22417 - Summer 2023
22417 - Summer 2023
22417 - Summer 2023
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
1. Transparent Bridge:
Transparent bridge is invisible to other devices on the network. This
bridge doesn’t reconfigure the network on the addition or deletion of
description
any station. The prime function of the transparent bridge is to block or of any two
forward the data according to the MAC address. 2M
2. Source Routing Bridge:
Source routing bridge is developed and designed by IBM specifically
for token ring networks. The frame’s entire route is embedded with the
data frames by the source station to perform the routing operation so
that once the frame is forwarded it must follow a specific defined
path/route.
3. Translational Bridge:
Translational bridge converts the received data from one networking
system to another. It is used to communicate or transmit data between
two different types of networking systems. If we are sending data from
a token ring to an Ethernet cable, the translational cable is used to
connect both the networking system and transmits data.
b) Draw TCP/IP model. State the function of each layer. 4M
Ans. TCP/IP model:
Diagram
2M
Page 4 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 5 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
system should exist so that each layer can identify the sender and
receivers of each message.
Error Control:
Unreliable channels introduce a few errors in the data streams that are
communicated. So, the layers need to agree upon common error
detection and error correction methods to protect data packets while
they are transferred.
Flow Control:
If the rate at which data is produced by the sender is higher than the
rate at which data is received by the receiver, there are chances of
overflowing the receiver. So, a proper flow control mechanism needs
to be implemented.
Resource Allocation:
Computer networks provide services in the form of network resources
to the end users. The main design issue is to allocate and deallocate
resources to processes. The allocation/deallocation should occur so
that minimal interference among the hosts occurs and there is optimal
usage of the resources.
Statistical Multiplexing:
It is not feasible to allocate a dedicated path for each message while it
is being transferred from the source to the destination. So, the data
channel needs to be multiplexed, to allocate a fraction of the
bandwidth or time to each host.
Routing:
There may be multiple paths from the source to the destination.
Routing involves choosing an optimal path among all possible paths,
in terms of cost and time. There are several routing algorithms that
are used in network systems.
Security:
A major factor of data communication is to defend it against threats
like eavesdropping and surreptitious alteration of messages. So, there
should be adequate mechanisms to prevent unauthorized access to
data
through authentication and cryptography.
Page 6 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Fig: ARP
Page 7 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Working of RARP:
RARP is reverese address resolution protocol.
RARP (Reverse Address Resolution Protocol) is also a network
layerprotocol. RARP is a TCP/IP protocol that allows any host to
obtainits IP address from the server. RARP is adapted from the Working of
ARPprotocol and it is just reverse of ARP. RARP with
RARP performs following steps to obtain an IP address from diagram 2M
theserver.
1. The sender broadcast the RARP request to all the other hostpresent
in the network.
2. The RARP request packet contains the physical address of
thesender.
3. All the host receiving the RARP request packet process it but,the
authorized host only which can serve RARP service,responds to
the RARP request packet such host are known asRARP Server.
4. The authorized RARP server replies directly to requesting
hostwith the RARP responsepacket which contains IP address
forthe sender.
Fig: RARP
Page 8 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 9 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 10 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 11 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 12 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3. Flow control.
If the rate at which the data are absorbed by the receiver is less than
the rate at which data are produced in the sender, the data link layer in
network model imposes a flow control mechanism to avoid
overwhelming the receiver.
4. Error control.
The data link in network model layer adds reliability to the physical
layer by adding mechanisms to detect and retransmit damaged or lost
frames. It also uses a mechanism to recognize duplicate frames. Error
control is normally achieved through a trailer added to the end of the
frame.
5. Access Control.
When two or more devices are connected to the same link, data link
layer protocols in network model are necessary to determine which
device has control over the link at any given time.
ii. Network layer:
The network layer (Layer 3) controls the source to destination
delivery of data packets across multiple hops (nodes). It controls the
operation of the subnet.
The main functions of the network layer are as follows:
1. Logical addressing:
The physical addressing implemented by the data link layer handles
the addressing problem locally. If a packet passes the network
boundary, we need another addressing system to help distinguish the
source and destination systems. The network layer in network model
adds a header to the packet coming from the upper layer that, among
other things, includes the logical addresses of the sender and receiver.
2. Routing:
When independent network models or links are connected to create
internetworks (network of networks) or a large network model, the
connecting devices (called routers or switches) route or switch the
packets to their final destination. One of the functions of the network
layer in network model is to provide this mechanism.
Page 13 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 14 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
The padding data is used to adapt the length of the frame for certain
protocols. A PPP session (from opening to closure) takes place as
follows. Upon connection, an LCP packet is sent. In the event of an
authentication request from the server, a packet relating to an
authentication protocol may be sent i.e. </bold>PAP (Password
Authentication Protocol), CHAP (Challenge Handshake
Authentication Protocol), or Kerberos. Once communication is
established, PPP sends configuration information using the NCP
protocol. Datagrams to be sent are transmitted as packets. Upon
disconnection, an LCP packet is sent to end the session.
4 Attempt any THREE of the following 12M
a) Define Computer Network. State the applications of computer 4M
network.
Ans Definition:
A computer network is a group of computer systems and other Any
computing hardware devices that are linked together through suitable
Definition
communication channels to facilitate communication and resource 2Marks,
sharing among a wide range of users.
Computer Network Applications: Any four
1. File Sharing application
2. Printer Sharing s 2Marks
3. Application Services
4. E-mail Services
5. Remote access
6. Internet & Intranet
b) Describe star topology with suitable diagram. List two advantages 4M
of star topology
Ans Explanatio
n2M,
diagram
1M
Any two
advantages
1M
Page 15 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 16 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
iii) Protocol: Protocols are the rules and conventions used in the
exchange of information between two machines in various layers of a
network.
Page 17 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 18 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
The above figure shows the basic model of the FTP. The FTP client
has three components: the user interface, control process, and data
transfer process. The server has two components: the server control
process and the server data transfer process. The control connection is
Page 19 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Advantages of FTP:
Speed: One of the biggest advantages of FTP is speed. The FTP is
one of the fastest way to transfer the files from one computer to
another computer.
Efficient: It is more efficient as we do not need to complete all the
operations to get the entire file.
Security: FTP is more secure as it required username and password
to access the FTP server.
Back & forth movement: FTP allows us to transfer the files back
and forth. For example a manager of the company sends some
information to all the employees, and they all send information back
on the same server.
Disadvantages of FTP:
It also doesn't allow to run simultaneous transfers to multiple
receivers.
Passwords and file contents are sent in clear text that allows
unwanted eavesdropping. So, it is quite possible that attackers can
carry out the brute force attack by trying to guess the FTP password.
It is not compatible with every system
Page 20 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Basic Features
There are three basic features that make HTTP a simple but powerful
protocol:
HTTP is connectionless: The HTTP client, i.e., a browser initiates
an HTTP request and after a request is made, the client waits for the
response. The server processes the request and sends a response
back after which client disconnect the connection. So client and
server
know about each other during current request and response only.
Page 21 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Further requests are made on new connection like client and server
are new to each other.
HTTP is media independent: It means, any type of data can be
sent by HTTP as long as both the client and the server know how to
handle the data content. It is required for the client as well as the
server to specify the content type using appropriate MIME-type.
HTTP is stateless: As mentioned above, HTTP is connectionless
and it is a direct result of HTTP being a stateless protocol. The
server and client are aware of each other only during a current
request. Afterwards, both of them forget about each other. Due to
this nature of the protocol, neither the client nor the browser
can retain
information between different requests across the web pages.
b) Draw and describe the structure of IPV6 address format and state 6M
its advantages over IPV4.
Ans
Diagram
2M
Page 23 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 24 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 25 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. Open the Control Panel: You can access the Control Panel in
menu.
3. Open the Network and Sharing Center: If your Control Panel is
in Category view, click "Network and Internet", and then select
"Network and Sharing Center". Click on "Network and Internet".
If your Control Panel is in Icon view, click the "Network and
Sharing Center" icon.
4. Click the "Change advanced sharing settings" link. This is
located in the left navigation pane of the Network and Sharing
Center.
5. Expand the profile you need to change. You will see three
different options when you open the "Advanced share settings":
Private, Guest or Public, and All Networks. If you are on a Home
network, expand the Private section.
6. Enable "File and printer sharing". Toggle this on to allow other
devices to connect to your printer. This will also allow you to
share files and folders with other computers on the network.
7. Toggle the password protection. You can decide whether or not
you want to enable password protection for your printer. If it is
turned on, only users who have a user account on your computer
will be able to access the printer. You can toggle password
protection in the "All Networks" section.
8. Share the printer. Now that file and printer sharing has been
turned on, you will need to share the printer itself. To do this, go
back to the Control Panel and open the Devices and Printers
option. Right- click on the printer you want to share and click
"Printer properties".
Click the Sharing tab, and then check the "Share this printer" box.
b) Design a Class 'C' Network with network address 192.156.5.0 with 2 6M
subnets. State the subnet mask and subnet address.
Page 26 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
<-Host Id->I
Thus, subnet mask = 255.255.255.128
Subnet address:
IP address: 192. 156. 5. 0
11000000.10011100.00000101.00000000
Subnet Mask: 255 255 255 128
11111111.11111111.11111111.100000000
ANDING
Network Address : - 11000000.10011100.00000101.00000000
Therefore, subnet address = 192.156.5.0
c) Draw a suitable network layout using Mesh topology to connect 8 6M
computers. How many links are required. What are the
Diagram
advantages and disadvantages of this network? 4M
Ans
Mesh topology: -In mesh topology there are multiple paths between /
nodes. Mesh networks are most commonly employed for long Any two
advantage
distance transmission of data between nodes, which act as message 1/2M each
switch, circuit switch or packet switch.
A fully connected mesh, linking „n‟ nodes requires n (n-1) / 2 links Any two
disadvanta
but it is unusual for all possible or connections to be provided. ged 1/2M
each
Page 27 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL
EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Disadvantages:
1. More cables are required than other topologies.
2. Cost of the network is high since more number of cables are used.
3. Installation and re-configuration is difficult.
4. Setup and maintenance of the topology is difficult.
5. Through put and transmission quantity depends on media
and capacity of switching nodes.
Page 28 / 28