Important Instructions To Examiners:: (Autonomous)
Important Instructions To Examiners:: (Autonomous)
Important Instructions To Examiners:: (Autonomous)
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Page 1 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) State any two advantages of Bus topology. 2M
Page 2 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
e) State three advantages of optical fiber cable. 2M
Ans: Roaming: It is the ability for a cellular customer to automatically make and receive voice (Correct
calls, send and receive data, or access other services, including home data services, when Definition
travelling outside the geographical coverage area of the home network, by means of using a :2
visited network. marks)
Page 3 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
B) Attempt any two: (2x4=8)
Page 4 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
connecting or handling the e-mail interface between the two systems using gateway software
that is part of the file-based e-mail system. A client-server e-mail system is one where an e-
mail server containing the messages & handles all incoming & outgoing mail. It is more
secure & powerful than file based e-mail system.
5) Remote access: Using this feature user can access their file & e-mail, when they are
travelling or working on remote location. It enables users to access to centralized application,
stored private or shared files on LAN.
6) Internet & Intranet: Internet: It is public network. This consists of thousands of
individual networks & millions of computers located around the world. Internets have many
different types of services available such as e-mail, the web & Usenet newsgroups.
Intranet: It is private network or it is company’s own network. Company use this feature for
internal use. For example: company establish its own web server, for placing documents
such as employee handbooks, purchases form or other information that company publishes
for internal use. It also has internet services such as FTP servers or Usenet servers.
c) State the functions of: 4M
1) Hub
2) Repeater
3) Bridge
4) Router
Ans: 1)Hub: (Two
Hub connects all nodes in star topology. Hub is broadcasting device. Functions
It sends packets to all nodes in the network. of Each
compone
It works at Physical Layer of OSI model.
nt - ½
2) Repeater: marks
Repeaters are used to take the distorted, weak and corrupt input signal and regenerate this each)
signal at its output.
It ensures that the signals are not distorted or weak before it reaches the destination.
It increases the signal strength.
3)Bridge:
A bridge device filters data traffic at a network boundary.
Bridges reduces the amount of traffic on a LAN by dividing it into two segments.
It inspects incoming traffic and decides whether to forward or discard it.
It sends packets between two networks of same type.
4)Router:
Router chooses the best path for packet forwarding.
Router read complex network address in packet.
It works at Network Layer of OSI model
Efficiently direct packets from one network to another, reducing excessive traffic.
Join neighbouring or distant network
Connect dissimilar networks.
Prevent network bottlenecks by isolating portions of a network.
Page 5 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
2. Attempt any four of the following: (4x4=16)
Ans: (Diagram
: 2 Mark,
Descripti
on: 2
marks)
Star Topology:
• In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub.
• The devices are not directly linked to one another.
• A star topology does not allow direct traffic between devices.
• The controller acts as an exchange.
• If one device wants to send data to another, it sends the data to the controller, which then
relays the data to the other connected device.
• A star topology is less expensive than a mesh topology.
• In a star, each device needs only one link and one I/O port to connect it to any number of
others. This factor also makes it easy to install and reconfigure.
Far less cabling needs to be housed, and additions, moves, and deletions involve only
one connection: between that device and the hub.
• Other advantages include robustness. If one link fails, only that link is affected. All other
links remain active. This factor also lends itself to easy fault identification and fault isolation.
• As long as the hub is working, it can be used to monitor link problems and bypass defective
links.
• One big disadvantage of a star topology is the dependency of the whole topology on one
single point, the hub. If the hub goes down, the whole system is dead.
• Although a star requires far less cable than a mesh, each node must be linked to a central
hub.
• The star topology is used in local-area networks (LANs). High-speed LANs often use a star
topology with a central hub.
Page 6 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) Describe role of modem in Networking. 4M
Ans: (Diagram
: 1 mark,
Explanati
on: 3
marks)
Ans: (Diagram
A twisted pair consists of two copper wires about 1 mm thick. : 2 marks,
These two wires are individually contained in a plastic insulation and are twisted Explanati
together in a helical form. Polyethylene, polyvinyl chloride, flour polymer resin and on: 2
Teflon(r) are some of the substances that are used for insulation purposes. marks)
Page 7 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Purpose of twisting the wire is to reduce the electrical interference from the similar
pairs in surroundings. The performance of the wire improves with the increase in the
number of twist per foot.
If the two wires are parallel, then the electromagnetic interference from the devices
such as motor can create a noise or interferences.
Inferences on the wire that is closer to the source of noise. These results in high
voltage level in one wire than the other This further leads to uneven load and
damaged signal and there will be difference at the receiver side.
If two wires are twisted, then the cumulative effect of the interference on both the
wires is equal.
In such a way, each wire is closer to the noise source for half of the time and farther
away for the other half i.e. in one twist one wire is closer to the noise source and the
other is farther; in next twist the reverse is true.
In this way, there will be no difference at the receiver side as unwanted signals are
cancelled out.
Twisted pair is distance limited. As distance between network element increases,
attenuation increases and quality decreases at a given frequency.
Twisted pair is an insecure transmission medium. It is relatively simple to place
physical taps.
Twisted pair cables are of two types namely, Shielded (STP) and Unshielded (UTP)
based on the shield provided to cover it.
Page 8 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
d) Describe any four situations in which server based networks are more superior to peer 4M
to peer network.
Ans: 1. Centralization: Servers help in administering the whole set-up. Access rights and (Any four
resource allocation is done by Servers. correct
2. Proper Management: All the files are stored at the same place. Also it becomes easier to situation:
find files.
1 mark
3. Back-up and Recovery possible: As all the data is stored on server it’s easy to make a
back-up of it. each)
4. Up-gradation and Scalability in Client-server set-up: Changes can be made easily by
just upgrading the server. Also new resources and systems can be added by making
necessary changes in server.
5. Accessibility: From various platforms in the network, server can be accessed remotely.
6. Security: Rules defining security and access rights can be defined at the time of set-up of
server.
Ans: Source and destination addresses are 32 bits (4 bytes) in length. (Any four
Security is another aspect where IPv4 had a push back. With all devices not accessing the limitation
Internet, there needs to be some security mechanism to protect the data and perform : 1 mark
cryptography services etc. each)
No identification of payload for QoS handling by routers is present within the IPv4
header.
The routing tables will become large. A separate routing table entry is needed for each
network resulting in a large number of routing table entries.
IPv4 addresses are either configured manually or automatically using the DHCP
(Dynamic Host Configuration Protocol). These days as almost all devices are IP enabled,
Page 9 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
we should have simpler means to configure rather have these devices configured
automatically without majorly relying on some administration.
3. Attempt any four: (4x4=16)
Flow controlling TCP has flow control UDP has no flow control
Data transmission TCP gives guarantee that the No guarantee of the data
order order of the data at the transmission order
receiving end is the same as
the sending end
Page 10 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) Explain the service provided by network layer of the OSI model. 4M
In this, the first bit is ‘0’. The next 7 bits are used indicate network id. Rest of the 3 bytes are
used to indicate host id. Thus the First Byte in Class A type of IP address will have a range
from 0 to 126.
Example : 10.1.2.1
In this, the first byte ‘10’ has first bit 0, and hence it belongs to class A IP address.
Class B :
Class B IP address format is given below:
In this, the first two bits are ‘1 0’. The next 14 bits are used indicate network id. Rest of the 2
bytes are used to indicate host id. Thus, the first byte of class B type of IP address has a
range from 128 to 191.
Page 11 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Example : 187.4.5.1
In this address, the first byte ‘187’ has first two bits as 10.
Class C :
Class C IP address format is given below:
In this, the first three bits are ‘1 1 0’. The next 21 bits are used indicate network id. Rest of
the One byte is used to indicate host id. Thus the first byte of the IP address in class C has
range from 192 to 223.
Example : 192.168.1.2
In this the first three bits are 110, which represents the Class C type IP address.
Class D:
Class D IP address format is given below:
1 1 1 0 Multicast Address
If first 4 bits are ‘1 1 1 0’ the IP address belongs to class D. The IPv4 networking standard
defines Class D addresses as reserved for multicast. Multicast is a mechanism for defining
groups of nodes and sending IP messages to that group rather than to every node on the LAN
(broadcast) or just one other node (unicast). Multicast is mainly used on research networks.
As with Class E, Class D addresses should not be used by ordinary nodes on the Internet.
The range for first byte of class D starts from 224 till 239.
Example: 225.25.2.1
Here, the first 4 bits are 1110.
Class E:
Class E IP address format is given below:
If first 5 bits are ‘1 1 1 1 0’ the IP address belongs to class E. For class E minimum value for
reserved address is 240.0.0.0 to 255.255.255.255. These are used for research work in IP
addresses.
Page 12 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Example: 245.5.6.2
Here, the first 5 bits are 11110.
CAN:
1. CAN is a Campus Area Network is used to connect buildings across campuses of colleges
or Universities.
2. A CAN is actually a type of LAN.
3. It is larger than a LAN but smaller than MAN.CAN is a network that connects two or
more LANs but that is limited to a specific and contiguous geographical area such as a
college campus, industrial complex or military base.
LAN:
1. LAN is local area network. LAN is privately-owned networks covering a small geographic
area(less than 1 km), like a home, office, building or group of buildings.
2. LAN transmits data with a speed of several megabits per second.
MAN:
1. A Metropolitan Area Network (MAN) is a large computer network that spans a
metropolitan area or campus.
2. A MAN typically covers an area up to 10 kms (city). The best example of MAN is the
cable Television network, available in many cities.
3. For an organization, the common use of a MAN is to extend their LAN connectivity
between buildings/offices that are within the same city or urban area (hence the name
Metropolitan Area Network).
4. The organization can pass their Ethernet frames to the service provider MAN; the service
provider will carry their frames across the MAN; and then deliver the frames to the
destination site.
5. From the customer's point of view, the MAN looks like one big (long) Ethernet link
Page 13 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
between their offices.
6. The different sites could belong to the same IP subnet, and from the customer's viewpoint,
no routing is required between their sites.
WAN:
1. WAN is wide area network.
2. WAN is a long-distance communication network that covers a wide geographic area, such
as state or country.
3. The most common example is internet.
4. A WAN provides long-distance transmission of data, voice, image and video information
over larger geographical areas that may comprise a country or even whole world.
Ans: {{**Note: Any other diagram showing central hub and other connection may also be (Diagram
considered**}} :2 marks,
Explanati
Tree Topology: on: 2
A tree topology is variation of star. As in a star, nodes in a tree are linked to a central hub marks)
head end that controls the traffic to a network. However, not every computer plugs into the
central hub, majority of them are connected to a secondary hub which in turn is connected to
the central hub as shown in fig.
Page 14 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Page 15 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
b) Compare star bus with star-ring topology. 4M
Diagram
Network If any one hub fails, the computers If any one hub fails, the whole
Failure connected to other hubs in networks network collapses.
still can communicate.
Ease of network Easy to add computers in star Easy to add computers in star
expansion topology and easy to add hubs in topology and difficult to add
bus topology. hubs in ring topology.
Page 16 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
6. Presentation Layer: XDR, TLS, SSL and MIME.
7. Application Layer: HTTP, SMTP, DHCP, FTP, Telnet, SNMP and SMPP.
used.
Page 17 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Fragmentation is supported at Fragmentation is not supported at routers. It is
only supported at the originating host.
Originating hosts and intermediate
routers.
extension headers.
Ans: Client server Architecture consists of Client computers or nodes, which are connected to (2
centralized server. The servers stores all the network's shared files and applications marks;
programs, such as word processor documents, compilers, database applications, Explanati
spreadsheets, and the network operating system. Client will send request to access on:
information from the server based on the request server will send the required information to 1mark;
the client. Advantag
es (Any
two) :
1mark;
Disadvant
ages (Any
two) :
1mark)
Page 18 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
management of files becomes easy. Also it becomes easier to find files.
5. As all the data is stored on server it’s easy to make a back-up of it.
6. Reduces Data duplication by storing data stored on the servers instead of each client, so it
reduces the amount of data duplication for the application.
Disadvantages of Client Server Network:
1. Server failure leads to whole network failure.
2. It is very expensive to install and manage as dedicated hardware (server) and special
software is required.
3. A Professional IT person is required to maintain the servers and other technical details of
network.
5. Attempt any four: (4x4=16)
Unregistered IP:
1. An Internet Protocol (IP) address set aside for use within a LAN, intranet, or other
private network and not for use in a public network such as the Internet.
2. An IP address within three ranges of numbers that are set aside for the computers in
local networks. Typically assigned to the machines by a DHCP server, these private
addresses are not routed over the Internet. In order to gain access to the Internet, the
private addresses are converted to a public IP address that is exposed to the Internet
by a network address translation (NAT) service.
b) Describe carrier sense multiple access with collision detection. 4M
Ans: 1. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is the LAN access (4 marks:
method used in Ethernet. Relevant
2. When a device wants to gain access to the network, it checks to see if the network is free. explanati
3. If the network is not free, the device waits a random amount of time before retrying. on)
4. If the network is free and two devices access the line at exactly the same time, their
signals collide.
5. When the collision is detected, they both back off and wait a random amount of time
before retrying.
6. CSMA/CD is a type of contention protocol. Networks using the CSMA/CD procedure
are simple to implement but do not have deterministic transmission characteristics. The
CSMA/CD method is internationally standardized in IEEE 802.3 and ISO 8802.3.
Page 19 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
c) Explain horizontal and vertical communication. 4M
1) The horizontal communication is the logical connection between the layers, there is no
direct communication between them.
2) Information included in each protocol header by the transmitting system is a message that
will be carried to the same protocol in the destination system.
3) For two computers to communicate over a n/w, the protocol used at each layer of the OSI
model in the transmitting system must be duplicated at the receiving system.
4) The packet travels up through the protocol stack and each successive header is stripped of
by the appropriate protocol & processed.
5) When the packet arrived at its destination, the process by which the headers are applied at
the source is repeated in server.
Page 20 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Vertical communication:
1) In addition to communicating horizontally with the same protocol in the other system, the
header information also enables each layer to communicate with the layer above & below it.
2) Eg. The network layer will communicate with the data link layer & transport layer.
4) When a system receives a packet & passes it up through various layers the data link layer
protocol header includes a field which specifies the name of network layer protocol to be
used to process the packet.
5) The network layer protocol header will specify the name of transport layer protocol to be
used to process the packet.
Page 21 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Installation is costly and time consuming Installation needs less time and money
Ans: NIC (Network interface card / network adapter): It physically makes the connection, works (1 Mark:-
as interface between computer and network cable. What is
NIC; 3
Functions of NIC: marks:-
1. Establishes and manages the computer’s network connection. any 3
2. Translates digital computer data into signals (appropriate for the networking medium) relevant
for outgoing messages, and translates signals into digital computer data for incoming functions)
messages
3. Provide physical link or connectivity between computer and the network physical
medium.
4. Creates, sends, and receives frames – Frame: fundamental unit of data for network
transmission and reception.
5. Manages access to medium.
6. Control flow of data between computer and physical medium.
7. Acts as gatekeeper (permits inbound communications aimed only at its computer (or
broadcast) to pass through NIC and on to CPU)
– Each card has a unique MAC address in ROM
– Promiscuous mode disables gatekeeper functions
Page 22 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
f) Compare peer to peer and client-server network. 4M
Ans: ( any 4
Peer to peer Network Client Server Network
point: 1
1. It is much like company uses 1. It is much like company uses mark
decentralized management centralized management. each)
2.In this each machine has same power 2. In this server has more power & client
has less power.
Ans: The Internet Layer Of TCP/IP Is Responsible For Addressing, Packaging, And Routing ( any 4
Functions. The Core Protocols Of The Internet Layer Are IP, ARP, ICMP, And IGMP. protocols
1) The Internet Protocol (IP) 2 marks
each)
a. It Is A Routable Protocol Responsible For IP Addressing, Routing, And The
Fragmentation And Reassembly Of Packets.
b. It Has The Task Of Delivering Packets From The Source Host To The Destination
Host Solely Based On The IP Address In The Packet Headers.
c. For This Purpose, IP Defines Packet Structures That Encapsulate The Data To Be
Delivered.
d. It Also Defines Addressing Methods That Are Used To Label The Datagram With
Source And Destination Information.
Page 23 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
c. ARP Is Used For Mapping A Network Address (E.G. An Ipv4 Address) To A
Physical Address Like An Ethernet Address (Also Named A MAC Address).
d. ARP Has Been Implemented With Many Combinations Of Network And Data Link
Layer Technologies
b) Explain OSI model with neat diagram. Which layer of OSI model packages raw data 8M
bit into data frames? Describe bit stuffing with one example.
Ans: OSI model (open system interconnection) model was developed by ISO (international (OSI
standard organization) diagram -
Function of OSI model 1mark;
1) It provides way to understand how internetwork operates. Explanati
2) It gives guideline for creating network standard. on-3
marks;
OSI model has 7 layers as shown in the figure. Identifica
tion of
correct
layer: 1
mark; Bit
stuffing
explanati
on-2
marks;
Page 24 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
example-
1 mark)
1) Physical layer:
It co-ordinates the functions required to transmit bit stream over physical medium.
It deals with mechanical and electrical specifications of interface and transmission medium.
For transmission it defines procedures and functions that devices and transmission
medium has to perform.
a. Physical characteristics of interfaces and media.
b. Representation of bits:
c. Data rate(transmission rate).
d. Synchronization of bits.
e. Line configuration: Point to point or multipoint configuration should be used.
f.
2) Data link layer:
It is responsible for transmitting group of bits between the adjacent nodes. The group of bits
is called as frame. The network layer passes a data unit to the data link layer. Header
and trailer is added to the data unit by data link layer. This data unit is passed to the
physical layer.
Data link layer is responsible for moving frames from one node to the next.
3) Network layer:
It is responsible for routing the packets within the subnet i.e. from source to destination. It is
responsible for source e to destination delivery of individual packets across multiple
Page 25 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
networks. It ensures that packet is delivered from point of origin to destination.
Functions of network layer:
a. logical addressing
b. Routing.
c. Congestion control
d. Accounting and billing
e. Address transformation
f. Source host to destination host error free delivery of packet.
4) Transport layer:
Responsibility of process to process delivery of message Ensure that whole message arrives
in order.
a. Service point addressing
b. Segmentation and reassembly
c. Connection control
d. Flow control: Flow control is performed end to end
e. Error control
5) Session layer:
Establishes, maintains, synchronizes the interaction among communication systems It is
responsible for dialog control and synchronization
a. Dialog control
b. Synchronization, session and sub session
c. Session closure
6) Presentation layer:
It is concerned with syntax, semantics of information exchanged between the two systems.
Functions:
a. Translation,
b. encryption,
c. compression
7) Application layer:
It enables user to access the network. It provides user interfaces and support for services like
email, remote file access.
Functions:
a. network virtual terminal,
b. file transfer access and management,
c. mail services
Page 26 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
d. directory services
Data link layer of OSI model packages raw data bit into data frames.
Bit stuffing:
Bit stuffing is the process of adding one extra 0 whenever five consecutive 1‟s in the data,
so that the receiver does not mistake the pattern 0111110 or a flag. At sender side the bit is
stuffed and at receiver side stuffed bit is removed. As shown in following
Example:
c) How cross cable is created? Draw figure and explain. Give its use. 8M
Page 27 of 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
SUMMER– 18 EXAMINATION
Subject Name: Computer Network Model Answer Subject Code:
17429
Uses:
a. While connecting one computer to another without going through router, switch or
hub, the crossover cables are used.
b. These are also used when connecting one computer to a device directly, without any
other connecting device.
c. Cross cable is used for connecting similar level (Homogenous) devices.
For example: two computers or connecting computer with hub since all are level 1
device.
Page 28 of 28