0% found this document useful (0 votes)
107 views78 pages

Ilovepdf

The document provides model answers for the Summer 2022 examination on Computer Networking and Data Communication, detailing important instructions for examiners regarding assessment criteria. It includes questions and answers covering key concepts such as bit rate, baud rate, network classifications, OSI model layers, and error correction techniques. Additionally, it outlines the functions of various network layers and protocols, emphasizing the importance of understanding over exact wording in student responses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views78 pages

Ilovepdf

The document provides model answers for the Summer 2022 examination on Computer Networking and Data Communication, detailing important instructions for examiners regarding assessment criteria. It includes questions and answers covering key concepts such as bit rate, baud rate, network classifications, OSI model layers, and error correction techniques. Additionally, it outlines the functions of various network layers and protocols, emphasizing the importance of understanding over exact wording in student responses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
1

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess
the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any
equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi and Bilingual
(English + Marathi) medium is introduced at first year of AICTE diploma Programme from academic
year 2021-2022. Hence if the students in first year (first and second semesters) write answers in
Marathi or bilingual language (English +Marathi), the Examiner shall consider the same and assess the
answer based on matching of concepts with model answer.

Q. Sub Answers Markin


No. Q. g
N. Scheme

1 (A) Attempt any FIVE of the following: 10-


Total
Marks

(a) Define following terms: 2M

i) bit rate
ii) baud rate

Page 1/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
2

Ans: i) bit rate : It is the transmission of number of bits per second. 1M


ii) baud rate : It is defined as the number of signal units per second.
1M

(b) Classify networks on the basis of transmission technologies. 2M

Ans: Classification of networks on the basis of transmission technologies 1M


Each
1. Broadcast Network
2. Point-to-Point Network

(c) Compare TCP/IP and OSI reference model (any two points). 2M

Ans: [Link] TCP/IP Model OSI Model Any 2


correct
1. It stands for Transmission It stands for Open System
answers
Control Protocol Interconnection.
1M each
2. It was developed by OSI model has been developed
ARPANET (Advanced by ISO (International Standard
Research Project Agency Organization).
Network)

3. This model is based on a This model is based on a vertical


horizontal approach approach.

4. It consists of 5 or 4 layers. It consists of 7 layers.

5. This model is highly used. The usage of this model is very


low.

6. It is an implemented model It is also known as a reference


model through which various

Page 2/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
3

of an OSI model. networks are built. For example,


the TCP/IP model is built from
the OSI model. It is also referred
to as a guidance tool

(d) Name the layer of the OSI model at which the mechanical, electrical , functional and 2M
procedural characteristics are defined. State its function.

Ans: Physical layer of the OSI model at which the mechanical, electrical , functional and Name of
procedural characteristics are defined. layer
1m
Functions of the physical layer are
Any two
1. It defines the physical characteristics and functions of the physical devices and function
interfaces so that transmission can occur. 1M
2. It defines the procedure of encoding of the bits.
3. It states the data transmission rate and the duration of a bit.
4. It defines the topology.
5. It also states the direction of transmission.

e) State two advantages of coaxial cable. 2M

Ans: Advantages of coaxial cable Any 2


1. The cost of a coaxial cable is less. correct
2. Highly resistant to physical damage. answer
1M each
3. Highly resistant to EMI.
4. The transmission rate is high.
5. It allows a high transfer rate with coaxial cable having better shielding materials.

Page 3/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
4

f) List four network connecting devices. 2M

Ans: Network connecting devices Any 4


correct
1. Hub.
answer
2. Switch.
1M each
3. Router.
4. Bridge.
5. Gateway.
6. Modem.
7. Repeater.
8. Access Point.

g) State the need for IPv6. 2M

Ans: Need for IPv6 2M

The primary function of IPv6 is to allow for more unique TCP/IP address identifiers to
be created, now that we’ve run out of the 4.3 billion created with IPv4. This is one of the
main reasons why IPv6 is such an important innovation for the Internet of Things (IoT).
Internet-connected products are becoming increasingly popular, and while IPv4
addresses couldn’t meet the demand for IoT products, IPv6 gives IoT products a
platform to operate on for a very long time.

Q. Sub Answers Markin


No. Q. g

Page 4/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
5

N. Scheme

2 Attempt any THREE of the following: 12-Total


Marks

a) Draw the block diagram of data communication system and state the function of each 4M
block.

Ans: 1.5M
for
block
diagram
and 1/2
M for
each
Block diagram of data communication system
function
Function of each block.

1. Protocol : it is sets of rules which governs data communication. The actual


communication between transmitter and receiver which takes place with the help
of protocol.
2. Sender: it is a device which sends the message for example, computer system,
cameras or telephone.
3. Medium: it is a physical path over which the message travel from sender to the
receiver. Medium can be a co-axial cable , twisted pair wire , fiber optic cables or
radio waves.
4. Message : it is information or data which is to be send from one point to other. It
can be in the form of sound , text , number or picture.
5. Receiver: it is a device which receives the message. for example computer system
, picture tube.

Page 5/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
6

b) Compare Peer-to-Peer and Client – Server architecture on the basis of – 4M

i) Cost
ii) Performance
iii) Backup
iv) Security

Ans: Sr Parameter Peer-to-Peer Client-Server Each


no. point
1M
i. Cost less more

ii. Performance In case of a large peer-to- The performance remains


peer network, unaffected with the
performance is likely to increase in clients because
reduce because the the server does the heavy
resources are shared lifting

iii. Backup the users need to manage It is easier to take backups


their own backups.

iv. Security It is less secure It is more secure

c) Explain different functions of datalink layer of OSI reference model. 4M

Ans: functions of datalink layer of OSI reference model 1


function
1. Framing: Data-link layer takes packets from Network Layer and encapsulates
1M
them into Frames. Then, it sends each frame bit-by-bit on the hardware. At
receiver’ end, data link layer picks up signals from hardware and assembles

Page 6/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
7

them into frames.


2. Addressing: Data-link layer provides layer-2 hardware addressing mechanism.
Hardware address is assumed to be unique on the link. It is encoded into
hardware at the time of manufacturing.
3. Synchronization: When data frames are sent on the link, both machines must be
synchronized in order to transfer to take place.
4. Error Control: Sometimes signals may have encountered problem in transition
and the bits are flipped .These errors are detected and attempted to recover
actual data bits.
5. Flow Control: Stations on same link may have different speed or capacity. Data-
link layer ensures flow control that enables both machine to exchange data on
same speed.
6. Multi-Access: When host on the shared link tries to transfer the data, it has a
high probability of collision. Data-link layer provides mechanism such as
CSMA/CD to equip capability of accessing a shared media among multiple
Systems.

d) Describe hamming code error correction technique with the help of example. 4M

Page 7/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
8

Ans: Hamming code error correction technique 1 M for


descript
1. At the receiver transmitted hamming code is decoded to get the data back
ion and
2. The bits (1,3,5,7) , (2,3,6,7) and (4,5,6,7) are checked for even parity.
3M for
3. If all the 4-bit groups mentioned above possess the even parity then the received
any
code word is correct.
correctl
4. But if parity is not even then error exists .such an error can be located by
y solved
forming a 3-bit number out of three parity checks.
example
Example of Detection and correction of a single bit error : or 4M
for the
If received 7-bit Hamming code word is 10 1 1 0 1 1. Assuming even parity. By using
solved
following method we can detect and correct error .
example
if steps
are
included

Page 8/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
9

Page 9/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
10

Q. Sub Answers Markin


No. Q. g
N. Scheme

3 Attempt any THREE of the following: 12-


Total
Marks

a) State the names of the layers that perform the following functions – 4M

i) Data Encryption
ii) File transfer
iii) Error Correction
iv) Data Encoding

Ans: i) Data Encryption:-Presentation Layer 1M each


ii) File Transfer:-Application Layer for
iii) Error Correction:-Data Link Layer and Transport Layer correct
iv) Data Encoding:-Data Link Layer name of
layer
for
function
given

b) Summarize the frame format of PPP protocol. 4M

Ans: PPP Frame Format:

The PPP frame is shown in Fig.

Page 10/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
11

The description of the fields in the PPP frame are as follows:

1. Flag Field (1 Byte): The flag field identifies the boundaries of PPP frame i.e. each
frame begins and ends with flag field. This field is 1 byte in length.

2. Address Field (1 Byte): This field contains a value indicating that the packet is
addressed to all recipients. Address field indicates the address of destination. Address
field is 1 byte (8 bits).

When the address field contains all 1’s i.e. 11111111, this indicates that all stations are to
accept the frames (broadcast).

[Link] Field (1 Byte): PPP normally runs in connectionless mode therefore control
field is set to 11000000. This indicates unnumbered frames i.e. frame does not contain
sequence numbers and there is no flow or error control.

4. Protocol Field (2 Bytes): Protocol field defines the information of data field. The
protocol field is 1 or 2 byte long.

5. Data Field: The data field contains the actual data to transmit, plus padding if
necessary. The length of this field is variable.

6. Frame Check Sequence (FCS): The FCS field is 24 byte long and contains CRC code.
It checks length of all fields in frame.

PPP Frame Format

c) Draw a diagram to establish a network for a computer laboratory with 5 computer 4M


having internet facility using the following devices.

Page 11/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
12

i) Switch
ii) Router

Ans: 4M for
correct
diagram

d) Compare IPv4 and IPv6 on the basis of – 4M

i) Address
ii) Packet Size

Page 12/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
13

iii) Configuration
iv) IP Security

Ans: Parameter IPv4 IPv6 1M each


for
i) Address length IPv4 has 32-bit address IPv6 has 128-bit
correct
length address length
compari
ii) Packet size Packet size 576 bytes 1208 bytes required son
required, fragmentation without fragmentation point
optional

iii) Configuration It Supports Manual and It supports Auto and


DHCP address renumbering address
configuration configuration

OR OR

You have to configure a In IPv6, the


newly installed system configuration is
before it can optional, depending
communicate with upon on functions
other systems. needed.

iv) IP Security Security feature is IPSEC is inbuilt


dependent on security feature in the
application IPv6 protocol

OR OR

Internet Protocol Internet Protocol


Security (IP Sec) Security (IP Sec)
concerning network Concerning network

Page 13/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
14

security is optional security is mandatory

Q. Sub Answers Markin


No. Q. g
N. Scheme

4 Attempt any THREE of the following: 12-


Total
Marks

(a) State the need of multiplexing and switching. Summarize the situations for the 4M
implementations of TDM, FDM, Circuit Switched Network & Packet Switched Network.

Ans: Need of multiplexing (1M) for


need of
 In a communication systems there are large numbers of users involved
multiple
 It is not possible to lay a separate pair of wires between each source and destination
xing
this is very expensive and practically impossible.
 Instead we can use a communication medium such as coaxial cable or
optical fiber cable to carry many telephone signals from different sources
together
 Multiplexing is a technique that allows simultaneous transmission of
multiple signals over common transmission path
 Multiplexing is used to send multiple signals simultaneously ,
reduce the cost of Transmission and to make effective use of available bandwidth (1M) for

Need of switching Need of


switching
 Switching is needed to establish connections between all the nodes on a
network without the need for single connections between each pair of nodes.
Therefore, we require switching technology that provides a mechanism to establish

Page 14/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
15

connectivity as and when required. Once a connection has been made, information can
be sent and received
(1/2M)
TDM is implemented in
each for
 Satellite Communication system.
any one
 Cellular Radio.
implent
 Public Switched Telephone Network or PSTN system.
ation/ap
 digital audio mixing system.
plicatio
 Pulse Code Modulation (PCM) transmission system. n of
FDM is implemented in TDM,F
 Television and Radio Broadcasting. DM,
 Satellite Communication system. Circuit
 First generation cellular systems switchin
 Analog telephone systems g,
Circuit switching is implemented in Packet
 Analog telephone network switchin
 Optical mesh network g
 Public Switched Telephone Network (PSTN)
Any
 ISDN is a circuit switched telephone network
other
Packet switching is implemented in
valid
 Internet and most local area networks.
applicat
 Ethernet and frame relay
ion
 Newer mobile phone technologies (e.g., GSM, LTE)
should
 Wide Area Network (WAN) protocols be
consider
ed

(b) Explain a one bit sliding window protocol under normal condition and with damaged 4M

Page 15/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
16

frame with suitable diagram.

Ans: 1. One bit sliding window protocol is used for delivery of data frames.
2. The sender and receiver’s windows size is 1. (2m)
3. One bit sliding window protocol uses Stop and Wait concept.
Diagra
4. Its bidirectional protocol. (full duplex communication)
m

OR

Page 16/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
17

(1M)

Normal Operation : In normal operation the sender sends a frame and waits for Normal
acknowledgement from receiver .The acknowledgement should be received operatio
before the timer for the frame expires. The sequence
of n number
acknowledgement should match the sequence number of next frame to be
transmitted .If it matches the next frame is transmitted otherwise previous frame
is transmitted (1M)

Damaged frame : .When the receiver receives a damaged frame it discards it Damage
which means the frame is lost .The receiver remains silent about the lost frame d frame
.After the timer expires for that frame the sender retransmits the same frame .

(c) Draw structural diagram of fiber optic cable and write its functions. 4M

Page 17/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
18

Ans:

2M

diagram

(2M)

explaina
tion

Structural diagram of Fibre Optic Cable

 Core − The core is innermost part of fibre optic cable . It is made up of glass or
plastic
Function : The core has a higher refractive index w.r.t cladding. This ensures that
light is confined within the core and propagates by total internal reflection.

Cladding − The core is surrounded by cladding which is also made up of glass


or plastic. The refractive index of outer cladding is slightly less than that of the
core. Functions :
1) Cladding reduces light scattering.
2) Cladding reduces loss of light from the core to outside.
3) Cladding protects the Glass core from outside contaminants.
 Outer Coating or Jacket − The outer jacket is a thin plastic sheath or coating
that is opaque to light.

Page 18/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
19

Function :
1) It prevents light rays from outside to enter the optical fiber.
2) prevents the fibers from physical damage.
3) It adds strength to the fiber.

(d) On which layer of OSI reference model following protocol works – 4M

i) UDP
ii) IP
iii) FTP
iv) SCTP

Ans: i) UDP – Transport layer 1M each


ii) IP - Network Layer for
iii) FTP – Application Layer writing
iv) SCTP – Transport Layer correct
layer of
OSI
model

(e) Explain datagram approach for packet switching. 4M

Page 19/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
20

Ans:

2M for

Diagra
m

 In a datagram network, each packet is treated independently of all others.


 . Datagram switching is normally done at the network layer.
 . Figure shows how the datagram approach is used to deliver four packets from 2M for
station A to station X. explaina
 The switches in a datagram network are traditionally referred to as routers. tion
 In this example, all four packets (or datagrams) belong to the same message, may
travel different paths to reach their destination. This is so because the links may
be involved in carrying packets from other sources and do not have the necessary
bandwidth available to carry all the packets from A to X.
 This approach can cause the datagrams of a transmission to arrive at their
destination out of order with different delays between the packets.
 . In most protocols, it is the responsibility of an upper-layer protocol to reorder
the datagrams or ask for lost datagrams before passing them on to the
application.
 The datagram networks are sometimes referred to as connectionless networks.
The term connectionless here means that the switch (packet switch) does not keep
information about the connection state. There are no setup or teardown phases.

Page 20/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
21

 Datagrams can contain the full destination address rather than using some
number.

 There is no set up phase required for the datagram circuits. This means that no
resources are consumed.

 If any fault or loss occurs on a communication line, the datagrams circuits are
capable of compensating for it.

Q. Sub Answers Markin


No. Q. g
N. Scheme

5. Attempt any TWO of the following: 12-


Total
Marks

a) With a suitable diagram, explain the following topologies. 6M

i) Bus topology
ii) Ring topology

Ans: [Link] Topology: 3M each

In networking, a topology that allows all network nodes to receive the same message 1M
through the network cable at the same time is called as bus topology. Diagra
m of
In this type of network topology, all the nodes of a network are connected to a common
Bus
transmission medium having two endpoints.
topology
All the data that travels over the network is transmitted through a common

Page 21/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
22

transmission medium known as the bus or the backbone of the network. and 2M
explanat
Working of Bus Topology:
ion
Fig. shows bus topology. The central cable is the backbone of the network and is known
as Bus (thus the name). Every workstation or node communicates with the other device
through this Bus.

A signal from the source is broadcasted and it travels to all workstations connected to
bus cable. Although the message is broadcasted but only the intended recipient, whose
MAC address or IP address matches, accepts it.

If the MAC/IP address of machine does not match with the intended address, machine
discards the signal. A terminator is added at ends of the central cable, to prevent
bouncing of signals. A barrel connector can be used to extend it.

[Link] Topology:

Ring topology is a network topology that is set-up in circular fashion. The data and the
signals that pass over the network travel in a single direction. It is called ring topology
because it forms a ring as each computer is connected to another computer, with the last
one connected to the first. Exactly two neighbors for each device.

Each node in this topology contains repeater. A signal passes node to node, until it
reaches its destination. If a node receives a signal intended for another node its repeater

Page 22/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
23

regenerates the signal and passes it.

Token is a special three byte frame that travels around the ring network. It can flow
clockwise or anticlockwise. Ring topology is a point to point network.

A number of repeaters are used for Ring topology with large number of nodes, because
if someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to
prevent data loss repeaters are used in the network.

Fig. shows a ring topology. The token travels along the ring until it reaches its
destination. Once, token reaches destination, receiving computer acknowledges receipt
with a return message to the sender. The sender then releases the token for the token for
use by another computer.

1M
Diagra
m of
Ring
topology
and 2M
explanat
ion

Page 23/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
24

b) Draw layered architecture of the OSI model. State the functions of various layers. 6M

Ans: Layered Architecture of ISO-OSI Model: 2.5 M


for
diagram
and
1/2M
for
explanat
ion of
each
layer

7 Layers of OSI reference Model

ISO-OSI model has 7 layered architecture.

Functions of each layer are given below

Layer1 :Physical Layer

1. It activates, maintains and deactivates the physical connection.


2. It is responsible for transmission and reception of the unstructured
raw data over network.
3. Voltages and data rates needed for transmission is defined in the
physical layer.

Page 24/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
25

4. It converts the digital/analog bits into electrical signal or optical


signals.
5. Data encoding is also done in this layer.

Layer2: Data Link Layer

1. Data link layer synchronizes the information which is to be

transmitted over the physical layer.

2. The main function of this layer is to make sure data transfer is

error free from one node to another, over the physical layer.

3. Transmitting and receiving data frames sequentially is managed by

this layer.

4. This layer sends and expects acknowledgements for frames

received and sent respectively. Resending of non acknowledgement

received frames is also handled by this layer.

Layer3:The Network Layer

1. Network Layer routes the signal through different channels from

one node to other.

2. It acts as a network controller. It manages the Subnet traffic.

3. It decides by which route data should take.

4. It divides the outgoing messages into packets and assembles the

incoming packets into messages for higher levels.

Page 25/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
26

Layer 4: Transport Layer

1. Transport Layer decides if data transmission should be on parallel

path or single path.

2. Functions such as Multiplexing, Segmenting or Splitting on the

data are done by this layer

3. It receives messages from the Session layer above it, convert the

message into smaller units and passes it on to the Network layer.

4. Transport layer can be very complex, depending upon the

network requirements.

Transport layer breaks the message (data) into small units so that they

are handled more efficiently by the network layer.

Layer 5: The Session Layer

1. Session Layer manages and synchronize the conversation

between two different applications.

2. Transfer of data from source to destination session layer streams

of data are marked and are resynchronized properly, so that the

ends of the messages are not cut prematurely and data loss is

avoided.

Layer 6: The Presentation Layer

Page 26/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
27

1. Presentation Layer takes care that the data is sent in such a way

that the receiver will understand the information (data) and will

be able to use the data.

2. While receiving the data, presentation layer transforms the data to

be ready for the application layer.

3. Languages(syntax) can be different of the two communicating

systems. Under this condition presentation layer plays a role of

translator.

4. It performs Data compression, Data encryption, Data conversion

etc.

Layer 7: Application Layer

1. Application Layer is the topmost layer.

2. Transferring of files disturbing the results to the user is also done

in this layer. Mail services, directory services, network resource

etc are services provided by application layer.

3. This layer mainly holds application programs to act upon the

received and to be sent data.

c) Explain microwave transmission with its advantages and disadvantages. 6M

Ans: Electromagnetic waves having frequencies between 1 and 300 GHz are called 3M for
diagram

Page 27/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
28

microwaves. Microwaves are unidirectional. and 3M


for
• When an antenna transmits microwaves they can be narrowly focused. This means explanat
ion
that the sending and receiving antennas need to be aligned.

• Microwave communication is widely used for long distance telephone communication,


cellular telephones, television distribution and other uses that a severe shortage of
spectrum has developed.

• Electromagnetic radiation beyond the frequency range of radio and television can be
used to transport information. Microwave transmission is usually point-to-point using
directional antennae with a clear path between transmitter and receiver.

Fig. shows typical example of microwave link using dish antenna and satellite.

• A parabolic dish antenna can be used to focus the transmitted power into a narrow
beam to give a high signal to noise ratio, and before the advent of optical fiber, some
long distance telephone transmission systems were heavily dependent on the use of a
series of microwave towers.

Because microwaves travel in a straight line, the curvature of the earth limits the
maximum distance over which microwave towers can transmit, so repeaters are needed
to compensate for this limitation.

Microwave transmission is line of sight transmission. The Transmitter station must be in


visible contact with the receiver station. This sets a limit on the distance between stations
depending on the local geography.

Page 28/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
29

Fig:Other example of Microwave Transmission

Typically the line of sight due to the Earth's curvature is only 50 km to the horizon.
Repeater stations must be placed so the data signal can hop, skip and jump across the
country.

• Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows them to


carry large quantities of data due to the large bandwidth.

Advantages of Microwave:

1. They require no right of way acquisition between towers.

2. They can carry high quantities of information due to their high operating frequencies.

Page 29/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
30

3. Low cost land purchase: each tower occupies small area.

4. High frequency/short wavelength signals require small antenna.

Disadvantages of Microwave:

1. Attenuation by solid objects: birds, rain, snow and fog.

2. Reflected from flat surfaces like water and metal.

3. Diffracted (split) around solid objects.

4. Refracted by atmosphere, thus causing beam to be projected away from receiver.

There are two types of microwave data communication systems namely, Terrestrial
Microwave Transmission and Satellite Microwave Transmission.

(I) Terrestrial Microwave Transmission:

• Terrestrial microwave transmission systems transmit tightly focused beams of radio


frequencies from one ground-based microwave antenna to another.

• Terrestrial microwave systems typically use directional parabolic antennas to send and
receive signals in the lower gigahertz (GHz) range.

• The signals are highly focused and the physical path must be line-of-sight. Relay
towers are used to extend signals. Terrestrial microwave systems are typically used
when using cabling is costprohibitive.

Advantages:

1. High data rates.

2. Low cost land purchase for towers.

Page 30/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
31

3. High frequency or short wavelengths require short distant antennas.

Disadvantages:

1. Attenuation.

2. Reflected from flat surface, metal etc.

3. Line of sight is required.

Fig. : Typical Example of Terrestrial and Satellite Microwave Links

(II) Satellite Microwave Transmission:

• In satellite microwave, the signals are transmitted from a ground station to a satellite
and then after amplifying, from the satellite to some other ground station.

• It covers large geographical areas than terrestrial microwaves.

Q. Sub Answers Markin


Q. g

Page 31/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
32

No. N. Scheme

6. Attempt any TWO of the following : 12-


Total
Marks

a) Draw and explain architecture for network using tree topology for an office in 3 – Storey 6M
building.

Ans:

3M
diagram

1) The tree topology is a combination of star and bus topology


2) In tree topology the star network are connected using bus (backbone cable)
3) The main (backbone) cable acts as the stem of the tree and star network as
branches
For connecting three floors a bus (backbone cable) is used .hubs and switches will
be used for connecting devices on each floor 3M
4) This is also called as expanded star topology . explaina

Page 32/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
33

5) Ethernet is a common protocol used in this topology tion


6) It combines the characteristics of linear bus and star topology
7) In this topology for star connection a hub or switch can be used
8) A switch is preferred over hub because switch delivers the data directly to the
destination device hence privacy and security is maintained
9) The hub works on broadcasting principle .The hub based networks are less
secured as all the devices connected to the hub can listen to the message.
10) It allows the expansion of existing network enables a campus to configure
network to meet their needs
11) The failure of one hub/switch will affect only that part of network
12) The failure of bus(backbone cable) will bring entire network down

b) Explain stop and wait ARQ with example. 6M

Ans: Stop and wait ARQ :

 In this method after sending the data, the sender stops and waits till an
acknowledgment is received from the receiver. It is a data-link layer protocol
 In stop and wait ARQ the frames and acknowledgements are alternately
numbered
 A frame 0 is acknowledged using ACK1 and frame 1 with ACK0
 The acknowledgement number indicates the next expected frame

3M

Page 33/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
34

Diagra
m

3M
explaina
tion
1) Normal Operation : In normal operation the sender sends a frame and waits for
acknowledgement from receiver .The acknowledgement should be received
before the timer for each frame expires

2) Lost or Damaged frame : .When the receiver receives a damaged frame it


discards it which means the frame is lost .The receiver remains silent about the
lost frame .After the timer expires for that frame the sender retransmits the
same frame .

Page 34/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
35

3) Lost or Delayed acknowledgement: In case of lost or delayed acknowledgement


after the timer for the frame expires the sender retransmits the frame .The
receiver takes care of discarding duplicate copy

c) Explain the addressing scheme in IPv4 and IPv6, when IPv6 protocol is introduced, does 6M
the ARP protocol have to be changed? Explain in details.

Ans:

Addressing schemes in IPv4


The 32 bit IPV4 address is divided into five sub-classes. These are: 3M for
Class A 2)Class B 3) Class C 4) Class D 5)Class E (any 3)
IPv4 address is divided into two parts: IPV4
Network ID Host ID addressi
ng
Class A: schemes
 IP address belonging to class A are assigned to the networks that contain a
large number of hosts. Either
 The Network ID is 1 byte long and Host host ID is 3 byte long diagram
 The most significant bit of class A is always set to 0. OR
explaina
tion
should
Class B: be

 IP address belonging to class B are assigned to the networks that ranges consider
from medium-sized to large-sized networks. ed

 The Network ID is 2 byte long and Host ID is 2 byte long


 The most significant bits of class B are always set to 10. The remaining 14

Page 35/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
36

bits are used to determine network ID.

Class C:
 IP address belonging to class C are assigned to small-sized networks.
 The Network ID is 3 byte long and Host ID is 1 byte long
 The most significant bits of the class C are always set to 110 The
remaining 21 bits are used to determine network ID.

Class D:
 IP address belonging to class D are reserved for multi-casting.
 The most significant bits of class D are always set to 1110.

Class E:
 IP addresses belonging to class E are reserved for experimental and
research purposes.
 The most significant bits of class E are always set to 1111.

Addressing schemes in IPv6 :


In IPv6 representation, we have three addressing methods :
Unicast

Page 36/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

SUMMER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
37

unicast IP address acts as a Identifier for a single interface (computer router)


An IPv6 packet sent to a unicast address is delivered to the interface identified by
that address
Multicast
Identifies a group of interfaces, usually on different nodes. Packets that are sent
to the multicast address go to all members of the multicast group. 2M for
Anycast (any 2)
Identifies a group of interfaces, usually on different nodes. Packets that are sent IPv6
to the anycast address go to the anycast group member node that is physically addressi
closest to the sender. ng
schemes

ARP(Address Resolution Protocol) is used by IPv4 to find a physical address,


such as the MAC or link address, associated with an IPv4 address.
Neighbor Discovery Protocol (NDP) is an important protocol in IPv6. Neighbor
Discovery Protocol (NDP) is based on ICMPv6 and is used to identify the
relationships between different neighboring devices in an IPv6 network. Many
important functions of IPv6 like resolving MAC address of an IPv6 Address
(in IPv4, ARP is used for this), Router Discovery etc., are now performed using
Neighbor Discovery Protocol (NDP).
1M
Besides replacing these functions of IPv4, it also provides a lot of additional
functionalities that simplify network administration and management. Hence
there was no need to change ARP protocol when IPV6 was intoduced

Page 37/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
1

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess
the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any
equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi and Bilingual
(English + Marathi) medium is introduced at first year of AICTE diploma Programme from academic
year 2021-2022. Hence if the students in first year (first and second semesters) write answers in
Marathi or bilingual language (English +Marathi), the Examiner shall consider the same and assess the
answer based on matching of concepts with model answer.

Q. Sub Answers Marki


No. Q. ng
N. Schem
e

1 (A) Attempt any FIVE of the following: 10-


Total
Marks

(a) Define Bit rate and Baud rate 2M

Ans: bit rate : It is defined as the number of bits transmitted per second. 1M
baud rate : It is defined as the number of signal units per second. each

Page 1/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
2

(b) Classify networks on the basis of transmission technologies. 2M

Ans: Classification of networks on the basis of transmission technologies 1M


1. Broadcast Network Each
2. Point-to-Point Network
(c) State the function of transport layer in TCP/IP protocol suite 2M

Ans: Function of transport layer in TCP/ IP protocol suite Any


two
1. Process to process delivery
2. End-to-end Connection between hosts valid
3. Multiplexing and Demultiplexing functi
4. Congestion Control on 1M
5. Data integrity and Error correction
each
6. Flow control

(d) Name the layer of the OSI model that is responsible for moving of data in and out of 2M
physical link in network. State its functions.

Ans: Physical layer is responsible for moving of data in and out of physical link in network. Name
of
Function of Physical layer
layer
1. It defines the physical characteristics and functions of the physical devices and interfaces 1M
so that transmission can occur.
2. It defines the procedure of encoding of the bits. Any
3. It states the data transmission rate and the duration of a bit.
one
4. It defines the topology.
5. It also states the direction of transmission valid
functi
on 1M

e) State the application of infrared waves 2M

Page 2/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
3

Ans: Application of infrared waves Any 2


1. Remote Control applic
2. Optical Fibres
ation
3. Thermal Imaging Cameras
4. Infrared Cookers 1M
5. Electric Heaters
each
6. Infrared Lamps

f) State the application of firewall. 2M

Ans: Application of firewall Any


one
 A fire wall is a network security device,either hardware or software-based,which
monitors all incoming and out going traffic and based on a defined set of security rules it Valid
accepts ,rejects or drops that specific traffic.
applic
 A fire wall establishes a barrier between secured internal networks and outside untrusted
network, such as the Internet ation
 A fire wall is a part of computer system or network that is designed to block point
unauthorized access while permitting authorized communication 2M
 A firewall is placed at the entry/exit point of the network
each

g) State the need for IPv6. 2M

Ans: Need for IPv6 2M

The Internet has experienced a phenomenal increase of devices accessing the Internet.
Because of this increase, IPv4 addresses are running [Link] model of classful
addressing does not allow the address space to be used to its maximum [Link] solution
is IPv6 which can accommodate the increased demand by providing a much larger
address space IPv6 has 128-bit address space or 4 times more address bits compared to
IPv4's 32-bit address space. This large address space will provide enough address
space for many decades to come.

Page 3/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
4

Q. Sub Answers Marking


No. Q. Scheme
N.

2 Attempt any THREE of the following: 12-


Total
Marks

a) Name the components of data communication system . State the function of each 4M
component.

Ans: Following are the building blocks (components) of Data Communication System: 2M
1. Message:The message is the information (data) to be communicated. Popular forms
Explana
of information include text, numbers, pictures, audio, and video.
tion
2. Sender:The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
3. Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, etc
4. Transmission medium: the transmission medium is the physical path by which a
message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fibre-optic cable, and radio waves.

5. Protocol: A protocol is a set of rules that governs data communication.

b) Explain the terms Synchronous, and Asynchronous transmission of data with a neat 4M
diagram

Ans: Synchronous Data Transmission: 2M


each for
Synchro
nous &
Asynch
ronous

Page 4/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
5

Fig. : Synchronous Data Transmission Data


Transm
 Synchronous data transmission is a data transfer method in which is a continuous
stream of data signals accompanied by timing signals. ission

 Synchronous transmission needs synchronization between transmitter and receiver in with


order to allow communication between the two. The transmitter and receiver share Diagra
a common clock pulse so as to have synchronization in communication. This means
data will be transmitted between the transmitter and receiver only after a constant time m
interval.
 It allows the transmission of data in the form of frames or blocks. Thus, a huge data
amount can be transmitted between transmitter and receiver once the clock pulse is sent

Asynchronous Data Transmission:

Fig.:Asynchronous Data Transmission

 Asynchronous transmission is a type of serial transmission that follows a non-


synchronized form of communication. Thus start and stop bits are required in order
to intimate the receiver about the beginning and end of the data stream.
 It does not use a clock to synchronize data between the source and destination.
 This transmission method sends one character time. In this method, before the
transmission process begins, each character sends the start bit. After sending the
character, it also sends the stop bit Thus it is also known as start stop transmission

c) State the functions performed by the Network layer and application layer in a TCP/I 4M
protocol.

Ans: Functions of Network Layer: 2M


(i) Subnet Traffic Control: Network layer routers (network layer intermediate systems) can each for
instruct a sending station to "throttle back" its frame transmission when the router's buffer fills Functio

Page 5/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
6

up. ns of
(ii) Logical-physical Address Mapping: It translates logical addresses, or names, into Networ
physical addresses. k Layer
(iii) Subnet Usage Accounting: It has accounting functions to keep track of frames forwarded &
by subnet intermediate systems.
Applica
(iv) Internetworking: One of the main responsibilities of network layer is to provide
tion
internetworking between different networks. It provides logical connection between different
Layer
types of network. It is because of this layer, we can combine various different networks to
form a bigger network.
(v) Logical Addressing: Large number of different networks can be combined together to
from bigger networks or internetwork. In order to identify each device on internetwork
uniquely, network layer defines an addressing scheme. Such an address distinguishes each
device uniquely and universally.
(vi) Routing: When independent networks or links are combined together to create internet
works, multiple routes are possible from source machine to destination machine. The network
layer protocols determine which route or path is best from source to destination. This function
of network layer is known as routing. Routes frames among networks.
(vii) Packetizing: The network layer receives the data from the upper layers and creates its
own packets by encapsulating these packets. The process is known as packetizing. This
packetizing in done by Internet Protocol (IP) that defines its own packet format.
(viii) Fragmentation: Fragmentation means dividing the larger packets into small fragments.
The maximum size for a transportable packet in defined by physical layer protocol. For this,
network layer divides the large packets into fragments so that they can be easily sent on the
physical medium. If it determines that a downstream router's maximum transmission unit
(MTU) size is less than the frame size, a router can fragment a frame for transmission and
reassembly at the destination station.

Functions Application Layer:


(i) Network Virtual Terminal: It allows a user to log on to a remote host.
(ii) File Transfer, Access and Management (FTAM): This application allows a user to
access files in remote computer (to make changes or read data), to retrieve files from a remote
computer, and to manage or control files in a remote computer.

Page 6/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
7

(iii) Mail Service: This application provides the basis for e-mail forwarding and storage.
(iv) Remote Logins: This layer allows logging into a host which is remote.
(v) Network Abstraction: Provides an abstraction of the underlying network to an end user
and an application.
(vi) Directory Services: This application provides distributed database sources and access for
global information about various objects and services.

d) Explain checksum error detection mechanism with a suitable example. 4M

Ans: Checksum: 2M
Explan
[Link] is an error-detecting technique in data communication that can be applied to a
message of any length. In the Internet, this technique is mostly used at the network and ation
transport layer rather than the data link layer. and
[Link] checksum error detection scheme, the data is divided into k segments each of m bits. In the 2M
sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum Examp
is complemented to get the checksum.
[Link] checksum segment is sent along with the data segments. At the receiver’s end, all le
received segments are added using 1’s complement arithmetic to get the sum. The sum is
complemented. If the result is zero, the received data is accepted; otherwise discarded.

Page 7/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
8

Q. Sub Answers Marking


No. Q. N. Scheme

a) Name the layer of the OSI model that perform the following functions 4M
i) Bitrate control
ii) Framing
iii) Logical Addressing
iv) Encryption / Decryption

Ans: i) Bitrate control : Physical layer 1M For


ii) Framing : data link layer each
iii) Logical Addressing : network layer correct
iv) Encryption / Decryption : presentation layer answer

b) Calculate the CRC for the frame of data to be transmitted in 100100 and the generator 4M
3 2
polynomial is x + x + 1. Generate the Codeword for the transmitted frame.

Correc
t
divisor
1M &
Correc
t
calcula
tion of
CRC
code
word is
3M

Page 8/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
9

c) On which layer of the O.S.I. model do the following devices work. 4M

i) Bridge
ii) Routes
iii) Gateway
iv) Hub

Ans: i) Bridge: A bridge operates at the data link layer. 1M


ii) Routes : The router is mainly a Network Layer device. For
iii) Gateway : it can operate at any network layer each
iv) Hub : A hub operates at the physical layer

d) Compare classless and classful addressing. State the disadvantages of classful addressing. 4M

Ans: Difference between Classful Addressing and Classless Addressing Any 3


valid
Sr. differe
No. Parameter Classful Addressing Classless Addressing
nces
3M
Classless addressing
came to replace the
classful addressing and 1M for
In Classful addressing IP to handle the issue of any
addresses are allocated rapid exhaustion of IP
1. Basics according to the classes- A to E. addresses. one
valid
2. Practical It is less practical. It is more practical. disadv
antage
The changes in the Network ID There is no such
Network ID and Host and Host ID depend on the restriction of class in
3. ID class. classless addressing.

Page 9/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
10

It supports the Variable


It does not support the Variable Length Subnet Mask
4. VLSM Length Subnet Mask (VLSM). (VLSM).

Classful addressing requires It requires less


more bandwidth. As a result, it bandwidth. Thus, fast and
becomes slower and more less expensive as
expensive as compared to compared to classful
5. Bandwidth classless addressing. addressing.

It supports Classless
It does not support Classless Inter-Domain Routing
6. CIDR Inter-Domain Routing (CIDR). (CIDR).

7. Updates Regular or periodic updates Triggered Updates

Troubleshooting and problem


detection are easy than classless
addressing because of the
Troubleshooting and division of network, host and It is not as easy compared
8. Problem detection subnet parts in the address. to classful addressing.

 Network
 Host  Host
9. Division of Address  Subnet  Subnet

Disadvantage of Classful Addressing:


1. Class A with a mask of [Link] can support 128 Network, 16,777,216 addresses per
network and a total of 2,147,483,648 addresses.
2. Class B with a mask of [Link] can support 16,384 Network, 65,536 addresses per
network and a total of 1,073,741,824 addresses.
3. Class C with a mask of [Link] can support 2,097,152 Network, 256 addresses per
network and a total of 536,870,912 addresses.

Page 10/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
11

Q. Sub Answers Marking


No. Q. N. Scheme

4 Attempt any THREE of the following: 12-


Total
Marks

(a) Explain the principle of working of TDM with suitable diagram 4M

Time Division Multiplexing (TDM): 2M


[Link] Time-division multiplexing all signals operate with same frequency at different times. Diagra
[Link] is the digital multiplexing technique. In TDM, the channel/link is not divided on the m and
basis of frequency but on the basis of time. Total time available in the channel is divided 2M
between several users.
Explan
[Link] user is allotted a particular a time interval called time slot or time slice during which the
ation
data is transmitted by that user. Thus each sending device takes control of entire bandwidth of
the channel for fixed amount of time. In TDM the data rate capacity of the transmission
medium should be greater than the data rate required by sending or receiving devices.
4. In TDM all the signals to be transmitted are not transmitted simultaneously. Instead, they are
transmitted one-by-one. Thus, each signal will be transmitted for a very short time. One cycle or
frame is said to be complete when all the signals are transmitted once on the transmission
channel.
[Link] TDM system can be used to multiplex analog or digital signals, however it is more
suitable for the digital signal multiplexing. The TDM signal in the form of frames is transmitted
on the common communication medium.

Fig.: Time Division Multiplexing (TDM)

Page 11/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
12

(b) Explain stop and wait protocol used in flow control. 4M

Ans: 1. One bit sliding window uses Stop and Wait protocol for delivery of data frames. 2M
[Link] sender and receiver’s windows size is 1 and the frames are alternately numbered Diagra
[Link] bit sliding window uses Stop and Wait protocol
m&
.[Link] transmit a frame with sequence number and waits for acknowledgment from the
receiver. 2M
[Link] send back an acknowledgement with sequence number. Explan
[Link] sequence number of acknowledgement matches with sequence number of frame.
ation
[Link] transmit the next frame.
[Link] sender re-transmit the previous frame.
[Link] bidirectional protocol.(full duplex communication)

Normal Operation:In normal operation thesender sends a frame and waits for
acknowledgement from receiver .The acknowledgement should be received before the timer for
the frame [Link] sequence number of acknowledgement should match the sequence
number of next frame to be [Link] it matches the next frame is transmitted otherwise
previous frame is transmitted
Lost or Damaged frame :.When the receiver receives a damaged frame it discards it which
means the frame is lost .The receiver remains silent about the lost frame .After the timer
expires for that frame the sender retransmits the same frame .
Lost or Delayed acknowledgement:In case of lost or delayed acknowledgement after the timer
for the frame expires the sender retransmits the frame .The receiver takes care of
discarding duplicate copy

Page 12/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
13

(c) With neat diagram explain the concept of datagram approach of switching. 4M

Ans: Datagram Packet Switching: 2M


Diagra
In a datagram network, each packet is treated independently of all others.
Datagram switching is normally done at the network layer. m
Figure shows how the datagram approach is used to deliver four packets from station A to station &2M
X.
The switches in a datagram network are traditionally referred to as routers. Explan
 In this example, all four packets (or datagrams) belong to the same message, may travel ation
different paths to reach their destination. This is so because the links may be involved in
carrying packets from other sources and do not have the necessary bandwidth available to
carry all the packets from A to X.
 This approach can cause the datagrams of a transmission to arrive at their
destination out of order with different delays between the packets.
 In most protocols, it is the responsibility of an upper-layer protocol to reorder the datagrams
or ask for lost datagrams before passing them on to the application.
 The datagram networks are sometimes referred to as connectionless networks. The term
connectionless here means that the switch (packet switch) does not keep information about
the connection state. There are no setup or teardown phases.
 Datagrams can contain the full destination address rather than using some number
 There is no set up phase required for the datagram circuits. This means that no resources
are consumed.
 If any fault or loss occurs on a communication line, the datagrams circuits are capable of
compensating for it.

Fig.: Datagram Packet Switching

Page 13/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
14

(d) Explain the concept of FTP with neat diagram. 4M

Ans: FTP (File Transfer Protocol) :FTP is a standard mechanism provided by the Internet for 2M
copying a file from one host to the other It uses the services of TCP Concep
User Interface :Most operating systems provide user interface to to access the services t & 2M
of FTP. The interface prompts user for appropriate input Archite
Control Connection :The well known port 21 is used for control connection . It is
cture
opened once and maintained during entire FTP session
Data Connection :The well known port 20 is used for data connection .The connection can be and
opened and closed multiple times. Diagra
The data connection in FTP means one of the following
m of
1) A file can be copied from server to client under the supervision of RETR command
2) A file is transferred from client to server under the supervision of STOR command FTP
3) A list of directory or filename is sent to the client under the supervision of LIST command
For communication over data connection client must define the type of file , structure of data
and transmission mode
Architecture of FTP:

(e) Compare coaxial cable and twisted pair cable on the basis of- 4M
i) Bandwidth
ii) Electromagnetic interference
iii) Construction
iv) applications

Page 14/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
15

Ans: Parametes coaxial cable Twisted pair cable 1M


each
Bandwidth Bandwidth is high which is Bandwidth is low which is 3
300 to 400 MHz. to 4 MHz. for
correct
Electromagnetic Less affected by EMI and Affected by EMI and noise.
compa
interference noise.
rison

Construction point

applications 1. The use of coaxial cable 1. TP cables are used in


started in analog telephone telephone lines to provide
networks where a single voice and data channels.
coaxial network could carry 2. The line that connects
10,000 voice signals. subscribers to the central
2. Later it was used in digital telephone office is most
telephone networks where a commonly UTP cable.
single coaxial cable could 3. The DSL lines that are
carry digital data up to 600 used by the telephone
Mbps. companies to provide high
3. Most common use is in data rate connections
cable TV. also use high bandwidth
4. Coaxial cabling is often capability UTP cable.
used in heavy industrial 4. Local Area Network
environments where motors
(LAN) also uses twisted-pair
and generators
produce a lot of cable.
electromagnetic interference
(EMI), and where more
expensive fiber-optic
cabling is unnecessary
because of the slow data
rates needed.

Page 15/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
16

Q. Sub Answers Marking


No. Q. N. Scheme

5. Attempt any TWO of the following: 12-


Total
Marks

a) Draw a diagram and describe the following topologies stating their applications. 6M
i) Hybrid
ii) Bus

Ans: Figure Illustrate the diagram for following topologies 3M

Hybrid Topology
 A hybrid topology is a kind of network topology that is a combination of two or more
network topologies, such as Mesh topology, Bus topology, and Ring topology.
 Its usage and choice are dependent on its deployments and requirements like the
performance of the desired network, and the number of computers, their locations
 This topology presents a blend of characteristics of all basic types. In this type,
whole Computer Network is divided into Network Segments. Each Network
Segments connects with Network Backbone

Diagra
m 1m

explain
ation

Page 16/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
17

Application of Hybrid Topology 1M


 Automated Industry
1M for
 Banks
 Multi National Offices any 2
 Educational Institute applica
 Research Organization tion of
each
Bus Topology
topolog
 Computers and peripherals are called nodes and are each connected to a single cable on
which data can be sent. y
 A bus network topology has a terminator on each end. These are needed to ensure that
the network functions correctly.

Bus Topology Application

 A bus topology is used to connect two floors using a single line.


 A bus topology is used by an Ethernet network
 In this type of network topology, one computer works like a server whereas the other
works as a client.
 The main function of the server is to exchange information between different client
computers.
 Bus topology network is used to add the printers, I/O devices in the offices or home.

b) Draw the seven layered architecture of the OSI model and explain. 6M

Page 17/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
18

Ans:

2M for
diagra
m

The working of the 7 Layers of the OSI Model are as following

Physical Layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It Provides physical interface for transmission of information. . It Defines rules by
which bits are passed from one system to another on a physical communication medium.
It Covers all -mechanical, electrical, functional and procedural -aspects for physical 4m for

Page 18/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
19

communication. Explai
n-ation
Data Link Layer: The data link layer is responsible for moving frames from one hop (node) to
the next. It Breaks the outgoing data into frames and re-assemble the received frames. It Handle
errors by implementing an acknowledgement and retransmission scheme.
Network Layer: The network layer is responsible for receiving frames from the data link layer,
and delivering them to their intended destinations among based on the addresses contained
inside the frame. The network layer finds the destination by using logical addresses, such as IP
(internet protocol). At this layer, routers are a important component used to route information
where it needs to go between networks.
Transport Layer: The transport layer manages the delivery and error checking of data packets.
It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts.
One of the most common examples of the transport layer is TCP or the Transmission Control
Protocol.
Session Layer: The session layer controls the conversations between different computers. A
session or connection between devices is set up, managed, and terminated at layer 5. Session
layer services also include authentication and reconnections.
Presentation Layer: The presentation layer formats or translates data for the application layer
based on the syntax or semantics that the application accepts. Because of this, it at times also
called the syntax layer. This layer can also handle the encryption and decryption required by the
application layer.
Application Layer: The application layer is used by end-user software such as web browsers
and email clients. It provides protocols that allow software to send and receive information and
present meaningful data to users. A few examples of application layer protocols are
the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol
(POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS).
c) Draw the labeled construction of Fibre optic cable. State four advantages compared to 6M
copper cables.

Ans: Figure shows the labeled diagram for Fiber Optic Cable 2M for
Diagra
m

Page 19/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
20

1M
each
for any
4
applica
tions
)

Advantages of fibre optic cable over copper cables

 These are not affected by electromagnetic interference, so noise and distortion is very
less.
 Optical fiber cable are often made cheaper than equivalent lengths of copper wire.
 Used for both analog and digital signals
 Highly secured
 Provides high quality transmission of signals at very high speed (bandwidth 2 Gbps
 Smaller size and light weight
 Less power loss and allows data transmission for extended distances
 Bandwidth is high

Q. Sub Answers Marking


No. Q. N. Scheme

6. Attempt any TWO of the following : 12-


Total
Marks

a) Draw and describe architecture for a network using star topology to establish a 6M

Page 20/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
21

laboratory with 10 computers

Ans: The architecture for a network using star topology is as shown in the figure

3M for
Diagra
m

3 M for
descrip
tion

 A star topology is a topology where every node in the network is connected to one
central switch. Every device in the network is directly connected to the switch and
indirectly connected to every other node.
 The relationship between these elements is that the central network hub is a server and
other devices are treated as clients.
 The central node has the responsibility of managing data transmissions across the whole
network and acts as a repeater.
 With star topologies, computers are connected with a coaxial cable, twisted pair, or

Page 21/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
22

optical fiber cable.


 In terms of physical network structure, star topologies require fewer cables than other
topology types. This makes them simple to set up and manage over the long-term.
 The simplicity of the overall network design makes it much easier for administrators to
run troubleshooting when dealing with network performance faults.
b) With suitable diagram explain selective repeat ARQ protocol 6M

Ans: Selective Repeat ARQ

In this method the size of sender and receiver window is same
In selective repeat ARQ only damaged frames are resent
This method uses negative acknowledgement to report sequence number of damaged frame 3M for
before timer expires Diagra
Selective repeat uses both positive and negative acknowledgement m

Normal Operation : Frames 0 and 1 are accepted when received because they are in the
receiver window [Link] sender’s window shifts toward right and transmits frames 2 and 3
.The receiver accepts frame 3 as it is in receiver’s window . The receiver sends NAK2 to show
that frame 2 is lost .The sender then sends only frame 2
Lost and delayed acknowledgement and NAK (Negative Acknowledgement)
If the window capacity is reached and acknowledgements are not received because of delay or
loss within the time period the sender retransmits every frame in the window Similarly if NAK
are lost or delayed the sender retransmits all the frames after last acknowledged frame

Page 22/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
23

3M on
explain
ation

c) Draw the block diagram of Symmetric Key Cryptography and state the function of 6M
various components. Compare symmetric and Asymmetric Key Cryptography

Ans: Figure illustrating the block diagram of Symmetric Key Cryptography 2M for
Symmetric key encryption also termed as shared -key ,single-key, secret-key in this type both diagra
the sender and receiver share same key which is used to both encrypt and decrypt messages
mm
There are five main components of a symmetric cryptography system: plaintext, encryption
algorithm, secret key, ciphertext, and the decryption algorithm. 2M for
Explai
nation

2 M for
any 2
valid
points
of

Page 23/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
24

compa
rison

1. Plaintext
The term plaintext refers to the original message to be sent for encryption . Here the original
message, referred to as plaintext, is converted into apparently random nonsense, referred to as
cipher text. The security depends on several factor.
2. Encryption Algorithm
The encryption algorithm takes the plaintext and converts it into an unreadable format. The
encryption process s consists of an algorithm and a key. The key is a value independent of the
plaintext. Changing the key changes the output of the algorithm. Once the cipher text is
produced, it may be.
3. Key
Think of the key as a decoder ring: the secret of the scrambled text cannot be read without the
key. The key holds the information on all the switches and substitutions made to the original
plain text.
In symmetric encryption, the key is actually bundled with the algorithm; in this sense, the
decoder ring is not universal. The changes and substitutions depend on the key, and vice versa
because the sender and recipient share the key.
4. Ciphertext
The ciphertext is the text that is now scrambled and ready to be sent. It may look like a random
stream of data, and is unreadable.
5. Decryption Algorithm
In the decryption algorithm, the secret key is applied to the ciphertext. It converts it back to
plaintext, basically performing the encryption in reverse. .. Upon reception, the cipher text can

Page 24/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)

WINTER – 2022 EXAMINATION


Subject Name: Computer Networking and Data Comm. Subject Code: 22634
Model Answer
25

be transformed back to the original plaintext by using a decryption algorithm and the same key
that was used for encryption.
Comparison of Symmetric and Asymmetric Key Cryptography is given as

Page 25/
22634
21222
3 Hours / 70 Marks Seat No.
15 minutes extra for each hour

Instructions – (1) All Questions are Compulsory.


(2) Answer each next main Question on new page.
(3) Illustrate your answers with neat sketches wherever
necessary.
(4) Figures to the right indicate full marks.
(5) Assume suitable data, if necessary.
(6) Mobile Phone, Pager and any other Electronic
Communication devices are not permissible in
Examination Hall.

Marks

1. Attempt any FIVE of the following: 10


a) Define following terms:
i) bit rate
ii) baud rate
b) Classify networks on the basis of transmission technologies.
c) Compare TCP/IP and OSI reference model (any two points)
d) Name the layer of the OSI model at which the mechanical,
electrical, functional and procedural characteristics are defined.
State its function.
e) State two advantages of coaxial cable.
f) List four network connecting devices.
g) State the need for IPv6.

P.T.O.
22634 [2]
Marks
2. Attempt any THREE of the following: 12
a) Draw the block diagram of data communication system and
state the function of each block.
b) Compare Peer-to-Peer and Client - Server architecture on the
basis of -
i) Cost
ii) Performance
iii) Backup
iv) Security
c) Explain different functions of datalink layer of OSI reference
model.
d) Describe hamming code error correction technique with the
help of example.

3. Attempt any THREE of the following: 12


a) State the names of the layers that perform the following
functions –
i) Data Encryption
ii) File transfer
iii) Error Correction
iv) Data Encoding
b) Summarize the frame format of PPP protocol.
c) Draw a diagram to establish a network for a computer
laboratory with 5 computers having internet facility using
the following devices.
i) Switch
ii) Router
d) Compare TPv4 and IPv6 on the basis of –
i) Address Length
ii) Packet Size
iii) Configuration
iv) IP Security
22634 [3]
Marks
4. Attempt any THREE of the following: 12
a) State the need of multiplexing and switching. Summarize
the situations for the implementations of TDM, FDM, Circuit
Switched Network & Packet Switched Network.
b) Explain a one bit sliding window protocol under normal
condition and with damaged frame with suitable diagram.
c) Draw structural diagram of fiber optic cable and write its
functions.
d) On which layer of OSI reference model following protocol
works –
i) UDP
ii) IP
iii) FTP
iv) SCTP
e) Explain datagram approach for packet switching.

5. Attempt any TWO of the following: 12


a) With a suitable diagram, explain the following topologies.
i) Bus topology
ii) Ring topology
b) Draw layered architecture of the OSI model. State the
functions of various layers.
c) Explain microwave transmission with its advantages and
disadvantages.

6. Attempt any TWO of the following: 12


a) Draw and explain architecture for network using tree topology
for an office in 3 - Storey building.
b) Explain stop and wait ARQ with example.
c) Explain the addressing scheme in IPv4 and IPv6, when IPv6
protocol is introduced, does the ARP protocol have to be
changed? Explain in details.
22634
22223
3 Hours / 70 Marks Seat No.

Instructions – (1) All Questions are Compulsory.


(2) Answer each next main Question on a new page.
(3) Illustrate your answers with neat sketches wherever
necessary.
(4) Figures to the right indicate full marks.
(5) Assume suitable data, if necessary.
(6) Mobile Phone, Pager and any other Electronic
Communication devices are not permissible in
Examination Hall.
Marks

1. Attempt any FIVE of the following: 10


a) State two advantages of computer networks.
b) Draw labelled frame format of serial and parallel data
transmission.
c) List two unguided media.
d) State any two functions of network layer in TCP/IP reference
model.
e) State two functions of firewall.
f) State need of IPv6.
g) State two functions of data link layer of TCP/IP reference
model.

P.T.O.
22634 [2]
Marks
2. Attempt any THREE of the following: 12
a) Explain with neat labelled diagram the working of star
topology. State its any two advantages.
b) Draw the block diagram of data communication and state the
function of each block.
c) Compare between OSI model and TCP/IP protocol model.
d) Generate CRC code for the data word of 100101011. The
divisor is 10101.

3. Attempt any THREE of the following: 12


a) Explain four level addressing used in TCP/IP reference model.
b) Describe transition phase of PPP.
c) Find the sub network address and host id of
IP address Mask
i) [Link] [Link]
ii) [Link] [Link]
d) Describe the concept of File Transfer Protocol (FTP) with neat
diagram.

4. Attempt any THREE of the following: 12


a) Compare FDM and TDM with respect to
i) Synchronisation
ii) Working principle
iii) Cross talk
iv) Efficiency
b) Explain stop and wait protocol under noisy condition.
c) Describe the different modes of light propagation in fiber optic
cable with diagram.
d) On which layer the following devices work
i) Hub
ii) Switch
iii) Router
iv) Repeater
e) Explain virtual circuit approach for switching.
22634 [3]
Marks
5. Attempt any TWO of the following: 12
a) Explain peer to peer and client server architecture with suitable
example.
b) Draw layered architecture of the OSI model. State functions of
various layers.
c) Classify MODEMS. State one feature of each type of MODEM.

6. Attempt any TWO of the following: 12


a) Suggest the topology for millitary application with justification.
Give advantages and disadvantages of that topology.
b) i) State the types of error detection methods. 2
ii) In a particular data transmission system, the data 4
received was 1011010 using 7 bit odd parity hamming
code, determine the correct code.
c) Draw block diagram of asymmetric key cryptography and
state the function of various components.
22634
23124
3 Hours / 70 Marks Seat No.

Instructions – (1) All Questions are Compulsory.


(2) Answer each next main Question on a new page.
(3) Illustrate your answers with neat sketches wherever
necessary.
(4) Figures to the right indicate full marks.
(5) Assume suitable data, if necessary.
(6) Mobile Phone, Pager and any other Electronic
Communication devices are not permissible in
Examination Hall.
Marks

1. Attempt any FIVE of the following: 10


a) Define bit rate and baud rate.
b) State two advantages of computer networks.
c) State any two functions of data link layer in TCP/IP protocol
suite.
d) Compare TCP / IP and OSI reference model. (Any two points)
e) State the application of microwave transmission.
f) List four network connecting devices.
g) State the need for IPv6.

P.T.O.
22634 [2]
Marks
2. Attempt any THREE of the following: 12
a) Draw the block diagram of data communication system and
state the function of each block.
b) Compare LAN and WAN on the basis of following parameters.
i) Geographical area
ii) Bandwidth
iii) Communication medium
iv) Installation cost
c) Explain port addressing and application specific addressing in
TCP / IP reference model.
d) Draw and explain the frame format of point-to-point protocol.

3. Attempt any THREE of the following: 12


a) State the names of the layers that perform the following
functions -
i) Encryption / Decryption
ii) Logical Addressing
iii) File transfer
iv) Error Correction
b) Generate the CRC code for the dataword of 111011001. The
divisor is 10101.
c) Draw a diagram to establish a network for a computer
laboratory with 6 computers having internet facility using
the following devices.
i) Switch
ii) Router
d) Explain the concept of FTP with neat diagram.
22634 [3]
Marks
4. Attempt any THREE of the following: 12
a) With the help of block diagram, explain the working principle
of FDM.
b) A bit word 1011 is to be transmitted. Construct the even
parity 7-bit Hamming code for this data.
c) Compare coaxial cable and twisted pair cable.
d) On which layer the following devices work.
i) Bridge
ii) Hub
iii) Switch
iv) Router
e) Explain the concept of datagram packet switching with neat
diagram.

5. Attempt any TWO of the following: 12


a) Explain with diagram the process of client-server and
peer to peer network architecture.
b) Describe the functions of
i) Transport layer
ii) Network layer of OSI model
c) Draw the labelled construction of Fibre optic cable. State four
advantages compared to copper cables.

6. Attempt any TWO of the following: 12


a) With suitable diagram explain the following topologies.
i) Bus Topology
ii) Star Topology
b) Explain one-bit sliding window protocol with example.
c) Draw the block diagram of Symmetric Key Cryptography and
state the function of various components. Compare symmetric
and Asymmetric Key Cryptography.
Scheme – I
Sample Test Paper - I

Program Name : Electronics Engineering Group


Program Code : DE/ EJ/ET/EX/EQ 22634
Semester : SIXTH
Course Title : Computer Networking and Data Communication 3
Marks : 20 Time:1 Hour

Instructions:
(1) All questions are compulsory.
(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data if necessary.
(5) Preferably, write the answers in sequential order.

Q.1 Attempt any FOUR. (08 Marks)


a) Draw block diagram of data communication
b) State two advantages of computer networks.
c) List functions of Transport layer of ISO-OSI Network Model.
d) State the need for multiplexing.
e) Draw labeled construction of fiber optic cable.

Q.2 Attempt any THREE. (12 Marks)


a) Suggest network topologies for the following applications with proper justification
of parameters considered:
i) E-library having 10 computers.
ii) Administrative office with five computers.

b) Describe the four levels of addresses used in TCP/IP protocol

c) Compare FDM and TDM on the basis of


i) Bandwidth utillization
ii) Channel capacity
iii) Error control
iv) Transmission delay

d) Enlist protocols with one application for following layers:


i) Physical Layer
ii) Transport Layer.
Scheme – I
Sample Test Paper - II

Program Name : Electronics Engineering Group


Program Code : DE/ EJ/ET/EX/EQ 22634
Semester : SIXTH
Course Title : Computer Networking and Data Communication 3
Marks : 20 Time:1 Hour

Instructions:
All questions are compulsory.
(1) Illustrate your answers with neat sketches wherever necessary.
(2) Figures to the right indicate full marks.
(3) Assume suitable data if necessary.
(4) Preferably, write the answers in sequential order.

Q.1 Attempt any FOUR. (08 Marks )


(a) List two Unguided Transmission Media.
(b) Define Error control and Flow control.
(c) State functions performed by Gateway and Repeater.
(d) Give the names of the layer where the following protocols are related to:
i) UDP ii) FTP
(e) Explain role ofNAT in network layer.

Q.2 Attempt any THREE. (12Marks)


(a) Compare circuit switching and packet switching on the basis of
i) Transmission Path ii)Routing iii) Information type iv) Applications.
(b) Explain the process of single bit error [Link] suitable example
(c) Explain the frame format of Point to Point Protocol
(d) Define Cryptography .Explain the components of Cryptography.
Scheme – I
Sample Question Paper

Program Name :Electronics Engineering Group


Program Code : DE/ EJ/ET/EX/EQ 22634
Semester :SIXITH
Course Title : Computer Networking and Data Communication
Marks :70 Time:3Hours.

Instructions:
(1) All questions are compulsory.
(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data if necessary.
(5) Preferably, write the answers in sequential order.
Q.1) Attempt any FIVE of the following: - ( 10 Marks)
(a) Draw labeled frame format of Serial and Parallel data transmission method.
(b) Classify networks on the basis of architecture.
(c) State two functions of the data link layer of TCP/IP reference model.
(d) Name the layer of the OSI model at which the mechanical, electrical, functional and
procedural characteristics are defined. State its function.
(e) State two limitations of twisted pair cable.
(f) List four network connecting devices.
(g) State two basic functions of Firewall.

Q.2) Attempt any THREE of the following: - (12 Marks)


(a) Draw the block diagram of data communication system and state the function of each
block.
(b) Compare LAN and WAN on the basis of following parameters.
i) Geographical area ii) Speed iii) Installation Cost iv) Communication medium
(c) The following diagram illustrates simple network architecture. It describes a layered
model of a communication system used for transferring files between computers over a
network
File Transfer Protocol

Transport Layer

Network Access layer

i) State the tasks performed by the transport layer


ii) State the function of Network access layer
(d) In a particular data transmission system, the data received was 1 0 1 1 0 1 0. Using 7 bit
odd parity hamming code, determine the correct code
Q.3) Attempt any THREE of the following. (12 Marks)
(a) State the names of the layers that perform the following functions:
i) Data Encryption ii) Error correction iii) Filetransfer iv) Data Encoding
(b) Calculate CRC for the frame 110101011 and the generator polynomial is
x4+x+[Link] the codeword for the transmitted frame
(c) Draw a diagram to establish a network for a computer laboratory with 5 computers
having internet facility using the following devices
i) Switch ii) Router
(d) Compare IPv4 and IPv6 on the basis of
i) Address length ii) Packet size iii) Configuration iv) IPSecurity

Q.4) Attempt any THREE of the following. (12 Marks)


(a) Compare transmission medium on the basis of
i) Bandwidth ii) Attenuation iii) Ease of Installation iv) Electromagnetic interference
(b) Describe a One bit sliding window protocol under normal condition and with damaged
frame with suitable diagram.
(c) Describe the different modes of light propagation in a fibre optic cable with diagram.
(d) On which layer do the following devices work:.
i) Hub ii) Switch iii) Router iv) Repeater
(e) Explain principle of Frequency Division Multiplexing with block diagram .

Q.5) Attempt any TWO of the following. (12 Marks)


(a) With a suitable diagram, describe the following topologies.
i) Star topology ii) Mesh topology
(b) Draw the 7 layered architecture of the OSI model. State the function of various layers
(c) Classify modems. State two features of each type of modem.

Q.6) Attempt any TWO of the following. (12 Marks)


(a) Draw and describe architecture for network using tree topology for an office in 3-storey
building
(b) Describe transition phase of PPP.
(c) Draw the block diagram of Asymmetric Key Cryptography and state the function of
various components.

You might also like