22417 - Summer 2023

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 28

MAHARASHTRA STATE BOARD OF TECHNICAL

EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


Subject: Computer Networks Subject Code: 22417
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in the
model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may
try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in
the figure. The figures drawn by candidate and model answer may vary. The examiner
may give credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s answers
and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi
and Bilingual (English + Marathi) medium is introduced at first year of AICTE diploma
Programme from academic year 2021-2022. Hence if the students in first year (first and
second semesters) write answers in Marathi or bilingual language (English +Marathi), the
Examiner shall consider the same and assess the answer based on matching of concepts
with model answer.

Q. Sub Answer Marking


No Q.N. Scheme
1. Attempt any FIVE of the following 10M
a) List benefits of computer network 2M
Ans. Benefits of computer network are: Any four
1. File sharing benefits
1/2M each
2. Resource sharing
3. Application services
4. E-mail services
5. Remote access
6. Inexpensive set-up
7. Flexible Handling
8. Backing up data

Page 1 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

b) State the use of NIC Card 2M


Ans. Network Interface Card (NIC) is a hardware component that is Descriptio
present on the computer. It is used to connect different networking n of use of
NIC card
devices such as computers and servers to share data over the 2M
connected network. It provides functionality such as support for I/O
interrupt, Direct Memory Access (DMA) interfaces, partitioning, and
data transmission. NIC is important for us to establish a wired or
wireless
connection over the network.
c) List four upper most layers of OSI model 2M
Ans. Four upper most layers of OSI model are: Listing of
correct
1. Application
upper most
2. Presentation layers 2M
3. Session
4. Transport

d) Describe the classification of Network based on transmission 2M


technology Correct
Ans. classificati
Classification of network based on transmission technology: on 2M
1. Broadcast network
2. Point to point network.
e) List any four Internet Layers protocols 2M
Ans. Internet layer protocols are: Listing of
1. FTP (File Transfer Protocol) any four
correct
2. NDP (Neighbour Discovery Protocol) Internet
3. SMTP (Simple Mail Transfer Protocol) layers 2M
4. HTTP (Hyper Text Transfer Protocol)
5. IP(Internet Protocol)
6. ICMP (Internet Control Message Protocol)
7. ARP (Address Resolution Protocol)
8. RARP (Reverse Address Resolution Protocol)
9. ECN (Explicit Congestion Notification)
10. IGMP (Internet Group Management Protocol)
11. IPsec (Internet Protocol Security)
f) Define the following terms: 2M
i) Logical address
ii) Port address
Page 2 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

Ans. i) Logical Address Any


Logical address is network layer generated 32-bit address (for IPv4) suitable
Definition
interpreted by protocol handler. Logical addresses are used by of each 1M
networking software to allow packets to travel through WAN
(Internet). It makes packets to travel independently.
ii) Port address
In Computer networking, a port address is a number that designates a
particular process or service that is active on a computer system. It is
a logical construct that is used to direct data to the appropriate
process or service on the receiving end of a network connection

g) Draw following topology with four hosts: 2M


i) Ring topology
ii) Mesh topology Correct
Ans. i) Ring topology diagram of
each 1M

ii) Mesh Topology

Note: Any other relevant diagram with four host shall be


considered

Page 3 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

2. Attempt any THREE of the following 12M


a) Enlist different types of Bridges. Describe any two. 4M
Ans. Types of Bridges: Enlisting
1. Transparent bridge types 2M
2. Source routing bridge
3. Translational bridge

1. Transparent Bridge:
Transparent bridge is invisible to other devices on the network. This
bridge doesn’t reconfigure the network on the addition or deletion of
description
any station. The prime function of the transparent bridge is to block or of any two
forward the data according to the MAC address. 2M
2. Source Routing Bridge:
Source routing bridge is developed and designed by IBM specifically
for token ring networks. The frame’s entire route is embedded with the
data frames by the source station to perform the routing operation so
that once the frame is forwarded it must follow a specific defined
path/route.
3. Translational Bridge:
Translational bridge converts the received data from one networking
system to another. It is used to communicate or transmit data between
two different types of networking systems. If we are sending data from
a token ring to an Ethernet cable, the translational cable is used to
connect both the networking system and transmits data.
b) Draw TCP/IP model. State the function of each layer. 4M
Ans. TCP/IP model:
Diagram
2M

TCP/IP Reference Model is a four-layered suite of communication


protocols.

Page 4 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

The four layers in the TCP/IP protocol suite are:


1. Host-to- Network Layer
It is the lowest layer that is concerned with the physical transmission Proper
of data. TCP/IP does not specifically define any protocol here but Function
supports all the standard protocols. of each 2M
2. Internet Layer
It defines the protocols for logical transmission of data over the
network. The main protocol in this layer is Internet Protocol (IP) and
it is supported by the protocols ICMP, IGMP, RARP, and ARP.
3. Transport Layer
It is responsible for error-free end-to-end delivery of data. The
protocols defined here are Transmission Control Protocol (TCP) and
User Datagram Protocol (UDP).
4. Application Layer
This is the topmost layer and defines the interface of host programs
with the transport layer services. This layer includes all high-level
protocols like Telnet, HTTP, FTP, SMTP, etc.
c) Describe design issues for layer to layer approach in Computer 4M
network (any four)
Ans. Design issues for layering in computer network:
Any four
Reliability: design
Network channels and components may be unreliable, resulting in loss issues 1M
each
of bits while data transfer. So, an important design issue is to make
sure that the information transferred is not distorted.
Scalability:
Networks are continuously evolving. The sizes are continually
increasing leading to congestion. Also, when new technologies are
applied to the added components, it may lead to incompatibility issues.
Hence, the design should be done so that the networks are scalable and
can accommodate such additions and alterations.
Addressing:
At a particular time, innumerable messages are being transferred
between large numbers of computers. So, a naming or addressing

Page 5 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

system should exist so that each layer can identify the sender and
receivers of each message.
Error Control:
Unreliable channels introduce a few errors in the data streams that are
communicated. So, the layers need to agree upon common error
detection and error correction methods to protect data packets while
they are transferred.
Flow Control:
If the rate at which data is produced by the sender is higher than the
rate at which data is received by the receiver, there are chances of
overflowing the receiver. So, a proper flow control mechanism needs
to be implemented.
Resource Allocation:
Computer networks provide services in the form of network resources
to the end users. The main design issue is to allocate and deallocate
resources to processes. The allocation/deallocation should occur so
that minimal interference among the hosts occurs and there is optimal
usage of the resources.
Statistical Multiplexing:
It is not feasible to allocate a dedicated path for each message while it
is being transferred from the source to the destination. So, the data
channel needs to be multiplexed, to allocate a fraction of the
bandwidth or time to each host.
Routing:
There may be multiple paths from the source to the destination.
Routing involves choosing an optimal path among all possible paths,
in terms of cost and time. There are several routing algorithms that
are used in network systems.
Security:
A major factor of data communication is to defend it against threats
like eavesdropping and surreptitious alteration of messages. So, there
should be adequate mechanisms to prevent unauthorized access to
data
through authentication and cryptography.

Page 6 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

d) Describe the working of ARP and RARP protocol with suitable 4M


diagram.
Ans. Working of ARP:
1. ARP is an address resolution protocol.
2. ARP is a network-layer protocol.
3. ARP maps IP address to its corresponding MAC address.
4. The sender knows the IP address of the target and it wants to
know the hardware address of the target. Working of
5. So, the sender creates an ARP request message in which it fills ARP with
the following fields: diagram
o Sender Hardware Address 2M,
o Sender IP address
o Target IP Address
6. ‘Target Hardware Address’ field is filled with 0’s since it does
not know that. This ARP request message is broadcast to all hosts
on the network.
7. All hosts on the network receive and process the ARP packet.
Only the host whose IP address matches with the value in the
‘Target IP address’ field sends an ARP reply.
8. The ARP reply message sent by the target machine contains its
hardware address. This ARP reply is unicast.
9. The sender receives this reply message and now it knows the
hardware address of the target machine.

Fig: ARP

Page 7 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

Working of RARP:
RARP is reverese address resolution protocol.
RARP (Reverse Address Resolution Protocol) is also a network
layerprotocol. RARP is a TCP/IP protocol that allows any host to
obtainits IP address from the server. RARP is adapted from the Working of
ARPprotocol and it is just reverse of ARP. RARP with
RARP performs following steps to obtain an IP address from diagram 2M
theserver.
1. The sender broadcast the RARP request to all the other hostpresent
in the network.
2. The RARP request packet contains the physical address of
thesender.
3. All the host receiving the RARP request packet process it but,the
authorized host only which can serve RARP service,responds to
the RARP request packet such host are known asRARP Server.
4. The authorized RARP server replies directly to requesting
hostwith the RARP responsepacket which contains IP address
forthe sender.

Fig: RARP

Page 8 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

3. Attempt any THREE of the following 12M


a) Describe the classification of network based on geographical 4M
area.
Ans. Computer network can be classified based on several factors. The most Explanatio
common classification on based the physical size of the network. n of any
four 1M
each

PAN (Personal Area Network):


 Personal Area Networks are used for communication among
various devices, such as telephones, personal digital assistants,
fax machines, and printers that are located close to a single user.
 Personal area networks generally cover a range of less than 10
meters (about 20-30 feet).
 Personal area networks may be wired with computer buses such
as USB and FireWire. A wireless personal area network (WPAN)
can also be made possible with network technologies such as
IrDA and Bluetooth or sometimes infrared connections. Bluetooth
PANs are also sometimes called piconets.
 You can use these networks to transfer files including email and
calendar appointments, digital photos and music.

CAN (Campus Area Network):


 A campus area network (CAN) is a network of multiple
interconnected local area networks (LAN) in a limited
geographical area such as a college campus, industrial complex,
office building, or a military base.

Page 9 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

 A network that connects two or more LANs but that is limited to


a specific and contiguous geographical area A CAN is also known
as a corporate area network (CAN).
 The networking equipment’s (switches, routers) and transmission
media (optical fiber, copper plant, Cat5 cabling etc.) are almost
entirely owned by the campus tenant / owner: an enterprise,
university, government etc.

LAN (Local Area Network):


 LAN is a computer network that is designed for a limited
geographical area such as a single office, building or campus.
 The data rates for LAN range from 4 to 6 Mbps with the
maximum of 100 to 1000 Mbps.
 LAN is a computer network that is designed for a limited
geographical area such as a single office, building or campus.
 LANs are designed to share resources between personal
computers or workstation.
 These resources include hardware, software or data.
 In LAN, one of the computers may be given a large capacity disk
drive and may become a server.
 Software can be stored on this server and used as needed by the
whole group.

MAN (Metropolitan Area Network):


 It is a network with a size between a LAN and a WAN.
 It normally covers the area inside the town or a city.
 It is designed for customers who have endpoints spread over a
city or part of city.
 The best-known example of a MAN is the cable television
network available in many cities.
 A Metropolitan Area Network (MAN) is a large computer
network that spans a metropolitan area or campus.
 A MAN typically covers an area up to 10 kms (city).

Page 10 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

 A MAN may be wholly owned and operated by a private


company or it may be a service provided by a public company,
such as a local telephone company (telco).

WAN (Wide Area Network):


 WAN provides long distance transmission of data, image, audio
and video information over large geographic areas that may
comprise a country, a continent or the even whole world.
 In most WANs, the network contains numerous transmission
lines, each one connecting a pair of routers.
 A second possibility for a WAN is a satellite system. The most
common example is internet.
 WAN provides long distance transmission of data, image, audio
and video information over large geographic areas that may
comprise a country, a continent or the even whole world.

b) Describe NIC and Access point. State any two differences. 4M


Ans. Network Interface Card: A network interface card (NIC) is a
Descriptio
hardware component without which a computer cannot be connected
n of NIC
over a network. It is a circuit board installed in a computer that and AP 1M
provides each,
a dedicated network connection to the computer. It is also called
network interface controller, network adapter or LAN adapter.
Any Two
Access Point: An access point is a device that creates a wireless local differences
area network, or WLAN, usually in an office or large building. An 1M each
access point connects to a wired router, switch, or hub via an Ethernet
cable, and projects a Wi-Fi signal to a designated area. For example,
if you want to enable Wi-Fi access in your company's reception area
but don’t have a router within range, you can install an access point
near the front desk and run an Ethernet cable through the ceiling back
to the server room.

Page 11 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

c) Describe the functions of data link layer and network layer in 4M


OSI model.
Ans. i. Data link layer:
Data link layer is responsible for converting data stream to signals bit Any two
by bit and to send that over the underlying hardware. At the receiving data link
end, Data link layer picks up data from hardware which are in the layer
functions
form of electrical signals assembles them in a recognizable frame 2M each,
format, and hands over to upper layer.
Functions of data link layer: Any two
1. Framing. Network
The data link layer in a network model divides the stream of bits layer
functions
received from the network layer into manageable data units called 2M each
frames.
2. Physical addressing.
If frames are to be distributed to different systems on the network
model, the data link layer in network model adds a header to the
frame to define the sender and/or receiver of the frame. If the frame is
intended for a system outside the sender's network, the receiver
address is the address of the device that connects the network to the
next one.

Page 12 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

3. Flow control.
If the rate at which the data are absorbed by the receiver is less than
the rate at which data are produced in the sender, the data link layer in
network model imposes a flow control mechanism to avoid
overwhelming the receiver.
4. Error control.
The data link in network model layer adds reliability to the physical
layer by adding mechanisms to detect and retransmit damaged or lost
frames. It also uses a mechanism to recognize duplicate frames. Error
control is normally achieved through a trailer added to the end of the
frame.
5. Access Control.
When two or more devices are connected to the same link, data link
layer protocols in network model are necessary to determine which
device has control over the link at any given time.
ii. Network layer:
The network layer (Layer 3) controls the source to destination
delivery of data packets across multiple hops (nodes). It controls the
operation of the subnet.
The main functions of the network layer are as follows:
1. Logical addressing:
The physical addressing implemented by the data link layer handles
the addressing problem locally. If a packet passes the network
boundary, we need another addressing system to help distinguish the
source and destination systems. The network layer in network model
adds a header to the packet coming from the upper layer that, among
other things, includes the logical addresses of the sender and receiver.
2. Routing:
When independent network models or links are connected to create
internetworks (network of networks) or a large network model, the
connecting devices (called routers or switches) route or switch the
packets to their final destination. One of the functions of the network
layer in network model is to provide this mechanism.

Page 13 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

d) Describe the Host-to-Network layer protocols SLIP and PPP 4M


Ans SLIP means Serial Line Internet Protocol. SLIP is the result of the
integration of modem protocols prior to the suite of TCP/IP protocols. Explanatio
It is a simple Internet link protocol conducting neither address nor n of SLIP
error control, which is the reason that it is quickly becoming obsolete 2M,
in comparison to PPP. Data transmission with SLIP is very simple:
this protocol sends a frame composed only of data to be sent followed
by an end of transmission character (i.e. the END character, the
Explanatio
ASCII code 192). A SLIP frame looks like this: n of PPP
2M

PPP means Point to Point Protocol. It is a much more developed


protocol than SLIP (which is why it is replacing it), insofar as it can
transfer additional data and is better suited to data transmission over
the Internet. (The addition of data in a frame is mainly due to the
increasing bandwidth).In reality, PPP is a collection of three
protocols: a datagram encapsulation protocol; an LCP, or Link
Control Protocol, enabling testing and communication configuration;
a collection of NCPs, or Network Control Protocols, allowing
integration control of PPP within the protocols of the upper layers.
Data encapsulated in a PPP frame is called a packet. These packets
are generally datagrams, but they can also be different (hence the
specific designation of packet instead of datagram). As such, one
field of the frame is reserved for the type of protocol to which the
packet belongs. A PPP frame looks like this:

Page 14 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

The padding data is used to adapt the length of the frame for certain
protocols. A PPP session (from opening to closure) takes place as
follows. Upon connection, an LCP packet is sent. In the event of an
authentication request from the server, a packet relating to an
authentication protocol may be sent i.e. </bold>PAP (Password
Authentication Protocol), CHAP (Challenge Handshake
Authentication Protocol), or Kerberos. Once communication is
established, PPP sends configuration information using the NCP
protocol. Datagrams to be sent are transmitted as packets. Upon
disconnection, an LCP packet is sent to end the session.
4 Attempt any THREE of the following 12M
a) Define Computer Network. State the applications of computer 4M
network.
Ans Definition:
A computer network is a group of computer systems and other Any
computing hardware devices that are linked together through suitable
Definition
communication channels to facilitate communication and resource 2Marks,
sharing among a wide range of users.
Computer Network Applications: Any four
1. File Sharing application
2. Printer Sharing s 2Marks
3. Application Services
4. E-mail Services
5. Remote access
6. Internet & Intranet
b) Describe star topology with suitable diagram. List two advantages 4M
of star topology
Ans Explanatio
n2M,

diagram
1M

Any two
advantages
1M

Page 15 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

 In a star topology, each device has a dedicated point-to-point link


only to a central controller, usually called a hub. The devices are
not directly linked to one another.
 A star topology does not allow direct traffic between devices. The
controller acts as an exchange. If one device wants to send data to
another, it sends the data to the controller, which then relays the
data to the other connected device. A star topology is less
expensive than a mesh topology.
 In a star, each device needs only one link and one I/O port to
connect it to any number of others. This factor also makes it easy
to install and reconfigure.
 One big disadvantage of a star topology is the dependency of the
whole topology on one single point, the hub. If the hub goes
down, the whole system is dead. Although a star requires far less
cable than a mesh, each node must be linked to a central hub. The
star topology is used in local-area networks (LANs). High-speed
LANs often use a star topology with a central hub.
Advantages of star topology:
o Centralized management allows better monitoring the network
o Easy to manage as connection of nodes and removing can be done
easily, without affecting the network.
o Failure of one link doesn’t affect the rest of the network.
o Easy to detect the failure and troubleshoot.  Better performance
as the signal sent by the node doesn’t necessarily get transmitted
to all workstations.

c) Describe the following: 4M


i) Interfaces
ii) Services Any
iii) Protocol suitable
Explanatio
iv) Packets n of each
Ans i) Interfaces: In OSI Reference Model, the mechanism for 1M
communication between adjacent layers in the model is called an
interface. Interface refers to the process by which data is passed
between layer N of the model and layer N-1 or layer N+1.

Page 16 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

ii) Services: A service is a set of actions that a layer offers to another


(higher) layer. A service is what the layer provides to the layer above
it through an interface. A service is a set of primitives (operations)
that a layer provides to the layer above it

iii) Protocol: Protocols are the rules and conventions used in the
exchange of information between two machines in various layers of a
network.

iv) Packets: A packet is a small amount of data sent over a network,


such as a LAN or the Internet. Similar to a real-life package, each
packet includes a source and destination as well as the content (or
data) being transferred. When the packets reach their destination, they
are reassembled into a single file or other contiguous block of data. A
typical packet includes two sections — a header and payload.
Information about the packet is stored in the header.

d) Identify class for following IP address and justify it: 4M


i) 10145.14.68
ii) 222.255.254.253
iii) 191.168.0.1
iv) 224.0.0.0
Ans
Sr IP address Class Justification Identificati
No on of class
½ M and
The first bye is 10,so it is in
Class justificatio
i) 10.145.14.68 class A(The range of class A n½M
A
is 1 to 127) each
The first bye is 222,so it is in
Class
ii) 222.255.254.253 class C(The range of class C
C
is192to 223)
The first bye is 191,so it is in
Class
iii) 191.168.0.1 class B(The range of class B
B
is128to 191)
The first bye is 224,so it is in
Class
iv) 224.0.0.0 class D(The range of class D
D
is224 to 239)

Page 17 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

e) Describe working of NOS(Network Operating System) and State 4M


its features.
Ans Working of NOS : A network operating system (NOS) is a computer Descriptio
operating system (OS) that is designed primarily to support n 2M,
workstations, personal computers and, in some instances, older
terminals that are connected on a local area network (LAN). The
software behind a NOS allows multiple devices within a network to
communicate and share resources with each other. The composition
of hardware that typically uses a NOS includes a number of personal
computers, a printer, a server and file server with a local network that
connects them together. The role of the NOS is to then provide basic
network services and features that support multiple input requests
simultaneously in a multiuser environment.

Types of network operating systems


There are two basic types of network operating systems, the peer-to
peer NOS and the client/server NOS:

Features of network operating systems Any two


features
Features of network operating systems are typically associated with
1M each
user administration, system maintenance and resource management
functionality.
This includes:
 Basic support for operating systems like protocol and processor
support, hardware detection and multiprocessing.
 Printer and application sharing.
 Common file system and database sharing.
 Network security capabilities such as user authentication and
access control.
 Directory Services
 Backup and web services.
 Internetworking of various resources connected in the network
 Providing access to remote printers, managing which users are
using which printers when, managing how print jobs are queued,
and recognizing when devices aren't available to the network.
 Enabling and managing access to files on remote systems, and
 Determining who can access what—and who can't.

Page 18 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

 Granting access to remote applications and resources, such as the


Internet, and making those resources seem like local resources to
the user (the network is ideally transparent to the user).
 Providing routing services, including support for major
networking protocols, so that the operating system knows what
data to send where.
 Monitoring the system and security, so as to provide proper
security against viruses, hackers, and data corruption.
 Providing basic network administration utilities (such as SNMP,
or Simple Network Management Protocol), enabling an
administrator
to perform tasks involving managing network
5 Attempt any TWO of the following 12M
a) Illustrate the working of following protocol 6M
i) FTP protocol
ii) HTTP protocol Explanatio
Ans FTP PROTOCOL: - File Transfer Protocol (FTP) is the commonly n of each
3M
used protocol for exchanging files over the Internet. FTP uses the
Internet's TCP/IP protocols to enable data transfer.

The above figure shows the basic model of the FTP. The FTP client
has three components: the user interface, control process, and data
transfer process. The server has two components: the server control
process and the server data transfer process. The control connection is

Page 19 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

made between the control processes. The data connection is made


between the data transfer processes.

FTP client is a program that implements a file transfer protocol which


allows you to transfer files between two hosts on the internet. It
allows a user to connect to a remote host and upload or download the
files. The FTP program is also available as a built-in component in a
Web browser. This GUI based FTP client makes the file transfer very
easy and also does not require to remember the FTP commands.

Advantages of FTP:
 Speed: One of the biggest advantages of FTP is speed. The FTP is
one of the fastest way to transfer the files from one computer to
another computer.
 Efficient: It is more efficient as we do not need to complete all the
operations to get the entire file.
 Security: FTP is more secure as it required username and password
to access the FTP server.
 Back & forth movement: FTP allows us to transfer the files back
and forth. For example a manager of the company sends some
information to all the employees, and they all send information back
on the same server.

Disadvantages of FTP:
 It also doesn't allow to run simultaneous transfers to multiple
receivers.
 Passwords and file contents are sent in clear text that allows
unwanted eavesdropping. So, it is quite possible that attackers can
carry out the brute force attack by trying to guess the FTP password.
 It is not compatible with every system

Page 20 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

(ii) HTTP protocol: -


The Hypertext Transfer Protocol (HTTP) is an application-level
protocol for distributed, collaborative, hypermedia information
systems. This is the foundation for data communication for the World
Wide Web (i.e. internet) since 1990. HTTP is a generic and stateless
protocol which can be used for other purposes as well using
extensions of its request methods, error codes, and headers.
Basically, HTTP is a TCP/IP based communication protocol, that is
used to deliver data (HTML files, image files, query results, etc.) on
the World Wide Web. The default port is TCP 80, but other ports can
be used as well. It provides a standardized way for computers to
communicate with each other.
HTTP specification specifies how clients' request data will be
constructed and sent to the server, and how the servers respond to
these requests.

Basic Features
There are three basic features that make HTTP a simple but powerful
protocol:
 HTTP is connectionless: The HTTP client, i.e., a browser initiates
an HTTP request and after a request is made, the client waits for the
response. The server processes the request and sends a response
back after which client disconnect the connection. So client and
server
know about each other during current request and response only.

Page 21 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

Further requests are made on new connection like client and server
are new to each other.
 HTTP is media independent: It means, any type of data can be
sent by HTTP as long as both the client and the server know how to
handle the data content. It is required for the client as well as the
server to specify the content type using appropriate MIME-type.
 HTTP is stateless: As mentioned above, HTTP is connectionless
and it is a direct result of HTTP being a stateless protocol. The
server and client are aware of each other only during a current
request. Afterwards, both of them forget about each other. Due to
this nature of the protocol, neither the client nor the browser
can retain
information between different requests across the web pages.
b) Draw and describe the structure of IPV6 address format and state 6M
its advantages over IPV4.
Ans

Diagram
2M

Version (4-bits): Descriptio


It shows the version of internet protocol we used, i.e. 0110 n 2M

Traffic Class (8-bits):


This is an 8-bit field in which 8 bits are divided into two parts. The
most significant 6-bit is for the type of service so that the router will Advantage
get to know about what services need to be provided to the given s 2M
packet. And for Explicit Congestion Notification (ECN), the least
significant 2-bit is used.

Flow Label (20-bits):


This 20-bit is required for maintaining the sequential flow of packets
related to a particular communication. This field is also helpful in
Page 22 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

avoiding the reordering of packets. The source labels the sequence to


help the router so that it can identify that a particular packet is related
to a specific flow of data. It is generally used for real or streaming
media.

Payload Length (16-bits):


This field is used to help the router in knowing how much
information is stored in the payload of a particular packet.

Next Header (8-bits):


This field is used to represent the type of extension header or if the
extension header is not present then it shows the Upper Layer PDU.
The value for Upper Layer PDU is the same as that of values in IPV4.

Hop Limit (8-bits):


Hop limit is a field in a header that stops the header to go into
an infinite loop in the network. It works the same as that of TTL in
IPv4. When it passes a hop or router its value is decremented by 1.
The packet is discarded when it reaches 0.

Source Address (128-bits):


This field provides the address from where the packet originates.

Destination Address (128-bits):


The destination address is the address of the packet's intended
recipient.

Key benefits to IPv6 include:


 No more NAT (Network Address Translation)
 Auto-configuration
 No more private address collisions
 Better multicast routing
 Simpler header format
 Simplified, more efficient routing
 True quality of service (QoS), also called "flow labelling"

Page 23 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

 Built-in authentication and privacy support


 Flexible options and extensions
 Easier administration (no more DHCP)

c) Differentiate between peer-to-peer network and client server 6M


network (Any 6 points)
Ans Sr. Client-Server Network Peer-to-Peer Network
no
1. In Client-Server Network, In Peer-to-Peer Network, Any six
Clients and server are Clients and server are not points 1M
differentiated, Specific server differentiated. each
and clients are present.
2. Client-Server Network focuses While Peer-to-Peer Network
on information sharing. focuses on connectivity.
3. In Client-Server Network, While in Peer-to-Peer
Centralized server is used to Network, Each peer has its
store the data. own data.
4. In Client-Server Network, While in Peer-to-Peer
Server respond the services Network, Each and every
which is request by Client. node can do both request
and respond for the
services.
5. Client-Server Network are While Peer-to-Peer Network
costlier than Peer-to-Peer are less costlier than Client-
Network. Server Network.
6. Client-Server Network are While Peer-to-Peer Network
more stable than Peer-to-Peer are less stable if number of
Network. peer is increase.
7. Client-Server Network is used While Peer-to-Peer Network
for both small and large is generally suited for small
networks. networks with fewer than 10
computers.
6 Attempt any TWO of the following 12M
a) Write a procedure for the following 6M
(i) To share a file
(ii) To share printer in network

Page 24 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

Ans i) To share a file Each


1. Open Windows Explorer by double-clicking My Documents icon procedure
3M
OR by following this:
Start>All Programs>Accessories>Windows Explorer.
2. In Windows Explorer, locate the files that you want to share and
copy/move them to a folder. You may use existing folder or create a
new folder.
3. Point your mouse to the folder that you want to share.
4. Right click the folder name, a menu that contains a list of file
operations appears, click "Sharing and Security", OR click the folder
name, then go to the "File and Folder Tasks" at the left pane of
Windows Explorer, click "Share this folder".
5. A folder properties window appears, and the "Sharing" tab is
already highlighted.
6. In the "Network sharing and security" setting, check the "Share this
folder on the network" checkbox. If the "Share this folder on the
network check box" is not available, this computer is not on a
network. If you would like to create a new network, click the
Network Setup Wizard link and follow the instructions to turn on file
sharing. Once file sharing is enabled, begin this procedure again.
7. You may check or uncheck the "Allow network users to change my
files" checkbox depending on your preference.
8. To change the name of your folder on the network, in the Share
name text box, type a new name for your folder. This will not change
the name of the folder on your computer.
9. Click the "Apply" button, then the "OK" button.
10. Now, your folder is shared with other network users.

ii) To share printer in network: -


1. Install the printer drivers: In order to share a printer, it must be
installed on the computer it is connected to. Most modern printers
connect via USB and will install automatically when they are
connected.

Page 25 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

2. Open the Control Panel: You can access the Control Panel in

In Windows, press ⊞Win+X and select Control Panel from the


Windows 7 by clicking the Start menu and selecting Control Panel.

menu.
3. Open the Network and Sharing Center: If your Control Panel is
in Category view, click "Network and Internet", and then select
"Network and Sharing Center". Click on "Network and Internet".
If your Control Panel is in Icon view, click the "Network and
Sharing Center" icon.
4. Click the "Change advanced sharing settings" link. This is
located in the left navigation pane of the Network and Sharing
Center.
5. Expand the profile you need to change. You will see three
different options when you open the "Advanced share settings":
Private, Guest or Public, and All Networks. If you are on a Home
network, expand the Private section.
6. Enable "File and printer sharing". Toggle this on to allow other
devices to connect to your printer. This will also allow you to
share files and folders with other computers on the network.
7. Toggle the password protection. You can decide whether or not
you want to enable password protection for your printer. If it is
turned on, only users who have a user account on your computer
will be able to access the printer. You can toggle password
protection in the "All Networks" section.
8. Share the printer. Now that file and printer sharing has been
turned on, you will need to share the printer itself. To do this, go
back to the Control Panel and open the Devices and Printers
option. Right- click on the printer you want to share and click
"Printer properties".
Click the Sharing tab, and then check the "Share this printer" box.
b) Design a Class 'C' Network with network address 192.156.5.0 with 2 6M
subnets. State the subnet mask and subnet address.

Page 26 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

Ans 1. Given IP address (Class C) – 192.168.5.0 Design:


2. In order to design 2 equal subnets, we have to 2M,
Subnet
use: 21 = 2 Mask: 2M ,
Extra bits from the host id field. Subnet
3. So the subnet mask is as shown: Address:
2M
The default subnet mask is
255.255.255.0
1111111.11111111.1111111.10000000

<-Host Id->I
Thus, subnet mask = 255.255.255.128
Subnet address:
IP address: 192. 156. 5. 0
11000000.10011100.00000101.00000000
Subnet Mask: 255 255 255 128
11111111.11111111.11111111.100000000
ANDING
Network Address : - 11000000.10011100.00000101.00000000
Therefore, subnet address = 192.156.5.0
c) Draw a suitable network layout using Mesh topology to connect 8 6M
computers. How many links are required. What are the
Diagram
advantages and disadvantages of this network? 4M
Ans
Mesh topology: -In mesh topology there are multiple paths between /
nodes. Mesh networks are most commonly employed for long Any two
advantage
distance transmission of data between nodes, which act as message 1/2M each
switch, circuit switch or packet switch.
A fully connected mesh, linking „n‟ nodes requires n (n-1) / 2 links Any two
disadvanta
but it is unusual for all possible or connections to be provided. ged 1/2M
each

Page 27 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

SUMMER – 2023 EXAMINATION


MODEL ANSWER-Only for the Use of RAC Assessors

Subject: Computer Networks Subject Code: 22417

Total numbers of links are required per node is: - 7


Advantages:
1. Avoids traffic problem
2. Robust topology since if one node fails, it does not affect the other
nodes.
3. Point to point connection makes it easier to detect errors.
4. More security and Privacy in connections.

Disadvantages:
1. More cables are required than other topologies.
2. Cost of the network is high since more number of cables are used.
3. Installation and re-configuration is difficult.
4. Setup and maintenance of the topology is difficult.
5. Through put and transmission quantity depends on media
and capacity of switching nodes.

Page 28 / 28

You might also like