronized in order to transfer to take
place.
 Error Control: Sometimes signals may have encountered
problem in transition and the bits are flipped. These errors are

Page 8 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

detected and attempted to recover actual data bits. It also


provides error reporting mechanism to the sender.
 Flow Control: Stations on same link may have different speed
or capacity. Data-link layer ensures flow control that enables
both machines to exchange data on same speed.
 Multi-Access: When host on the shared link tries to transfer
the data, it has a high probability of collision. Data-link layer
provides mechanism such as CSMA/CD to equip capability of
accessing a shared media among multiple Systems.

ii. Network layer:


The network layer (Layer 3) controls the source to destination
delivery of data packets across multiple hops (nodes). It controls the
operation of the subnet.
The main functions of the network layer are as follows:
 It is responsible for routing packets from the source host to the
destination host. The routes can be based upon static tables that are
rarely changed, or they can be automatically updated depending upon
network conditions.
 The data link layer assigns the physical address locally. When the
data packets are routed to remote locations, a logical addressing
scheme is required to differentiate between the source system and the
destination system. This is provided by the network layer.
 This layer also provides mechanisms for congestion control.
 The network layer tackles issues like transmission delays,
transmission time, avoidance of jitters, etc.

d) What is DNS server? Describe concept of DNS 4M


Ans. DNS: 4M for
1. The Domain Name System (DNS) is a client/server application correct
that identifies each host on the Internet with a unique user explanat
friendly name. ion
2. DNS organizes the name space in a hierarchical structure to Any
decentralize the responsibilities involved in naming. other
3. Each node in the tree has a domain name. diagram
4. A domain is defined as any subtree of the domain name space. showing
5. Domain Name system has top level domains such as .edu, .org, DNS
.com etc. concept
6. The name space information is distributed among DNS servers. can be

Page 9 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

7. A domain name server is simply a computer that contains the consider


database and the software of mapping between domain names and ed
IP addresses.

DNS Servers resolve names to IP addresses


Example:

Client wants IP for www.amazon.com; 1stapprox:


 Client queries a root server to find com DNS server
 Client queries com DNS server to get amazon.com DNS
server
 Client queries amazon.com DNS server to get IP address for
www.amazon.com
Functions of DNS:
1. Accept request from programs for converting domain
names into IP addresses.
2. Accept request from other DNS servers to convert domain
names into IP addresses.

3. Attempt any THREE of the following: 12


a) Describe the classification based on Network relationship 4M
Ans. Classification of networks based on Network Relationship: 1M each
 Client Server network for
 Peer to peer network classific
ation
Client Server Network: In this network, a centralized computer
1M for
called server, is used for sharing the resources and providing services
each
to other computers, clients. Thus, the name Client Server. The servers
diagram
store all the network's shared files and applications programs, such as
Page 10 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

word processor documents, compilers, database applications,


spreadsheets, and the network operating system. Client will send
request to access information from the server. Based on the request,
server will send the required information to the client. A client server
network is one in which all available network resources are centrally
managed and hosted and then accessed by client.
Following fig. shows client server network relation.

Peer to Peer Network: In this type of network, each computer/node


shares its resources using its own file system. Each computer on
network is responsible for setting up and maintaining its own security
for these resources In Peer-to-peer network, every computer can
function as both a client and server. There are no servers required in
this network. Thus, there is no centralized management, but each
system owns its resources and services to be shared with other
computers.
Following fig. shows the structure of the peer-to-peer network.

Page 11 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

b) Describe construction of co-axial cable with neat diagram 4M


Ans. Coaxial cables, commonly called coax, are copper cables with metal
shielding. Due to the shield provided, this cable has excellent noise
immunity. It has a large bandwidth and low losses. Following fig.
shows constructional diagram of Co-axial cable. 2M for
diagram
2M for
explanat
ion

OR

 Coaxial cable carries signals of higher frequency ranges than


those in twisted-pair cable.
 Instead of having two wires, coaxial cable has a central core
conductor of solid or stranded wire (usually copper) enclosed in
an insulating sheath.
 An insulating sheath is encased in an outer conductor of metal
foil, braid or a combination of the two.
 The outer metallic wrapping serves both as a shield against noise
and as the second conductor, which completes the circuit.
 This outer conductor is also enclosed in an insulating sheath, and
the whole cable is protected by a plastic cover.

Page 12 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

 It has better shielding than twisted pairs, so it can span longer


distances at higher speeds.
c) Compare between OSI and TCP/IP model (Any 4 points) 4M
Ans. 1M for
OSI (Open System TCP/IP (Transmission each
Interconnection) Control Protocol / Internet point
Protocol) any four
It has seven layers. It has four layers. points
It is postdated to TCP/IP (1983). It is predated to OSI (1970).
OSI is a generic, protocol TCP/IP model is based on
independent standard, acting as standard protocols around
a communication gateway which the Internet has
between the network and end developed. It is a
user. communication protocol, which
allows connection of hosts over
a network.
OSI model has a separate TCP/IP does not have a
Presentation layer and Session separate Presentation layer or
layer. Session layer
In OSI model the transport layer In TCP/IP model the transport
guarantees the delivery of layer does not guarantees
packets delivery of packets.
OSI is a reference model around TCP/IP model is, in an actual
which the networks are built. implementation of protocols
Generally, it is used as a which we use on day to day
guidance tool. basis.
Network layer of OSI model The Network layer in TCP/IP
provides both connection model provides connectionless
oriented and connectionless service

Page 13 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

d) Explain the concept of FTP with neat diagram. 4M


Ans. File Transfer Protocol (FTP) is the commonly used protocol for 2M for
exchanging files over the Internet. FTP uses the Internet's TCP/IP diagram
protocols to enable data transfer. 2M for
explanat
ion

The above figure shows the basic model of the FTP. The FTP client
has three components: the user interface, control process, and data
transfer process. The server has two components: the server control
process and the server data transfer process. The control connection is
made between the control processes. The data connection is made
between the data transfer processes.
FTP client is a program that implements a file transfer protocol which
allows you to transfer files between two hosts on the internet. It
allows a user to connect to a remote host and upload or download the
files. The FTP program is also available as a built-in component in a
Web browser. This GUI based FTP client makes the file transfer very
easy and also does not require to remember the FTP commands.

Advantages of FTP:
 Speed: One of the biggest advantages of FTP is speed. The FTP
is one of the fastest way to transfer the files from one computer to

Page 14 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

another computer.
 Efficient: It is more efficient as we do not need to complete all
the operations to get the entire file.
 Security: FTP is more secure as it required username and
password to access the FTP server.
 Back & forth movement: FTP allows us to transfer the files
back and forth. For example a manager of the company sends
some information to all the employees, and they all send
information back on the same server.

Disadvantages of FTP:
 It also doesn't allow to run simultaneous transfers to multiple
receivers.
 Passwords and file contents are sent in clear text that allows
unwanted eavesdropping. So, it is quite possible that attackers can
carry out the brute force attack by trying to guess the FTP
password.
 It is not compatible with every system.

4. Attempt any THREE of the following: 12


a) Distinguish between client-server & distributed networks 4M
Ans. Parameters Client Server Network Distributed Network 1M
each,
Basic There is a specific server All nodes are kept at any four
and specific clients different / distributed points
connected to the server location.
Service The client request for Each node is capable to
service and server accept input and
responds with the service produce result.
Focus Sharing the information Sharing Resources and
performing dedicated
task
Data The data is stored in a Data is stored at local
centralized server and over network as
well.
Server When several clients Each node can act as
request for the services dedicated server if
simultaneously, a server required.
can get bottlenecked.

Page 15 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

Expense The client server are This is very expensive


expensive to implement architecture as it
requires special
hardware.
Stability Client server is stable and Extremely stable and
easily scalable scalable.

b) Define routers. Explain with diagram. 4M


Ans. The router is a physical or virtual internetworking device that is 1M
designed to receive, analyze, and forward data packets between definitio
computer networks. n
1M for
diagram
2M for
explanat
ion

The job of router is to connect two completely separate LANs


together at the network layer. They consist of a combination of
hardware and software. The hardware can be a network server, a
separate computer or special device. The software in a router is the
operating system and the routing protocol. Management software can
also be used. Routers use logical and physical addressing to connect
two or more logically separate networks. Two make communication
between two networks, each network must connect to router and two
routers are connected to each other through a logical network
segment called subnets. Routers are more selective than bridges in the
traffic they pass between the networks. They are capable of
intelligently selecting the most efficient path to a specific destination.
When data arrive on an incoming line, the router must choose an
outgoing line on which to forward them. If two routers that do not
share a transmission line wish to communicate, they must do this
indirectly, via other routers. When a packet is sent from one router to
another via one or more intermediate routers, the packet is received at
each intermediate router in its entirety, stored there until the required
output line is free, and then forwarded.

Page 16 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

c) List and explain functions of session layer. 4M


Ans. Session layer: 1M for
 The services provided by the first three layers (physical, data link, listing
and network layers in a network model) are not sufficient for function
some processes. 1M for
 The session layer in a network model is the network dialog diagram
controller. It establishes, maintains, and synchronizes the 1M
interaction among communicating systems. Following Figure each for
illustrates the relationship of the session layer to the transport and function
presentation layers of a network model. explanat
ion

Specific responsibilities/functions of the session layer include the


following:
1.Dialog control
2. Synchronization
1. Dialog control:

The session layer in a network model allows two systems to enter into
a dialog. It allows the communication between two processes to take
place in either half-duplex (one way at a time) or full-duplex (two
ways at a time) mode.
2. Synchronization:

The session layer in a network model allows a process to add


checkpoints, or synchronization points, to a stream of data. For
example, if a system is sending a file of 2000 pages, it is advisable to
insert checkpoints after every 100 pages to ensure that each 100-page
unit is received and acknowledged independently. In this case, if a
crash happens during the transmission of page 523, the only pages

Page 17 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

that need to be resent after system recovery are pages 501 to 523.
Pages previous to 501 need not be resent.

d) What is subnetting in IP network ? Explain with suitable example. 4M


Ans. Subnetting: 2M for
During the era of classful addressing, subnetting was introduced. If an explanat
organization was granted a large block in class A or B, it could divide ion
the addresses into several contiguous groups and assign each group to 2M for
smaller networks (called subnets).Subnetting is the practice of dividing a example
network into two or more smaller networks. It increases routing
efficiency, enhances the security of the network and reduces the size of
the broadcast domain.
Advantages of Subnetting:
• It gives extra flexibility, more efficient use of network address.
• It is useful to control and to reduce the network traffic by limiting
number of broadcasts.
• It is allowed any organization to subnet its network without needed to
have a new network IP through an internet service provider (ISP).
• Subnetting was so helpful to solve the problem of lacking IP addresses
on the Internet.
• Allowing to use two or more LAN technologies together in the same
network.

Subnet Masking:
• Applying a subnet mask to an IP address allows you to identify the
network and node parts of the address.
• The network bits are represented by the 1s in the mask, and the node
bits are represented by the 0s.
• Performing a bitwise logical AND operation between the IP address
and the subnet mask results in the Network Address or number.

Default masks for classful addressing:

Page 18 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

Example:
A router receives a packet with the destination address
140.179.240.200. Show how the router finds the network address of
the packet.
Given IP address: 140.179.240.200
Class of given IP Address: B
10001100 10110011 11110000 11001000 Binary conversion of given IP
address
11111111 11111111 00000000 00000000 255.255.0.0 Default Class B
Subnet Mask
--------------------------------------------------------
10001100 10110011 00000000 00000000
140.179.000.000 Network Address
e) Describe working of NOS. State its salient features. 4M
Ans. Working of NOS : A network operating system (NOS) is a computer 2M for
operating system (OS) that is designed primarily to support descripti
workstations, personal computers and, in some instances, older on
terminals that are connected on a local area network (LAN). The 1M
software behind a NOS allows multiple devices within a network to each,
communicate and share resources with each other. The composition any two
of hardware that typically uses a NOS includes a number of personal featues
computers, a printer, a server and file server with a local network that
connects them together. The role of the NOS is to then provide basic
network services and features that support multiple input requests
simultaneously in a multiuser environment.
Types of network operating systems
There are two basic types of network operating systems, the peer-to
peer NOS and the client/server NOS:
Features of network operating systems
Features of network operating systems are typically associated with
user administration, system maintenance and resource management
functionality.
This includes:
 Basic support for operating systems like protocol and processor
support, hardware detection and multiprocessing.
 Printer and application sharing.
 Common file system and database sharing.
 Network security capabilities such as user authentication and
access control.
 Directory Services

Page 19 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

 Backup and web services.


 Internetworking of various resources connected in the network
 Providing access to remote printers, managing which users are
using which printers when, managing how print jobs are queued,
and recognizing when devices aren't available to the network.
 Enabling and managing access to files on remote systems, and
 determining who can access what—and who can't.
 Granting access to remote applications and resources, such as the
Internet, and making those resources seem like local resources to
the user (the network is ideally transparent to the user).
 Providing routing services, including support for major
networking protocols, so that the operating system knows what
data to send where.
 Monitoring the system and security, so as to provide proper
security against viruses, hackers, and data corruption.
 Providing basic network administration utilities (such as SNMP,
or Simple Network Management Protocol), enabling an
administrator to perform tasks involving managing network

5. Attempt any TWO of the following: 12


a) Describe working of DNS and SMTP protocol with suitable 6M
example. 3M for
Ans. DNS (Domain Name System) DNS 3M
1. For communication to take place successfully, the sender and for
receiver both should have addresses and they should be known to SMTP
each other.
2. The addressing in application program is different from that in
other layers.
3. Each program will have its own address format.
4. It is important to note that there is an alias name for the address
of remote host.
5. The application program uses an alias name instead of an IP
address.
6. This type of address is very convenient for humans to use but it
is not suitable for the IP protocol.
7. So, the alias address has to be mapped to IP address for this an
application program needs service of another entity.
8. This entity is DNS.
9. To map a name onto an IP address an application program calls a

Page 20 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

library procedure called resolver.


10. The name is passed on to resolver as a parameter.
11. The resolver sends a UDP packet to local DNS server which
looks up the name and returns the corresponding IP address to
the resolver.
12. The resolver then sends this address to the caller and then the
program can establish a TCP connection with the destination or
send the UDP packets.
SMTP(SIMPLE MAIL TRANSFER PROTOCOL)
1. The actual mail transfer is carried out through the message
transfer agent (MTA).
2. A system should have client MTA in order to send a mail and it
should have a server MTA in order to receive one.
3. SMTP is the protocol which defines MTA client and server in
the internet.

4. As shown in figure, SMTP is used twice, once between sender


and sender’s mail server and then between the two mail servers.
5. The job of SMTP is simply to define how commands and
responses be sent back and forth.
6. In internet the source machine establishes a connection to port 25
of destination machine so as to deliver an e-mail.
7. An e-mail daemon which speaks with SMTP is listening to this
port.
8. This daemon is supposed to perform the following tasks:
 Accept the incoming connections and copy messages from
them into appropriate mailboxes.
 Return an error message to sender, if a message is not
delivered.
9. It is a simple ASC II Protocol.

Page 21 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

10. Once a TCP connection between a sender and port 25 of the


receiver is established, the sending machine operates as a client
and receiving machine acts as a server.
11. The client then waits for the server to take initiative in
communication.
12. Server sends a line of text which declares its identity and
announces its willingness to receive mail.
13. If server is not prepared the client will release the connection
wait for sometime and try again later.
14. No checksums are generally required because TCP provides a
reliable byte stream.
15. After exchanging all the e-mail, the connection is released.

Problems in SMTP
1. Some older versions of SMTP are not capable of handling
messages longer than 64 kb.
2. If client and server have different time-outs then one of them
may give up when the other is still busy.
This will terminate the connection unnecessarily.
b) Draw and explain structure of IPV6 address. Highlight major 6M
enhancement w.e.f IPV4.
Ans. 1. IPV6 i.e., internet protocol version 6 is 128-bit address having an 2M for
address space of 2128 which is bigger than IPV4. diagram
2. In IPV6 we use Colon-Hexa representation. 2M for
3. Structure of IPV6 format is as shown below: explanat
ion
2M for
enhance
ment

Page 22 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

Version: Indicates version of internet protocol which contains bit


sequence 0110
Priority: It helps router to handle the traffic based on the priority of
the packet. If congestion occurs on the router the packets with the
least priority will be discarded.
Flow label: It is used by a source to label the packets belonging to the
same flow in order to request special handling by intermediate IPV6
router.
Payload Length: It is a 16-bit field, indicates the total size of the
payload which tells routers about the amount of information a
particular packet contains in its payload.
Next Header: It indicates the types of extension header (if present)
immediately following the IPV6 header.
Hop Limit: This field is same as TTL in IPV4 packet. It indicates the
maximum number of intermediate nodes IPV6 packet is allowed to
travel.
Source Address: It is the 128-bit IPV6 address of original source of
packet.
Destination Address: It indicates IPV6 address of final destination.
All the intermediate nodes can use this information in order to
correctly route the packet
Extension Address: In order to rectify the limitation of IPV4 option
field, extension headers are introduced in IP version 6.
The next header points to first extension header and this points to
second extension header and so on.

Major Enhancement
1. More efficient routing;
2. More efficient packet processing;
3. Security;
4. Support for new services;
5. Simplified network configuration; and
6. Larger address space.

c) Design suitable network layout of an organization with 4 6M


department (6 users each), shared print server and network
server.

Page 23 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

Ans. 2M for
printer
sharing,
2M for
network
sharing
and
2M for
proper
departm
ent and
users

6. Attempt any TWO of the following: 12


a) Describe the concept of data encapsulation. Explain in detail. 6M
Ans. 1. Data encapsulation is the process of adding additional information 6M for
when data is travelling in OSI or TCP/IP Model. proper
2. The additional information has been added on sender’s side explanat
starting from application layer to physical layer. ion
Working of Encapsulation
1. There will be no additional information added in the users’ data in
application layer in TCP/IP Model or application, presentation,
session layer of OSI Model.

Page 24 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

2. Then session layer sends data to Transport layer.


3. In the transport layer, the data is broken up into different pieces. It
adds the header in each of the broken data which contains
information like source port, destination port, sequence number,
etc.
4. Encapsulated data in transport layer is called segment or
datagram. If transmission uses TCP, then it is called segments or
UDP is called datagrams.

L4 Dat
Header a

5. Now data will travel down and reach to network layer. Here layer
3 header is added which contains information like source IP,
destination IP and so on. The encapsulated data in network layer
is called packets.

L3 L4 Dat
Header Header a

6. Now network layer sends packet to data link layer and new
header of layer 2 is added.
7. Also, a trailer is added. It contains information like source MAC
address, destination MAC address and so on.
8. The encapsulated data in data link layer is called frames.

L2 L3 L4 Data L2
Header Header Header Trailer

9. The physical layer takes frames from data link layer and send data
to receiving side.
10. This is how encapsulation takes place.
;
b) Design a network of Class C with network address 192.168.5.0 6M
with 2 subnets. State the subnet mask and subnet address.
Ans. 1. Given IP address (Class C) – 192.168.5.0 3M for
2. In order to design 2 equal subnets, we have to use: calculati
21 = 2 ng
Extra bits from the host id field. subnet

Page 25 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

3. So the subnet mask is as shown: mask,


and
The default subnet mask is 3M for
255.255.255.0 calculati
11111111.11111111. ng
11111111.10000000 subnet
I<-Host Id->I address

Thus, subnet mask = 255.255.255.128

Subnet address:
192. 168. 5. 0
IP address: 11000000.10101000.00000101.0000
0000
255 255 255 128

Subnet Mask: 11111111.11111111.11111111.100000


000

ANDING

Network Address 11000000.10101000.00000101.00000


000

Therefore, subnet address = 192.168.5.0


c) State devices and its specifications for setting a wireless network. 6M
Ans. Before setting up your wireless network we need: 6M for
1. Broadband internet connection and modem: proper
DSL and cable are two most common broadband connections – specifica
Internet service provider that provides DSL are telephone companies. tion, any
other
2. Wireless router: relevant
To send information between your network and internet. With specifica
wireless router, you can connect PCs to your network using radio tion
signals, instead of wires. should

Page 26 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Networks Subject Code: 22417

Specification – 802.11b, 802.11g, 802.11ac, 802.11ax, also be


802.11a consider
ed
3. Wireless network adaptor:
It is a device that connects your PC to wireless network. Most laptops
and some PC come with a wireless network adaptor already installed.

OR

1. Wireless access point:


It is a device that creates a wireless local area network. They
project a wi-fi signal to a specific area and therefore are
generally used in office and large buildings.

2. Wireless Routers and access points – Specification current


standard 802.11ax
3. Wireless Antennas
4. Wireless Repeaters
5. Mesh network

Page 27 / 27

You might also like