Ilovepdf
Ilovepdf
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) bit rate
ii) baud rate
Page 1/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(c) Compare TCP/IP and OSI reference model (any two points). 2M
Page 2/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(d) Name the layer of the OSI model at which the mechanical, electrical , functional and 2M
procedural characteristics are defined. State its function.
Ans: Physical layer of the OSI model at which the mechanical, electrical , functional and Name of
procedural characteristics are defined. layer
1m
Functions of the physical layer are
Any two
1. It defines the physical characteristics and functions of the physical devices and function
interfaces so that transmission can occur. 1M
2. It defines the procedure of encoding of the bits.
3. It states the data transmission rate and the duration of a bit.
4. It defines the topology.
5. It also states the direction of transmission.
Page 3/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
The primary function of IPv6 is to allow for more unique TCP/IP address identifiers to
be created, now that we’ve run out of the 4.3 billion created with IPv4. This is one of the
main reasons why IPv6 is such an important innovation for the Internet of Things (IoT).
Internet-connected products are becoming increasingly popular, and while IPv4
addresses couldn’t meet the demand for IoT products, IPv6 gives IoT products a
platform to operate on for a very long time.
Page 4/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
N. Scheme
a) Draw the block diagram of data communication system and state the function of each 4M
block.
Ans: 1.5M
for
block
diagram
and 1/2
M for
each
Block diagram of data communication system
function
Function of each block.
Page 5/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) Cost
ii) Performance
iii) Backup
iv) Security
Page 6/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
d) Describe hamming code error correction technique with the help of example. 4M
Page 7/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page 8/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page 9/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) State the names of the layers that perform the following functions – 4M
i) Data Encryption
ii) File transfer
iii) Error Correction
iv) Data Encoding
Page 10/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1. Flag Field (1 Byte): The flag field identifies the boundaries of PPP frame i.e. each
frame begins and ends with flag field. This field is 1 byte in length.
2. Address Field (1 Byte): This field contains a value indicating that the packet is
addressed to all recipients. Address field indicates the address of destination. Address
field is 1 byte (8 bits).
When the address field contains all 1’s i.e. 11111111, this indicates that all stations are to
accept the frames (broadcast).
[Link] Field (1 Byte): PPP normally runs in connectionless mode therefore control
field is set to 11000000. This indicates unnumbered frames i.e. frame does not contain
sequence numbers and there is no flow or error control.
4. Protocol Field (2 Bytes): Protocol field defines the information of data field. The
protocol field is 1 or 2 byte long.
5. Data Field: The data field contains the actual data to transmit, plus padding if
necessary. The length of this field is variable.
6. Frame Check Sequence (FCS): The FCS field is 24 byte long and contains CRC code.
It checks length of all fields in frame.
Page 11/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) Switch
ii) Router
Ans: 4M for
correct
diagram
i) Address
ii) Packet Size
Page 12/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
iii) Configuration
iv) IP Security
OR OR
OR OR
Page 13/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(a) State the need of multiplexing and switching. Summarize the situations for the 4M
implementations of TDM, FDM, Circuit Switched Network & Packet Switched Network.
Page 14/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
connectivity as and when required. Once a connection has been made, information can
be sent and received
(1/2M)
TDM is implemented in
each for
Satellite Communication system.
any one
Cellular Radio.
implent
Public Switched Telephone Network or PSTN system.
ation/ap
digital audio mixing system.
plicatio
Pulse Code Modulation (PCM) transmission system. n of
FDM is implemented in TDM,F
Television and Radio Broadcasting. DM,
Satellite Communication system. Circuit
First generation cellular systems switchin
Analog telephone systems g,
Circuit switching is implemented in Packet
Analog telephone network switchin
Optical mesh network g
Public Switched Telephone Network (PSTN)
Any
ISDN is a circuit switched telephone network
other
Packet switching is implemented in
valid
Internet and most local area networks.
applicat
Ethernet and frame relay
ion
Newer mobile phone technologies (e.g., GSM, LTE)
should
Wide Area Network (WAN) protocols be
consider
ed
(b) Explain a one bit sliding window protocol under normal condition and with damaged 4M
Page 15/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: 1. One bit sliding window protocol is used for delivery of data frames.
2. The sender and receiver’s windows size is 1. (2m)
3. One bit sliding window protocol uses Stop and Wait concept.
Diagra
4. Its bidirectional protocol. (full duplex communication)
m
OR
Page 16/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(1M)
Normal Operation : In normal operation the sender sends a frame and waits for Normal
acknowledgement from receiver .The acknowledgement should be received operatio
before the timer for the frame expires. The sequence
of n number
acknowledgement should match the sequence number of next frame to be
transmitted .If it matches the next frame is transmitted otherwise previous frame
is transmitted (1M)
Damaged frame : .When the receiver receives a damaged frame it discards it Damage
which means the frame is lost .The receiver remains silent about the lost frame d frame
.After the timer expires for that frame the sender retransmits the same frame .
(c) Draw structural diagram of fiber optic cable and write its functions. 4M
Page 17/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans:
2M
diagram
(2M)
explaina
tion
Core − The core is innermost part of fibre optic cable . It is made up of glass or
plastic
Function : The core has a higher refractive index w.r.t cladding. This ensures that
light is confined within the core and propagates by total internal reflection.
Page 18/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Function :
1) It prevents light rays from outside to enter the optical fiber.
2) prevents the fibers from physical damage.
3) It adds strength to the fiber.
i) UDP
ii) IP
iii) FTP
iv) SCTP
Page 19/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans:
2M for
Diagra
m
Page 20/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Datagrams can contain the full destination address rather than using some
number.
There is no set up phase required for the datagram circuits. This means that no
resources are consumed.
If any fault or loss occurs on a communication line, the datagrams circuits are
capable of compensating for it.
i) Bus topology
ii) Ring topology
In networking, a topology that allows all network nodes to receive the same message 1M
through the network cable at the same time is called as bus topology. Diagra
m of
In this type of network topology, all the nodes of a network are connected to a common
Bus
transmission medium having two endpoints.
topology
All the data that travels over the network is transmitted through a common
Page 21/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
transmission medium known as the bus or the backbone of the network. and 2M
explanat
Working of Bus Topology:
ion
Fig. shows bus topology. The central cable is the backbone of the network and is known
as Bus (thus the name). Every workstation or node communicates with the other device
through this Bus.
A signal from the source is broadcasted and it travels to all workstations connected to
bus cable. Although the message is broadcasted but only the intended recipient, whose
MAC address or IP address matches, accepts it.
If the MAC/IP address of machine does not match with the intended address, machine
discards the signal. A terminator is added at ends of the central cable, to prevent
bouncing of signals. A barrel connector can be used to extend it.
[Link] Topology:
Ring topology is a network topology that is set-up in circular fashion. The data and the
signals that pass over the network travel in a single direction. It is called ring topology
because it forms a ring as each computer is connected to another computer, with the last
one connected to the first. Exactly two neighbors for each device.
Each node in this topology contains repeater. A signal passes node to node, until it
reaches its destination. If a node receives a signal intended for another node its repeater
Page 22/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Token is a special three byte frame that travels around the ring network. It can flow
clockwise or anticlockwise. Ring topology is a point to point network.
A number of repeaters are used for Ring topology with large number of nodes, because
if someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to
prevent data loss repeaters are used in the network.
Fig. shows a ring topology. The token travels along the ring until it reaches its
destination. Once, token reaches destination, receiving computer acknowledges receipt
with a return message to the sender. The sender then releases the token for the token for
use by another computer.
1M
Diagra
m of
Ring
topology
and 2M
explanat
ion
Page 23/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b) Draw layered architecture of the OSI model. State the functions of various layers. 6M
Page 24/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
error free from one node to another, over the physical layer.
this layer.
Page 25/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3. It receives messages from the Session layer above it, convert the
network requirements.
Transport layer breaks the message (data) into small units so that they
ends of the messages are not cut prematurely and data loss is
avoided.
Page 26/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1. Presentation Layer takes care that the data is sent in such a way
that the receiver will understand the information (data) and will
translator.
etc.
Ans: Electromagnetic waves having frequencies between 1 and 300 GHz are called 3M for
diagram
Page 27/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
• Electromagnetic radiation beyond the frequency range of radio and television can be
used to transport information. Microwave transmission is usually point-to-point using
directional antennae with a clear path between transmitter and receiver.
Fig. shows typical example of microwave link using dish antenna and satellite.
• A parabolic dish antenna can be used to focus the transmitted power into a narrow
beam to give a high signal to noise ratio, and before the advent of optical fiber, some
long distance telephone transmission systems were heavily dependent on the use of a
series of microwave towers.
Because microwaves travel in a straight line, the curvature of the earth limits the
maximum distance over which microwave towers can transmit, so repeaters are needed
to compensate for this limitation.
Page 28/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Typically the line of sight due to the Earth's curvature is only 50 km to the horizon.
Repeater stations must be placed so the data signal can hop, skip and jump across the
country.
Advantages of Microwave:
2. They can carry high quantities of information due to their high operating frequencies.
Page 29/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Disadvantages of Microwave:
There are two types of microwave data communication systems namely, Terrestrial
Microwave Transmission and Satellite Microwave Transmission.
• Terrestrial microwave systems typically use directional parabolic antennas to send and
receive signals in the lower gigahertz (GHz) range.
• The signals are highly focused and the physical path must be line-of-sight. Relay
towers are used to extend signals. Terrestrial microwave systems are typically used
when using cabling is costprohibitive.
Advantages:
Page 30/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Disadvantages:
1. Attenuation.
• In satellite microwave, the signals are transmitted from a ground station to a satellite
and then after amplifying, from the satellite to some other ground station.
Page 31/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
No. N. Scheme
a) Draw and explain architecture for network using tree topology for an office in 3 – Storey 6M
building.
Ans:
3M
diagram
Page 32/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
In this method after sending the data, the sender stops and waits till an
acknowledgment is received from the receiver. It is a data-link layer protocol
In stop and wait ARQ the frames and acknowledgements are alternately
numbered
A frame 0 is acknowledged using ACK1 and frame 1 with ACK0
The acknowledgement number indicates the next expected frame
3M
Page 33/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Diagra
m
3M
explaina
tion
1) Normal Operation : In normal operation the sender sends a frame and waits for
acknowledgement from receiver .The acknowledgement should be received
before the timer for each frame expires
Page 34/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
c) Explain the addressing scheme in IPv4 and IPv6, when IPv6 protocol is introduced, does 6M
the ARP protocol have to be changed? Explain in details.
Ans:
IP address belonging to class B are assigned to the networks that ranges consider
from medium-sized to large-sized networks. ed
Page 35/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Class C:
IP address belonging to class C are assigned to small-sized networks.
The Network ID is 3 byte long and Host ID is 1 byte long
The most significant bits of the class C are always set to 110 The
remaining 21 bits are used to determine network ID.
Class D:
IP address belonging to class D are reserved for multi-casting.
The most significant bits of class D are always set to 1110.
Class E:
IP addresses belonging to class E are reserved for experimental and
research purposes.
The most significant bits of class E are always set to 1111.
Page 36/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page 37/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: bit rate : It is defined as the number of bits transmitted per second. 1M
baud rate : It is defined as the number of signal units per second. each
Page 1/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(d) Name the layer of the OSI model that is responsible for moving of data in and out of 2M
physical link in network. State its functions.
Ans: Physical layer is responsible for moving of data in and out of physical link in network. Name
of
Function of Physical layer
layer
1. It defines the physical characteristics and functions of the physical devices and interfaces 1M
so that transmission can occur.
2. It defines the procedure of encoding of the bits. Any
3. It states the data transmission rate and the duration of a bit.
one
4. It defines the topology.
5. It also states the direction of transmission valid
functi
on 1M
Page 2/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
The Internet has experienced a phenomenal increase of devices accessing the Internet.
Because of this increase, IPv4 addresses are running [Link] model of classful
addressing does not allow the address space to be used to its maximum [Link] solution
is IPv6 which can accommodate the increased demand by providing a much larger
address space IPv6 has 128-bit address space or 4 times more address bits compared to
IPv4's 32-bit address space. This large address space will provide enough address
space for many decades to come.
Page 3/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) Name the components of data communication system . State the function of each 4M
component.
Ans: Following are the building blocks (components) of Data Communication System: 2M
1. Message:The message is the information (data) to be communicated. Popular forms
Explana
of information include text, numbers, pictures, audio, and video.
tion
2. Sender:The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
3. Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, etc
4. Transmission medium: the transmission medium is the physical path by which a
message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fibre-optic cable, and radio waves.
b) Explain the terms Synchronous, and Asynchronous transmission of data with a neat 4M
diagram
Page 4/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
c) State the functions performed by the Network layer and application layer in a TCP/I 4M
protocol.
Page 5/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
up. ns of
(ii) Logical-physical Address Mapping: It translates logical addresses, or names, into Networ
physical addresses. k Layer
(iii) Subnet Usage Accounting: It has accounting functions to keep track of frames forwarded &
by subnet intermediate systems.
Applica
(iv) Internetworking: One of the main responsibilities of network layer is to provide
tion
internetworking between different networks. It provides logical connection between different
Layer
types of network. It is because of this layer, we can combine various different networks to
form a bigger network.
(v) Logical Addressing: Large number of different networks can be combined together to
from bigger networks or internetwork. In order to identify each device on internetwork
uniquely, network layer defines an addressing scheme. Such an address distinguishes each
device uniquely and universally.
(vi) Routing: When independent networks or links are combined together to create internet
works, multiple routes are possible from source machine to destination machine. The network
layer protocols determine which route or path is best from source to destination. This function
of network layer is known as routing. Routes frames among networks.
(vii) Packetizing: The network layer receives the data from the upper layers and creates its
own packets by encapsulating these packets. The process is known as packetizing. This
packetizing in done by Internet Protocol (IP) that defines its own packet format.
(viii) Fragmentation: Fragmentation means dividing the larger packets into small fragments.
The maximum size for a transportable packet in defined by physical layer protocol. For this,
network layer divides the large packets into fragments so that they can be easily sent on the
physical medium. If it determines that a downstream router's maximum transmission unit
(MTU) size is less than the frame size, a router can fragment a frame for transmission and
reassembly at the destination station.
Page 6/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(iii) Mail Service: This application provides the basis for e-mail forwarding and storage.
(iv) Remote Logins: This layer allows logging into a host which is remote.
(v) Network Abstraction: Provides an abstraction of the underlying network to an end user
and an application.
(vi) Directory Services: This application provides distributed database sources and access for
global information about various objects and services.
Ans: Checksum: 2M
Explan
[Link] is an error-detecting technique in data communication that can be applied to a
message of any length. In the Internet, this technique is mostly used at the network and ation
transport layer rather than the data link layer. and
[Link] checksum error detection scheme, the data is divided into k segments each of m bits. In the 2M
sender’s end the segments are added using 1’s complement arithmetic to get the sum. The sum Examp
is complemented to get the checksum.
[Link] checksum segment is sent along with the data segments. At the receiver’s end, all le
received segments are added using 1’s complement arithmetic to get the sum. The sum is
complemented. If the result is zero, the received data is accepted; otherwise discarded.
Page 7/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) Name the layer of the OSI model that perform the following functions 4M
i) Bitrate control
ii) Framing
iii) Logical Addressing
iv) Encryption / Decryption
b) Calculate the CRC for the frame of data to be transmitted in 100100 and the generator 4M
3 2
polynomial is x + x + 1. Generate the Codeword for the transmitted frame.
Correc
t
divisor
1M &
Correc
t
calcula
tion of
CRC
code
word is
3M
Page 8/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) Bridge
ii) Routes
iii) Gateway
iv) Hub
d) Compare classless and classful addressing. State the disadvantages of classful addressing. 4M
Page 9/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It supports Classless
It does not support Classless Inter-Domain Routing
6. CIDR Inter-Domain Routing (CIDR). (CIDR).
Network
Host Host
9. Division of Address Subnet Subnet
Page 10/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Page 11/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: 1. One bit sliding window uses Stop and Wait protocol for delivery of data frames. 2M
[Link] sender and receiver’s windows size is 1 and the frames are alternately numbered Diagra
[Link] bit sliding window uses Stop and Wait protocol
m&
.[Link] transmit a frame with sequence number and waits for acknowledgment from the
receiver. 2M
[Link] send back an acknowledgement with sequence number. Explan
[Link] sequence number of acknowledgement matches with sequence number of frame.
ation
[Link] transmit the next frame.
[Link] sender re-transmit the previous frame.
[Link] bidirectional protocol.(full duplex communication)
Normal Operation:In normal operation thesender sends a frame and waits for
acknowledgement from receiver .The acknowledgement should be received before the timer for
the frame [Link] sequence number of acknowledgement should match the sequence
number of next frame to be [Link] it matches the next frame is transmitted otherwise
previous frame is transmitted
Lost or Damaged frame :.When the receiver receives a damaged frame it discards it which
means the frame is lost .The receiver remains silent about the lost frame .After the timer
expires for that frame the sender retransmits the same frame .
Lost or Delayed acknowledgement:In case of lost or delayed acknowledgement after the timer
for the frame expires the sender retransmits the frame .The receiver takes care of
discarding duplicate copy
Page 12/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(c) With neat diagram explain the concept of datagram approach of switching. 4M
Page 13/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: FTP (File Transfer Protocol) :FTP is a standard mechanism provided by the Internet for 2M
copying a file from one host to the other It uses the services of TCP Concep
User Interface :Most operating systems provide user interface to to access the services t & 2M
of FTP. The interface prompts user for appropriate input Archite
Control Connection :The well known port 21 is used for control connection . It is
cture
opened once and maintained during entire FTP session
Data Connection :The well known port 20 is used for data connection .The connection can be and
opened and closed multiple times. Diagra
The data connection in FTP means one of the following
m of
1) A file can be copied from server to client under the supervision of RETR command
2) A file is transferred from client to server under the supervision of STOR command FTP
3) A list of directory or filename is sent to the client under the supervision of LIST command
For communication over data connection client must define the type of file , structure of data
and transmission mode
Architecture of FTP:
(e) Compare coaxial cable and twisted pair cable on the basis of- 4M
i) Bandwidth
ii) Electromagnetic interference
iii) Construction
iv) applications
Page 14/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Construction point
Page 15/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
a) Draw a diagram and describe the following topologies stating their applications. 6M
i) Hybrid
ii) Bus
Hybrid Topology
A hybrid topology is a kind of network topology that is a combination of two or more
network topologies, such as Mesh topology, Bus topology, and Ring topology.
Its usage and choice are dependent on its deployments and requirements like the
performance of the desired network, and the number of computers, their locations
This topology presents a blend of characteristics of all basic types. In this type,
whole Computer Network is divided into Network Segments. Each Network
Segments connects with Network Backbone
Diagra
m 1m
explain
ation
Page 16/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b) Draw the seven layered architecture of the OSI model and explain. 6M
Page 17/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans:
2M for
diagra
m
Physical Layer: It co-ordinates the functions required to transmit bit stream over physical
medium. It Provides physical interface for transmission of information. . It Defines rules by
which bits are passed from one system to another on a physical communication medium.
It Covers all -mechanical, electrical, functional and procedural -aspects for physical 4m for
Page 18/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
communication. Explai
n-ation
Data Link Layer: The data link layer is responsible for moving frames from one hop (node) to
the next. It Breaks the outgoing data into frames and re-assemble the received frames. It Handle
errors by implementing an acknowledgement and retransmission scheme.
Network Layer: The network layer is responsible for receiving frames from the data link layer,
and delivering them to their intended destinations among based on the addresses contained
inside the frame. The network layer finds the destination by using logical addresses, such as IP
(internet protocol). At this layer, routers are a important component used to route information
where it needs to go between networks.
Transport Layer: The transport layer manages the delivery and error checking of data packets.
It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts.
One of the most common examples of the transport layer is TCP or the Transmission Control
Protocol.
Session Layer: The session layer controls the conversations between different computers. A
session or connection between devices is set up, managed, and terminated at layer 5. Session
layer services also include authentication and reconnections.
Presentation Layer: The presentation layer formats or translates data for the application layer
based on the syntax or semantics that the application accepts. Because of this, it at times also
called the syntax layer. This layer can also handle the encryption and decryption required by the
application layer.
Application Layer: The application layer is used by end-user software such as web browsers
and email clients. It provides protocols that allow software to send and receive information and
present meaningful data to users. A few examples of application layer protocols are
the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol
(POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS).
c) Draw the labeled construction of Fibre optic cable. State four advantages compared to 6M
copper cables.
Ans: Figure shows the labeled diagram for Fiber Optic Cable 2M for
Diagra
m
Page 19/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1M
each
for any
4
applica
tions
)
These are not affected by electromagnetic interference, so noise and distortion is very
less.
Optical fiber cable are often made cheaper than equivalent lengths of copper wire.
Used for both analog and digital signals
Highly secured
Provides high quality transmission of signals at very high speed (bandwidth 2 Gbps
Smaller size and light weight
Less power loss and allows data transmission for extended distances
Bandwidth is high
a) Draw and describe architecture for a network using star topology to establish a 6M
Page 20/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: The architecture for a network using star topology is as shown in the figure
3M for
Diagra
m
3 M for
descrip
tion
A star topology is a topology where every node in the network is connected to one
central switch. Every device in the network is directly connected to the switch and
indirectly connected to every other node.
The relationship between these elements is that the central network hub is a server and
other devices are treated as clients.
The central node has the responsibility of managing data transmissions across the whole
network and acts as a repeater.
With star topologies, computers are connected with a coaxial cable, twisted pair, or
Page 21/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
In this method the size of sender and receiver window is same
In selective repeat ARQ only damaged frames are resent
This method uses negative acknowledgement to report sequence number of damaged frame 3M for
before timer expires Diagra
Selective repeat uses both positive and negative acknowledgement m
Normal Operation : Frames 0 and 1 are accepted when received because they are in the
receiver window [Link] sender’s window shifts toward right and transmits frames 2 and 3
.The receiver accepts frame 3 as it is in receiver’s window . The receiver sends NAK2 to show
that frame 2 is lost .The sender then sends only frame 2
Lost and delayed acknowledgement and NAK (Negative Acknowledgement)
If the window capacity is reached and acknowledgements are not received because of delay or
loss within the time period the sender retransmits every frame in the window Similarly if NAK
are lost or delayed the sender retransmits all the frames after last acknowledged frame
Page 22/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3M on
explain
ation
c) Draw the block diagram of Symmetric Key Cryptography and state the function of 6M
various components. Compare symmetric and Asymmetric Key Cryptography
Ans: Figure illustrating the block diagram of Symmetric Key Cryptography 2M for
Symmetric key encryption also termed as shared -key ,single-key, secret-key in this type both diagra
the sender and receiver share same key which is used to both encrypt and decrypt messages
mm
There are five main components of a symmetric cryptography system: plaintext, encryption
algorithm, secret key, ciphertext, and the decryption algorithm. 2M for
Explai
nation
2 M for
any 2
valid
points
of
Page 23/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
compa
rison
1. Plaintext
The term plaintext refers to the original message to be sent for encryption . Here the original
message, referred to as plaintext, is converted into apparently random nonsense, referred to as
cipher text. The security depends on several factor.
2. Encryption Algorithm
The encryption algorithm takes the plaintext and converts it into an unreadable format. The
encryption process s consists of an algorithm and a key. The key is a value independent of the
plaintext. Changing the key changes the output of the algorithm. Once the cipher text is
produced, it may be.
3. Key
Think of the key as a decoder ring: the secret of the scrambled text cannot be read without the
key. The key holds the information on all the switches and substitutions made to the original
plain text.
In symmetric encryption, the key is actually bundled with the algorithm; in this sense, the
decoder ring is not universal. The changes and substitutions depend on the key, and vice versa
because the sender and recipient share the key.
4. Ciphertext
The ciphertext is the text that is now scrambled and ready to be sent. It may look like a random
stream of data, and is unreadable.
5. Decryption Algorithm
In the decryption algorithm, the secret key is applied to the ciphertext. It converts it back to
plaintext, basically performing the encryption in reverse. .. Upon reception, the cipher text can
Page 24/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
be transformed back to the original plaintext by using a decryption algorithm and the same key
that was used for encryption.
Comparison of Symmetric and Asymmetric Key Cryptography is given as
Page 25/
22634
21222
3 Hours / 70 Marks Seat No.
15 minutes extra for each hour
Marks
P.T.O.
22634 [2]
Marks
2. Attempt any THREE of the following: 12
a) Draw the block diagram of data communication system and
state the function of each block.
b) Compare Peer-to-Peer and Client - Server architecture on the
basis of -
i) Cost
ii) Performance
iii) Backup
iv) Security
c) Explain different functions of datalink layer of OSI reference
model.
d) Describe hamming code error correction technique with the
help of example.
P.T.O.
22634 [2]
Marks
2. Attempt any THREE of the following: 12
a) Explain with neat labelled diagram the working of star
topology. State its any two advantages.
b) Draw the block diagram of data communication and state the
function of each block.
c) Compare between OSI model and TCP/IP protocol model.
d) Generate CRC code for the data word of 100101011. The
divisor is 10101.
P.T.O.
22634 [2]
Marks
2. Attempt any THREE of the following: 12
a) Draw the block diagram of data communication system and
state the function of each block.
b) Compare LAN and WAN on the basis of following parameters.
i) Geographical area
ii) Bandwidth
iii) Communication medium
iv) Installation cost
c) Explain port addressing and application specific addressing in
TCP / IP reference model.
d) Draw and explain the frame format of point-to-point protocol.
Instructions:
(1) All questions are compulsory.
(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data if necessary.
(5) Preferably, write the answers in sequential order.
Instructions:
All questions are compulsory.
(1) Illustrate your answers with neat sketches wherever necessary.
(2) Figures to the right indicate full marks.
(3) Assume suitable data if necessary.
(4) Preferably, write the answers in sequential order.
Instructions:
(1) All questions are compulsory.
(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data if necessary.
(5) Preferably, write the answers in sequential order.
Q.1) Attempt any FIVE of the following: - ( 10 Marks)
(a) Draw labeled frame format of Serial and Parallel data transmission method.
(b) Classify networks on the basis of architecture.
(c) State two functions of the data link layer of TCP/IP reference model.
(d) Name the layer of the OSI model at which the mechanical, electrical, functional and
procedural characteristics are defined. State its function.
(e) State two limitations of twisted pair cable.
(f) List four network connecting devices.
(g) State two basic functions of Firewall.
Transport Layer