Important Instructions To Examiners:: Q. No Sub Q.N. Answer Marking Scheme
Important Instructions To Examiners:: Q. No Sub Q.N. Answer Marking Scheme
Important Instructions To Examiners:: Q. No Sub Q.N. Answer Marking Scheme
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans. Correct
labelled
diagram 2M
Page 2 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 4 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
b) Draw a neat labeled diagram of Twisted Pair Cable and state its 4M
types.
Ans. A twisted pair cable comprises of two separate insulated copper 3M for
wires, which are twisted together and run in parallel, as shown in correct
following fig: labeled
diagram,
1M for types
One of the wires is used to carry signals to the receiver and the other
is used only as ground reference. There are two type of twisted pair
cable:
1. Unshielded Twisted Pair (UTP)
2. Shielded Twisted Pair (STP)
c) Explain wireless LAN 802.11 architecture. 4M
Ans. IEEE has defined the specifications for a wireless LAN, called IEEE
802.11, which covers the physical and data link layers. 2M for BSS
IEEE 802.11 defines two types of services which are explanation
1) Basic Service Set (BSS) with
2) Extended Service Set (ESS) diagram,
1) Basic Service Set (BSS) 2M for ESS
IEEE 802.11 defines the basic service set (BSS) as the building block explanation
of a wireless LAN. with diagram
A basic service set is made of stationary or mobile wireless stations
and an optional central base station, known as the access point (AP).
Figure shows two sets in this standard. The BSS without an AP is a
stand-alone network is called an ad hoc architecture. A BSS with an
AP is referred to as an infrastructure network
Page 5 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 6 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Data Link Layer: At OSI Model, Layer 2, data packets are encoded
and decoded into bits. It furnishes transmission protocol knowledge
and management and handles errors in the physical layer, flow
control and frame synchronization..
Page 7 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 8 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
4. Then the satellite amplifies the signal and sent it back to the
receiver’s antenna present on the earth’s surface called as
DOWNLINK (4Ghz), as shown in the diagram given
Page 9 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 10 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
The hub and hosts, and the transmission lines between them, form a
graph with the topology of a star. Data on a star network passes
through the hub before continuing to its destination. The hub
manages and controls all functions of the network. It also acts as a
repeater for the data flow.
Page 11 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
In this, the first bit is ‘0’. The next 7 bits are used indicate network id.
Rest of the 3 bytes are used to indicate host id. Thus the First Byte in
Class A type of IP address will have a range from 0 to 126.
Example : 10.1.2.1 In this, the first byte ‘10’ has first bit 0, and hence
it belongs to class A IP address.
Page 12 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Class B :
Class B IP address format is given below:
In this, the first two bits are ‘1 0’. The next 14 bits are used indicate
network id. Rest of the 2 bytes are used to indicate host id. Thus, the
first byte of class B type of IP address has a range from 128 to 191.
Example : 187.4.5.1
In this address, the first byte ‘187’ has first two bits as 10.
Class C :
Class C IP address format is given below:
In this, the first three bits are ‘1 1 0’. The next 21 bits are used
indicate network id. Rest of the One byte is used to indicate host id.
Thus the first byte of the IP address in class C has range from 192 to
223.
Example : 192.168.1.2
In this the first three bits are 110, which represents the Class C type
IP address.
Class D:
Class D IP address format is given below:
Page 13 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Class E:
Class E IP address format is given below:
Page 14 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 15 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 16 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 17 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Relevant
Explanation
3M
Page 18 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Working of SMTP
1. Communication between the sender and the receiver:
The sender’s user agent prepares the message and sends it to the
MTA. The MTA’s responsibility is to transfer the mail across the
network to the receiver’s MTA. To send mail, a system must have a
client MTA, and to receive mail, a system must have a server MTA.
2. Sending Emails:
Mail is sent by a series of request and response messages between
the client and the server. The message which is sent across consists of
a header and a body. A null line is used to terminate the mail header
and everything after the null line is considered the body of the
Page 19 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3. Receiving Emails:
The user agent on the server-side checks the mailboxes at a particular
time of intervals. If any information is received, it informs the user
about the mail. When the user tries to read the mail it displays a list of
emails with a short description of each mail in the mailbox. By
selecting any of the mail users can view its contents on the terminal.
HTTP (Hypertext Transfer Protocol):
The HTTP protocol can be used to transfer the data in the form of
plain text, hypertext, audio, video, and so on.
HTTP is similar to SMTP as the data is transferred between client
and server.
The HTTP differs from the SMTP in the way the messages are
sent from the client to the server and from server to the client.
SMTP messages are stored and forwarded while HTTP messages
are delivered immediately.
HTTP is an application layer protocol
Features of HTTP:
Connectionless protocol: HTTP is a connectionless protocol.
HTTP client initiates a request and waits for a response from the
server.
Media independent: HTTP protocol is a media independent as
data can be sent as long as both the client and server know how to
handle the data content.
Stateless: HTTP is a stateless protocol as both the client and
server know each other only during the current request.
HTTP messages are of two types: request and response. Both the
message types follow the same message format.
Request Message: The request message is sent by the client that
consists of a request line, headers, and sometimes a body.
Page 20 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 21 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Features:
Analog technology. Each
Maximum speed 2.4kbps. generation
with any two
Nordic Mobile Telephone System (NMTS). valid
Advanced Mobile Phone System (AMPS). features&
Total Access Communication System (TACS). limitations
Only voice service. 1M
800 & 900 MHz frequency.
10 MHz bandwidth.
Frequency modulation.
Frequency Division Multiple Access (FDMA) technique.
Limitations:
Ordinary battery life.
Due to interference, voice quality is poor.
The number of cell coverage and limited users.
Between similar systems, roaming was not possible.
Flawed security system.
Not convenient to carry as it was significant in size.
Features:
Digital technology.
Small data services like SMS and MMS (Multimedia Message
System).
Roaming was possible.
First internet system with poor data rate.
Better voice call.
Conference calls are allowed.
Comparatively enhanced security.
Data speed up to 64 Kbps.
Page 22 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Limitations:
Restricted mobility.
Data rate low.
Fewer features.
Less hardware capability.
User numbers are limited.
Features:
High data rates with low cost.
Email.
Web browsing.
Video downloading.
Picture sharing.
Better voice call.
15 to 20 MHz bandwidth.
Speed 2 Mbps.
Much better security system than 1G & 2G.
Support fire alarms.
Support mobile app.
TV streaming.
3D quality was high.
Support multimedia messages.
Location tracking.
Map location.
Page 23 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Limitations:
Mobile devices were costly.
Spectrum licenses are expensive.
To support a higher data rate requires higher bandwidth.
Features:
High data speed.
The maximum speed is 100 Mbps, which is 1 Gbps.
Improved security.
Voice calls service at low cost.
Multimedia message service.
Worldwide web access.
IP telephony.
Gaming service.
High-definition mobile TV.
Video conferencing.
3D TV connection without buffering.
Frequency 1800 MHz.
Global and scalable mobile networks.
Ad hoc and multi-hop networks.
High capacity and low bit per bit.
Limitations:
Expensive infrastructure.
Expensive hardware.
Expensive spectrum.
Page 24 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Features:
Deliver ultra-fast data.
Low latency in milliseconds.
Reliability of the network.
Better quality of almost all services.
Higher security.
Try to fulfill customer demands.
Higher connection density.
Better battery consumption.
Improved wireless coverage.
Higher download speed up to 10 Gbps.
24 to 47 GHz frequency.
GPS tracking.
Multimedia message experience for customers.
Supercharged system.
Support massive data rate for the internet of things.
Cost deduction for data.
Small cell technologies use.
b) Differentiate between OSI and TCP / IP network model. 6M
Ans.
OSI TCP / IP
Any six
OSI represents Open System TCP/IP model represents the valid points
Interconnection. Transmission Control Protocol 1M each
/ Internet Protocol.
Page 25 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 26 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
OSI Model
Page 27 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
OR
Advantages of WAN
Large area coverage: WAN covers a large geographical area
(1000 km or more than).
Higher bandwidth: WAN networks usually cover large
geographical areas.
Centralized data: Using the WAN network you can share the data
connected to all the devices in the respective network.
Disadvantages of WAN
Security issue: WAN faces more security problems than LAN and
MAN networks since many technologies are merged in WAN
networks. It can open a security gap, which paves the way of
occurring malicious attacks and identity intruders.
Installation cost: WANs are default complex and complicated
because of large geographical area coverage. Hence there is a set-
up cost in expensive WAN that also needs routers, switches, and
other security solutions.
Troubleshooting issues: Troubleshoot the big challenge on the
WAN network and it requires more time. If any issue occurs in the
computer network then it is the most difficult part to find out the
proper cause due to their broad coverage area.
Maintenance issues: In a WAN network, it is difficult to maintain
the network especially a data center that operates 24/7 is the
biggest challenge out of all. Here 24/7 needs assistance from
network administrators and technicians. In a WAN, maintenance
cost is high.
Page 28 / 28