2017 Summer Model Answer Paper PDF
2017 Summer Model Answer Paper PDF
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in the model answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may try to assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more Importance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in the figure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for any equivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent
concept.
Ans: It is the complete unit transmitted by sending computer over the network medium. (Any correct
OR definition: 2
A packet is the unit of data that is routed between an origin and a destination on the marks)
Internet or any other packet-switched network.
Satellite network
Medical Science
Remote Sensing Radar uses microwave radiation to detect range, speed & other
characteristics of remote object
Page | 1
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
c) Give the problem faced in ring topology. 2M
d) State whether the bus is active or passive network. Justify your answer. 2M
In the bus topology the major component is the backbone cable. The communication
takes place through it and this backbone does not do any amplification or correction of
signals passed through that’s why bus can be called as passive network
TCP/IP
Ans: File sharing: The major advantage of computer network is that it allows file sharing (1 mark each
and remote file access. A person sitting at one workstation that is connected to a for any 2
network can easily see files present on another workstation, provided he/she is correct
authorized to do so. advantages)
Page | 2
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Resource Sharing: A computer network provides a cheaper alternative by the
provision of resource sharing. All the computers can be interconnected using a
network and just one modem & printer can efficiently provide the services to all
users.
Flexible Handling: A user can log on to a computer anywhere on the network and
access his/her files. This offers flexibility to the user as to where he/she should be
during the course of his/her routine.
Ans: Transmission media is broadly classified into two groups. (1 mark each
for 2 types)
Wired or Guided Media or Bound Transmission Media
(b) Microwave
(c) infrared
Page | 3
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
i) State any four topologies. 2M
Star
Mesh
Tree
Hybrid
Ans: The reliability of network is high because the failure of the computer in the (1 mark each
network does not affect the functioning for other computers. for any 2
correct
Resource Sharing characteristi
cs)
Addition of new computer to network is easy.
Ans: Twisted pair cabling are used in network because its wiring has two conductors of a (2 mark for
single circuit are twisted together for the purposes of canceling out electromagnetic explanation)
interference (EMI) from external sources; for instance, electromagnetic radiation from
unshielded twisted pair (UTP) cables, and eliminates crosstalk between neighboring
pairs.
Page | 4
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
l) State any 2 advantages of co-axial cable. 2M
m) Define protocol. 2M
Ans: It is defined as set of rules and regulations to communicate between layers. (Any correct
definition 2
marks)
Page | 5
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
PAN:
1. A PAN is personal area network is used for communication among computer
devices close to one’s person.
CAN:
1. CAN is a Campus Area Network is used to connect buildings across
campuses of colleges or Universities.
LAN:
1. LAN is local area network. LAN is privately-owned networks covering a
small geographic area(less than 1 km), like a home, office, building or group
of buildings.
MAN:
1. A Metropolitan Area Network (MAN) is a large computer network that spans
a metropolitan area or campus.
Page | 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
4. The organization can pass their Ethernet frames to the service provider
MAN; the service provider will carry their frames across the MAN; and then
deliver the frames to the destination site.
5. From the customer's point of view, the MAN looks like one big (long)
Ethernet link between their offices.
6. The different sites could belong to the same IP subnet, and from the
customer's viewpoint, no routing is required between their sites.
WAN:
1. WAN is wide area network.
Page | 7
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Disadvantages:
Expensive dedicated hardware.
d) With the help of neat diagram, describe working of fiber optic cable. 4M
Page | 8
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Working:
1. Fiber optics transmits signals in the form of light.
How ray of light changes direction when going from one substance to another.
3. When the angle of incidence i is less than critical angle then the ray refracts.
4. Angle of incidence i is equal to critical angle then, the rays bends along the surface.
5. When the angle of incidence i is greater than critical angle, then the ray reflects.
6. The ray incident above the critical angle it is trapped in the fiber.
Page | 9
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
e) State the functions of data link layer. 4M
Ans: Data link layer: It is responsible for transmitting group of bits between the adjacent (1 mark for
nodes. The group of bits is called as frame. The network layer passes a data unit to the each correct
data link layer. Header and trailer is added to the data unit by data link layer. This data function, any
unit is passed to the physical layer. Data link layer is responsible for moving frames 4 function)
from one node to the next.
Frame traffic control: tells the transmitting node to "back-off" when no frame
buffers are available.
Media access management: determines when the node "has the right" to use the
physical medium.
Ans: 1. An IP address has two components, the network address and the host address. (2 marks
2. A subnet mask separates the IP address into the network and host addresses. Explanation,
3. In Internet Protocol (IP) networking, devices on a subnet share contiguous 2 marks
ranges of IP address numbers. Example)
4. A mask (known as the subnet mask or network mask) defines the boundaries of
an IP subnet.
5. The correspondence between subnet masks and IP address ranges follows
defined mathematical formulas.
6. IT professionals use subnet calculators to map between masks and addresses.
7. A Subnet mask is a 32-bit number that masks an IP address, and divides the IP
address into network address and host address.
8. Subnet Mask is made by setting network bits to all "1"s and setting host bits to
all "0"s. Within a given network, two host addresses are reserved for special
Page | 10
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
purpose, and cannot be assigned to hosts.
9. The "0" address is assigned a network address and "255" is assigned to a
broadcast address, and they cannot be assigned to hosts.
10. Subnet masking for 2 subnet: To calculate the number of subnets or nodes, use
the formula (2n-2) where n = number of bits in either field, and 2n represents 2
raised to the nth power. Multiplying the number of subnets by the number of
nodes available per subnet gives you the total number of nodes available for your
class and subnet mask. Also, note that although subnet masks with non-
contiguous mask bits are allowed, they are not recommended.
Example:
10001100.10110011.11011100.11001000 140.179.220.200 IP Address
11111111.11111111.11000000.00000000 255.255.192.000 Subnet Mask
--------------------------------------------------------------------------------------------------
10001100.10110011.11000000.00000000 140.179.192.000 Subnet Address
Hence Subnet number Address
1. 140.179.64.0
2. 140.179.128.0
Page | 11
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
b) Explain tree topology with neat diagram. 4M
Ans: (Note: Any other diagram showing central hub and other connection may also be (Diagram
considered) :2marks,
Explanation:
2 marks)
Explanation:
Tree has a hierarchy of various hubs, like branches in a tree, hence the name. Tree
topology can be derived from the star topology. Figure shows that every node is
connected to the same hub. However, only few nodes are connected directly to the
central hub.
The central hub contains a repeater, which looks at the incoming bits and regenerates
them afresh as full blown signals for 0 or 1 as per case. This allows the digital signals to
traverse over longer distances. Therefore, the central hub is also called active hub. The
tree topology also contains many secondary hubs, which may be active hubs or passive
hubs.
Page | 12
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
c) Enlist any four communication bands for unguided media with their frequency 4M
range.
Ans: (Any 4
Communicat
ion bands
with correct
range : 1
mark each)
Page | 13
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Ans: OSI model (Open System Interconnection) model was developed by ISO (international (Diagram: 1
standard organization) which provides way to understand how internetwork operates. It mark,
gives guidelines for creating network standard. Explanation:
OSI model has 7 layers as shown in the figure. 3 marks)
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer
The OSI model takes the task of internetworking and divides that up into what is
referred to as a vertical stack that consists of the following 7 Layers.
Page | 14
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal —
through the network at the electrical and mechanical level. It provides the hardware
means of sending and receiving data on a carrier, including defining cables, cards and
physical aspects.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error handling, congestion
control and packet sequencing.
Transport (Layer 4)
Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and
is responsible for end-to-end error recovery and flow control. It ensures complete data
transfer from source to destination.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection
coordination.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g.,
encryption) by translating from application to network format, and vice versa. The
presentation layer works to transform data into the form that the application layer can
accept. This layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the syntax & semantics.
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Everything at this
layer is application-specific. This layer provides application services for file.
Page | 15
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
f) State different IP address classes. Explain any one in brief. 4M
Ans: Different IP address classes in IPv4:- Class A, Class B, Class C, Class D, Class E. (List of
classes: 1
Class A : mark, Any
one class
explanation:
3 marks)
In this, the first bit is ‘0’. The next 7 bits are used indicate network id. Rest of the 3
bytes are used to indicate host id. Class A: Minimum value is 0.0.0.0 and maximum
value 127.255.255.255. In this class, number of hosts that can be connected to each
network (216) is more than the number of networks (27).
Class B :
In this, the first two bits are ‘1 0’. The next 14 bits are used indicate network id. Rest of
the 2 bytes are used to indicate host id. Class A: Minimum value is 128.0.0.0 to
maximum value 191.255.255.255. In this class, number of hosts that can be connected to
each network (214) is almost the same as the number of networks (216).
Class C :
In this, the first three bits are ‘1 1 0’. The next 21 bits are used indicate network id. Rest
of the One byte is used to indicate host id. Class A: Minimum value is 192.0.0.0 to
maximum value 223.255.255.255. In this class, number of hosts that can be connected to
each network (28) is very less compared to the number of networks (221).
21bits 8 bits (4th byte) Minimum value
Class D:
If first 4 bits are ‘1 1 1 0’ the IP address belongs to class D. The IPv4 networking
standard defines Class D addresses as reserved for multicast. Multicast is a mechanism
for defining groups of nodes and sending IP messages to that group rather than to every
node on the LAN (broadcast) or just one other node (unicast). Multicast is mainly used
on research networks. As with Class E, Class D addresses should not be used by
ordinary nodes on the Internet. For class D minimum value for multi cast address is
224.0.0.0 and maximum multi class address is 239.255.255.255.
Page | 16
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Class E:
If first 5 bits are ‘1 1 1 1 0’ the IP address belongs to class E. For class E minimum
value for reserved address is 240.0.0.0 to 255.255.255.255. These are used for research
work in IP addresses.
2. Data transfer: Data transfer involves transmitting data between the devices over the
virtual circuit.
Page | 17
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
OR
Page | 18
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
b) What is transceiver? State the advantages and disadvantages of it. 4M
Ans: Transceivers: These are devices that both transmit and receive. Transceivers are used to (Definition: 2
connect nodes to the various Ethernet media. Most computers and network interface marks, Any 2
cards contain a built-in 10BaseT or 10Base2 transceiver, allowing them to be connected Advantages:
directly to Ethernet without requiring an external transceiver. Many Ethernet devices ½ mark
provide an AUI connector to allow the user to connect to any media type via an external each; Any 2
transceiver. The transceiver is responsible for transmitting, receiving, and detecting Disadvantag
collisions. The transceiver is connected to the station via a transceiver cable that es: ½ mark
provides separate paths for sending and receiving. each.)
Advantages:
2. The same device can provide path for send and receive signals.
Disadvantages:
c) Draw a sketch of shielded twisted pair cable and describe any two characteristics. 4M
Page | 19
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Characteristics:
It has metal shield that covers twisted pair.
STP costs more than UTP but less than fiber-optic cable.
STP can theoretically run at 50OMbps for a 100-meter cable length.
STP eliminates Cross talk.
The requirement for special connectors can make STP more difficult to install
than UTP.
It is less noisy, so signal is more secure as compared to UTP.
Since it has a metal foil or braided mesh, it is bulkier.
Ans: (Diagram: 2
marks,
Explanation:
2 marks)
OR
Page | 20
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Explanation:
The protocols operating at the various layers work together to supply a unified quality of
service. Each protocol layer provides a service to the layers directly above and below it.
The process of adding the headers and trailers to the data is called as data
encapsulation.
A packet(header and data ) at level 7 is encapsulated in a packet at level 6.The whole
packet at level 6 is encapsulated in a packet at level 5, and so on. In other words, the
data portion of a packet at level N-1 carries the whole packet (data and header and
maybe trailer) from level N.
Page | 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
e) Explain horizontal and vertical communication. 4M
Ans: (Note: Either a single diagram (2M) or Individual (each 1M) may be considered) (Horizontal
communicati
on: 2 marks,
Vertical
communicati
on: 2 marks)
Horizontal Communication:
When the packet arrived at its destination, the process by which the headers are
applied at the source is repeated in server.
Page | 22
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Application layer of Host A machine communicates with Application layer Of
Host B machine. Presentation layer of Host A machine communicates with
presentation layer Of Host B machine. Session layer of Host A machine
communicates with Session layer Of Host B machine. Transport layer of Host A
machine communicates with Transport layer Of Host B machine and so on.
Vertical Communication:
Page | 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
The n/w layer protocol header will specify the name of transport layer protocol to
be used to process the packet.
Due to vertical communication, it becomes protocol at each layer
simultaneously.
Page | 24
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Explanation:
File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying
a file from one host to another. Figure shows the basic model of FTP.
The client has three components: user interface, client control process, and the
client data transfer process. The server has two components: the server control
process and the server data transfer process.
The control connection is made between the control processes. The data
connection is made between the data transfer processes.
The control connection remains connected during the entire interactive FTP
session.
The data connection is opened and then closed for each file transferred. It opens
each time commands that involve transferring files are used, and it closes when
the file is transferred. In other words, when a user starts an FTP session, the
control connection opens. While the control connection is open, the data
connection can be opened and closed multiple times if several files are
transferred.
Separation of commands and data transfer makes FTP more efficient. FTP uses
the services of TCP. It needs two TCP connections.
FTP uses two well-known TCP ports: Port 21 is used for the control connection,
and port 20 is used for the data connection.
Ans: A gateway is a node (router) in a computer network, a key stopping point for (Explanation
data on its way to or from other networks. Using gateways, we are able to communicate s: 2 marks,
and send data back and forth. The Internet wouldn't be any use to us without gateways Diagram
(as well as a lot of other hardware and software). /Any Similar
:2 marks)
A common use for a gateway is to connect a LAN and a Mainframe computer by
changing protocols and transmitting packets between two entirely different networks.
For example, a network designed to use the OSI model can be connected to another
network using the Internet model.
Page | 25
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Diagram:
Ans: In satellite communication, signal transferring between the sender and receiver is done (Diagram/
with the help of satellite. In this process, the signal which is basically a beam of Any similar:
modulated microwaves is sent towards the satellite called UPLINK (6 Ghz). 2 marks,
Explanation
Then the satellite amplifies the signal and sent it back to the receiver’s antenna present
:2 marks)
on the earth’s surface called as DOWNLINK (4Ghz), as shown in the diagram given
As the entire signal transferring is happening in space. Thus this type of communication
is known as space communication.
The satellite does the functions of an antenna and the repeater together. If the earth along
Page | 26
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
with its ground stations is revolving and the satellite is stationery, the sending and
receiving earth stations and the satellite can be out of sync over time.
Therefore Geosynchronous satellites are used which move at same RPM as that of the
earth in the same direction. So the relative position of the ground station with respect to
the satellite never changes. However 3 satellites are needed to cover earth’s surface
entirely.
Ans: Token passing: when hosts want to transmit data, it should hold the token, which is an (Token
empty packet. The token is circling the network in a very high speed. Passing
explaination:
If any workstation wants to send data, it should wait for the token. When the token has
2 marks,
reached the workstation, the workstation can take the token from the network, fill it with
Comparison
data, mark the token as being used and place the token back to the network.
: 2 marks:
Compare token passing and CSMA/CD two points)
Point 1:
The token passing is the least sensitive to work load. In token passing when the network
is lightly loaded the overhead is high but it is least sensitive to work load. As the load
increases the throughput does not decrease.
CSMA/CD offers the shortest delay under light load conditions but it is most sensitive to
variations of load. That means when the load increases in CSMA/CD we know that
delay increases significantly particularly when the load is heavy.
Point 2:
Token passing is suitable for real-time traffic because the delay is deterministic.
CSMA/CD it is non-deterministic, how much time it will take is not known. Therefore,
as a consequence in case of CSMA/CD some packets may take very long time to deliver
Page | 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
and there is a possibility that some unfortunate packets will not be delivered
3. Compression:
It is responsible for routing the packets within the subnet i.e. from source to destination.
It is responsible for source e to destination delivery of individual packets across multiple
networks. It ensures that packet is delivered from point of origin to destination.
1. logical addressing
2. Routing.
3. Congestion control
5. Address transformation
Page | 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
e) Compare IPv4 and IPv6. 4M
Ans: (Any 4
points, 1
IPV4 IPV6
mark each)
1. Source and destination addresses are 1. Source and destination addresses are
32 bits (4 bytes) in length. 128 bits (16 bytes) in length.
Page | 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
f) With neat diagram explain DNS in Internet. 4M
Ans: (Diagram/
Any suitable:
1 mark,
Explanation
:3 marks)
The Domain Name System (DNS) is a client/server application that identifies each
host on the Internet with a unique user-friendly name.
DNS organizes the name space in a hierarchical structure to decentralize the
responsibilities involved in naming.
Each node in the tree has a domain name.
A domain is defined as any subtree of the domain name space.
Domain Name system has top level domains such as .edu, .org, .com etc
The name space information is distributed among DNS servers.
A domain name server is simply a computer that contains the database and the
software of mapping between domain names and IP addresses.
Functions of DNS:
Accept request from programs for converting domain names into IP addresses.
Accept request from other DNS servers to convert domain names into IP
addresses
Page | 30
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
6. Attempt any two: 16 Marks
a) With neat diagram, explain client server network along with its advantages and 8M
disadvantages.
Ans: The servers stores all the network's shared files and applications programs, such as word (Explanation
processor documents, compilers, database applications, spreadsheets, and the network :3 marks,
operating system. Diagram:1
mark,
Client will send request to access information from the server based on the request
Advantages
server will send the required information to the client.
2 marks and
Disadvantag
e: 2 marks)
OR
Page | 31
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Client :
A computer which is seeking any resource from another computer is a Client Computer.
You can think a client as a computer in your network, where a network user is
performing some network activity.
For Example: Downloading a file from a File Server, Browsing Intranet/Internet etc.
The network user normally uses a client computer to perform his day to day work.
Server:
A Server computer is installed with appropriate Operating System and related Software
to serve the network clients with one or more services, continuously without a break.
Features of Servers:
1. It has the centralized control. i.e. centralized user accounts, security, and access
to simplify network administration.
2. It does not slow down with heavy use.
3. The size of the network can be expanded to any size.
4. Proper Management in which all files are stored at the same place. In this way,
management of files becomes easy. Also it becomes easier to find files.
5. As all the data is stored on server it’s easy to make a back-up of it.
6. Reduces Data duplication by storing data stored on the servers instead of each
client, so it reduces the amount of data duplication for the application.
Functions of Router:
Advantage of Router:
Page | 33
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Disadvantage of Router:
It is complex to maintain.
Security Risk.
Router is more expensive
Types of router:
1. Static Router
2. Dynamic Router
Page | 34
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
c) Describe TCP/IP model with suitable diagram. 8M
(Diagram:2
marks,
Explanation
of each layer
:6 marks)
TCP/IP Reference Model: TCP/IP means transmission control protocol and internet
protocol.
TCP/IP that is transmission control protocol and the internet protocol was developed by
Department of Defense’s Project Research Agency (ARPA, later DARPA) under the
project of network interconnection.
Most widely used protocol for interconnecting computers and it is the protocol of the
internet. It has 4 layers as given below.
Page | 35
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER– 17 EXAMINATION
Subject Title: COMPUTER NETWORK Subject Code: 17429
Layer 3: Transport Layer
Page | 36