Important Instructions To Examiners:: Q. No Sub Q.N. Answer Marking Scheme

Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Important Instructions to examiners:


1) The answers should be examined by key words and not as word-to-word as given in the
model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner may
try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in
the figure. The figures drawn by candidate and model answer may vary. The examiner
may give credit for anyequivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s answers
and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi
and Bilingual (English + Marathi) medium is introduced at first year of AICTE diploma
Programme from academic year 2021-2022. Hence if the students in first year (first and
second semesters) write answers in Marathi or bilingual language (English +Marathi), the
Examiner shall consider the same and assess the answer based on matching of concepts
with model answer.

Q. Sub Answer Marking


No Q.N. Scheme
1. Attempt any FIVE of the following: 10
a) List advantages of Computer Network ( any two) 2M
Ans. 1. Convenient resource sharing
2. Connectivity Any two
3. Security advantages
4. Easy File/Data Sharing 1M each
5. Highly Flexible
6. Reduced cost
7. Great storage capacity

b) Draw process of Data Communication 2M

Page 1 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Ans. Correct
labelled
diagram 2M

c) List Networking Topologies 2M


Ans. The structure of a network including physical arrangement of devices
is called topology. Topologies are of Listing any
following types: four
1. Mesh Topology topologies
2. Star Topology 2M
3. Bus Topology
4. Ring Topology
5. Hybrid Topology
6. Tree Topology
d) State types of errors 2M
Ans. In Communication system any distortion of transmitted signal before
reaching its destination is called Error. Each type
Errors can be of 2 types 1M
1. Content errors
 Single-Bit Error
 Burst Error
2. Flow Integrity Errors
e) Draw a neat labelled diagram of co-axial cable 2M
Ans.
Correct
labelled
diagram 2M

Page 2 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

f) Compare LRC and VRC 2M


Ans. S. Vertical Redundancy Longitudinal Redundancy
Any two
No. Check (VRC) Check (LRC)
valid
differences
1. In this redundant bit In this redundant row of bits is
1M each
called parity bit is added added to the whole block.
to each data unit.

2. VRC can detect single LRC can detect burst errors.


bit errors.

3. It is not capable of If two bits in data unit are


checking the burst error damaged and also in other data
in case of change of bits unit the same bits are damaged
is even. at same position, then it is not
capable of detecting such kind
of error.

4. It is also known as parity It is also known as 2-D parity


checker. checker.

5. The advantage of using The advantage of using LRC


VRC is that it can checks over VRC is that it can check all
all single bit errors but the burst errors.
can check odd parity
only in the case of
change of odd bits.

g) List any four networking connecting devices 2M


Ans. Followings are the Network Control/Connecting device: Listing Any
1. Repeater four devices
2. Hub 2M
3. Switch
4. Bridge
5. Router
6. Gateway
7. Modem

Page 3 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

2. Attempt any THREE of the following: 12


a) Compare client server and peer to peer networks 4M
Ans. Basis of Client-Server Peer-to-Peer Network Any four
Comparison Network points 1M
Basic In a client-server In a peer-to-peer network, each
network, certain every node act as a client and
computers act as server server.
and other act as clients.
Expense A Client-Server A Peer-to-Peer is less
network is more expensive to implement.
expensive to
implement.
Stability It is more It is less stable and scalable, if
stable and scalable tha the number of peers increases
n a peer-to-peer in the system.
network.
Data In a client-server In a peer-to-peer network,
network, the data is each peer has its own data.
stored in a centralized
server.
Server A server may get A server is not bottlenecked
overloaded when many since the services are
clients make dispersed among numerous
simultaneous service servers using a peer-to-peer
requests. network.
Focus Sharing the Connectivity.
information.
Service The server provides Each node has the ability to
the requested service both request and delivers
in response to the services.
client's request.
Performance Because the server Because resources are shared
does the bulk of the in a big peer-to-peer network,
work, performance is performance will likely to
unaffected by the suffer.
growth of clients.
Security A Client-Server The network's security
network is a secured deteriorates, and its
network because the susceptibility grows as the
server can verify a number of peers rises.
client's access to any
area of the network,
making it secure.

Page 4 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

b) Draw a neat labeled diagram of Twisted Pair Cable and state its 4M
types.
Ans. A twisted pair cable comprises of two separate insulated copper 3M for
wires, which are twisted together and run in parallel, as shown in correct
following fig: labeled
diagram,

1M for types

One of the wires is used to carry signals to the receiver and the other
is used only as ground reference. There are two type of twisted pair
cable:
1. Unshielded Twisted Pair (UTP)
2. Shielded Twisted Pair (STP)
c) Explain wireless LAN 802.11 architecture. 4M
Ans. IEEE has defined the specifications for a wireless LAN, called IEEE
802.11, which covers the physical and data link layers. 2M for BSS
IEEE 802.11 defines two types of services which are explanation
1) Basic Service Set (BSS) with
2) Extended Service Set (ESS) diagram,
1) Basic Service Set (BSS) 2M for ESS
IEEE 802.11 defines the basic service set (BSS) as the building block explanation
of a wireless LAN. with diagram
A basic service set is made of stationary or mobile wireless stations
and an optional central base station, known as the access point (AP).
Figure shows two sets in this standard. The BSS without an AP is a
stand-alone network is called an ad hoc architecture. A BSS with an
AP is referred to as an infrastructure network

Page 5 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

2) Extended Service Set (ESS)


An extended service set (ESS) is made up of two or more BSSs with
APs. In this case, the BSSs are connected through a distribution
system, which is usually a wired LAN. The distribution system
connects the APs in the BSSs. Note that the extended service set uses
two types of stations: mobile and stationary. The mobile stations are
normal stations inside a BSS. The stationary stations are AP stations
that are part of a wired LAN. Figure shows an ESS.

Extended service set (ESS)


When BSSs are connected, the stations within reach of one another
can communicate without the use of an AP. However,
communication between two stations in two different BSSs usually
occurs via two APs.

d) Explain OSI reference model in detail. 4M


Ans. OSI model (Open System Interconnection) model was developed by
ISO (international standard organization) which provides way to Explanation
understand how internetwork operates. It gives guidelines for creating 3M
network standard. OSI model has 7 layers as shown in the figure.
Diagram
1M

Page 6 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Physical Layer: OSI Model, Layer 1 conveys the bit stream -


electrical impulse, light or radio signal — through the network at the
electrical and mechanical level. It provides the hardware means of
sending and receiving data on a carrier, including defining cables,
cards and physical aspects.

Data Link Layer: At OSI Model, Layer 2, data packets are encoded
and decoded into bits. It furnishes transmission protocol knowledge
and management and handles errors in the physical layer, flow
control and frame synchronization..

Network Layer: Layer 3 provides switching and routing


technologies, creating logical paths, known as virtual circuits, for
transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error
handling, congestion control and packet sequencing.

Transport Layer: This Layer, provides transparent transfer of data


between end systems, or hosts, and is responsible for end-to-end error
recovery and flow control. It ensures complete data transfer from
source to destination.

Session Layer: This layer establishes, manages and terminates


connections between applications. The session layer sets up,
coordinates, and terminates conversations, exchanges, and dialogues
between the applications at each end. It deals with session and
connection coordination

Presentation Layer: This layer provides independence from


differences in data representation (e.g., encryption) by translating
from application to network format, and vice versa. The presentation
layer works to transform data into the form that the application layer
can accept. This layer formats and encrypts data to be sent across a
network, providing freedom from compatibility problems. It is
sometimes called the syntax & semantics.

Application Layer: This Layer, supports application and end-user


processes. Everything at this layer is application-specific. This layer
provides application services for file

Page 7 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

3. Attempt any THREE of the following: 12


a) Draw and explain piconet Bluetooth architecture 4M
Ans. Piconet
• Piconet is a Bluetooth network that consists of one primary (master) Explanation
node and seven active secondary (slave) nodes. 2M
• Thus, piconet can have up to eight active nodes (1 master and 7
Diagram 2M
slaves) or stations within the distance of 10 meters.
• There can be only one primary or master station in each piconet.
• The communication between the primary and the secondary can be
one-to-one or one-to-many.

 All communication is between master and a slave. Salve-slave


communication is not possible.
 In addition to seven active slave station, a piconet can have upto
255 parked nodes. These parked nodes are secondary or slave
stations and cannot take part in communication until it is moved
from parked state to active state.
 If slave is not communicating for a certain period of time then they
can be set to in active mode so that it enters in low power state. In
order to save the power because Normally these Bluetooth devices
takes power from batteries.
b) Explain satellite communication with the help of neat diagram 4M
Ans. 1. Satellite is a natural /man-made system which is kept in
continuous rotation around the earth in a specific orbit at a specific Explanation
2M
height above the earth and with specific speed. Diagram 2M
2. In satellite communication, signal transferring between the sender
and receiver is done with the help of satellite.
3. In this process, the signal which is basically a beam of modulated
microwaves is sent towards the satellite called UPLINK (6 GHz).

Page 8 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

4. Then the satellite amplifies the signal and sent it back to the
receiver’s antenna present on the earth’s surface called as
DOWNLINK (4Ghz), as shown in the diagram given

As the entire signal transferring is happening in space. Thus, this type


of communication is known as space communication. The satellite
does the functions of an antenna and the repeater together
c) Compare circuit-switching and packet-switching, consider 4M
following parameter orientation, flexibility, technology and layers

Page 9 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Ans. Parameter Circuit-switching Packet-switching Each


comparison
orientation Connection oriented. Connectionless. parameter
1M
flexibility Inflexible, because once Flexible, because a route
a path is set all parts of a is created for each
transmission follows the packet to travel to the
same path. destination.
technology Circuit switching can be Packet Switching has
achieved using two two approaches
technologies, either Datagram Approach and
Space Division Virtual Circuit
Switching or Time- Approach.
Division Switching.
layers Circuit Switching is Packet Switching is
implemented at Physical implemented at Network
Layer. Layer.

d) Explain the function of presentation layer and network layer 4M


Ans. Functions of Presentation layer:
Translation: The processes in two systems exchange the information Explanation
in the form of character strings, numbers and so on. Different of Each layer
computers use different encoding methods, the presentation layer 2M
handles the interoperability between the different encoding methods.
It converts the data from sender-dependent format into a common
format and changes the common format into receiver-dependent
format at the receiving end.
Encryption: Encryption is needed to maintain privacy. Encryption is
a process of converting the sender-transmitted information into
another form and sends the resulting message over the network.
Compression: Data compression is a process of compressing the
data, i.e., it reduces the number of bits to be transmitted. Data
compression is very important in multimedia such as text, audio,
video.
Functions of Network Layer:
Internetworking: An internetworking is the main responsibility of
the network layer. It provides a logical connection between different
devices.

Page 10 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Addressing: A Network layer adds the source and destination address


to the header of the frame. Addressing is used to identify the device
on the internet.
Routing: Routing is the major component of the network layer, and it
determines the best optimal path out of the multiple paths from source
to the destination.
Packetizing: A Network Layer receives the packets from the upper
layer and converts them into packets. This process is known as
Packetizing. It is achieved by internet protocol (IP).
4. Attempt any THREE of the following: 12
a) With suitable diagram Describe 4M
i) STAR Topology
ii) RING Topology
i) STAR Topology
Ans. Each
Star topology is a network topology where each individual piece of a description
network is attached to a central node (often called a hub or switch). with diagram
The attachment of these network pieces to the central component is 2M
visually represented in a form similar to a star.

The hub and hosts, and the transmission lines between them, form a
graph with the topology of a star. Data on a star network passes
through the hub before continuing to its destination. The hub
manages and controls all functions of the network. It also acts as a
repeater for the data flow.

Fig: Star Topology


The star network is one of the most common computer network
topologies.

Page 11 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

ii) RING Topology


A ring network is a network topology in which each node connects to
exactly two other nodes, forming a single continuous pathway for
signals through each node - a ring. Data travels from node to node,
with each node along the way handling every packet.

Fig: Ring topology

Ring topology refers to a specific kind of network setup in which


devices are connected in a ring and pass information to or from each
other according to their adjacent proximity in the ring structure.
b) Describe the various IP address classes with suitable example 4M
Ans. An IP address is a unique address that identifies a device on the 1M for
internet or a local network. IP stands for "Internet Protocol," which is diagram.
the set of rules governing the format of data sent via the internet or
local network. 2M for
There are different types of IP Address classes Class A, Class B, explanation
Class C, Class D, Class E.
1M for
example
Class A :

In this, the first bit is ‘0’. The next 7 bits are used indicate network id.
Rest of the 3 bytes are used to indicate host id. Thus the First Byte in
Class A type of IP address will have a range from 0 to 126.
Example : 10.1.2.1 In this, the first byte ‘10’ has first bit 0, and hence
it belongs to class A IP address.

Page 12 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Class B :
Class B IP address format is given below:

In this, the first two bits are ‘1 0’. The next 14 bits are used indicate
network id. Rest of the 2 bytes are used to indicate host id. Thus, the
first byte of class B type of IP address has a range from 128 to 191.
Example : 187.4.5.1
In this address, the first byte ‘187’ has first two bits as 10.

Class C :
Class C IP address format is given below:

In this, the first three bits are ‘1 1 0’. The next 21 bits are used
indicate network id. Rest of the One byte is used to indicate host id.
Thus the first byte of the IP address in class C has range from 192 to
223.
Example : 192.168.1.2
In this the first three bits are 110, which represents the Class C type
IP address.

Class D:
Class D IP address format is given below:

If first 4 bits are ‘1 1 1 0’ the IP address belongs to class D. The IPv4


networking standard defines Class D addresses as reserved for
multicast. Multicast is a mechanism for defining groups of nodes and
sending IP messages to that group rather than to every node on the

Page 13 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

LAN (broadcast) or just one other node (unicast). Multicast is mainly


used on research networks. As with Class E, Class D addresses
should not be used by ordinary nodes on the Internet. The range for
first byte of class D starts from 224 till 239.
Example: 225.25.2.1
Here, the first 4 bits are 1110

Class E:
Class E IP address format is given below:

If first 5 bits are ‘1 1 1 1 0’ the IP address belongs to class E. For


class E minimum value for reserved address is 240.0.0.0 to
255.255.255.255. These are used for research work in IP addresses.
Example: 245.5.6.2 Here, the first 5 bits are 11110.
c) Describe multiplexing techniques 4M
Ans. Multiplexing is a technique by which different analog and digital
Explanation
streams of transmission can be simultaneously processed over a of
shared link. Multiplexing divides the high capacity medium into low- multiplexing-
2M
capacity logical medium which is then shared by different streams.
Communication is possible over the air (radio frequency), using a Each
physical media (cable), and light (optical fiber). All mediums are technique
1M each
capable of multiplexing. When multiple senders try to send over a
single medium, a device called Multiplexer divides the physical
channel and allocates one to each. On the other end of
communication, a De-multiplexer receives data from a single
medium, identifies each, and sends to different receivers.
Different multiplexing techniques are
1. Frequency Division multiplexing
2. Time division multiplexing

Page 14 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Frequency Division Multiplexing: When the carrier is frequency,


FDM is used. FDM is an analog technology. FDM divides the
spectrum or carrier bandwidth in logical channels and allocates one
user to each channel. Each user can use the channel frequency
independently and has exclusive access of it. All channels are divided
in such a way that they do not overlap with each other. Channels are
separated by guard bands. Guard band is a frequency which is not
used by either channel.

Time Division Multiplexing: TDM is applied primarily on digital


signals but can be applied on analog signals as well. In TDM the
shared channel is divided among its user by means of time slot. Each
user can transmit data within the provided time slot only. Digital
signals are divided in frames, equivalent to time slot i.e. frame of an
optimal size which can be transmitted in given time slot.

When channel A transmits its frame at one end, the De-multiplexer


provides media to channel A on the other end. As soon as the channel
A’s time slot expires, this side switches to channel B. On the other
end, the De-multiplexer works in a synchronized manner and
provides media to channel B. Signals from different channels travel
the path in interleaved manner.

Page 15 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

d) Compare IPV4 and IPV6 packet format 4M


Ans. IPV4 IPV6
Any four
Source and destination Source and destination comparisons
addresses are 32 bits (4 bytes) addresses are 128Bits (16 1M each
in length. bytes) in length.
No. addresses are limited to Larger addressing area
number of bits (32 bits)
Uses broadcast addresses to There are no IPv6 broadcast
send traffic to all nodes on aaddresses. Instead, multicast
subnet. scoped addresses aroused
Fragmentation is supported at Fragmentation is not
Originating hosts andsupported at routers. It is only
intermediate routers. supported at the originating
host
IP header includes a IP header does not include a
checksum checksum
IP header includes options All optional data is moved to
IPV6extension headers
IPV4 has classful addressing Classless addressing scheme.
scheme, includes classes like
A,B,C,D and E.
Uses decimal dotted notation Uses hexadecimal notation

e) Differentiate between Hub and Switch(any four points) 4M


Ans. Each correct
HUB Switch
point 1M
Hub is operated on Physical While switch is operated on
layer of OSI model. Data link layer of OSI Model.
Hub have 4/12 ports. Switch can have 24 to 48
ports.
Hub is not an intelligent device While switch is an intelligent
that sends message to all ports device that sends message to
hence it is comparatively selected destination, so it is
inexpensive. Hub cannot be expensive. Switch can be used
used as a repeater as a repeater

Page 16 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Speed of original hub 10Mbps Maximum speed is 10Mbps to


and modern internet hub is 100Mbps.
100Mbps
5. Attempt any TWO of the following: 12
a) Explain modes of communication 6M
i) Simplex
ii) Half-Duplex
iii) Full-Duplex
Ans. Transferring data between two devices is known as Transmission For simplex
Mode or Communication mode. 2M with
Simplex Diagram
 In simplex mode, the communication is unidirectional, as on a
For half
one-way street.
duplex 2M
 Only one of the two devices on a link can transmit; the other can with
only receive. Diagram
 Keyboards and traditional monitors are examples of simplex
devices. For full
Half-Duplex duplex
 In half-duplex mode, each station can both transmit and receive, 2M with
but not at the same time. Diagram
 When one device is sending, the other can only receive, and vice
versa.
 Walkie-talkies and CB (citizens band) radios are both half-duplex
systems.
Full-Duplex
 In full-duplex mode (also called duplex), both stations can
transmit and receive simultaneously.
 . In full-duplex mode, signals going in one direction share the
capacity of the link: with signals going in the other direction.
 This sharing can occur in two ways: Either the link must contain
two physically separate transmission paths, one for sending and
the other for receiving; or the capacity of the channel is divided
between signals traveling in both directions.
 One common example of full-duplex communication is the
telephone network.
Communication between two devices can be simplex, half-duplex, or
full-duplex as shown in figure below.

Page 17 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Fig: Data flow (simplex, half-duplex, and full-duplex)


b) Draw and explain fiber-optic cable. 6M
Ans. A fiber-optic cable is made of glass or plastic and transmits signals in
the form of light. Correct
labelled
Diagram
3M

Relevant
Explanation
3M

The structure of an optical fibre cable is displayed in the above figure.


It involves an inner glass core surrounded by a glass cladding that
reflects the light into the core. Each fibre is encircled by a plastic
jacket.
In fibre optics, semiconductor lasers transmit data in the form of light
along with hair-thin glass (optical) fibres at the speed of light with no
significant loss of intensity over very long distances. The system
includes fibre optic cables that are made of tiny threads of glass or
plastic.

Page 18 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Current technology supports two modes (multimode and single mode)


for propagating light along optical channels, each requiring fiber with
different physical characteristics. Multimode can be implemented in
two forms: step-index or graded-index.
c) Explain SMTP, HTTP, ARP protocol in detail. 6M
Ans. SMTP (Simple Mail Transfer Protocol):
SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used Explanation
in sending and receiving email. SMTP is an application layer of each
protocol. protocol 2M
SMTP Model:

Fig: SMTP Model


Components of SMTP
 Mail User Agent (MUA)
 Mail Submission Agent (MSA)
 Mail Transfer Agent (MTA)
 Mail Delivery Agent (MDA)

Working of SMTP
1. Communication between the sender and the receiver:
The sender’s user agent prepares the message and sends it to the
MTA. The MTA’s responsibility is to transfer the mail across the
network to the receiver’s MTA. To send mail, a system must have a
client MTA, and to receive mail, a system must have a server MTA.

2. Sending Emails:
Mail is sent by a series of request and response messages between
the client and the server. The message which is sent across consists of
a header and a body. A null line is used to terminate the mail header
and everything after the null line is considered the body of the

Page 19 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

message, which is a sequence of ASCII characters. The message body


contains the actual information read by the receipt.

3. Receiving Emails:
The user agent on the server-side checks the mailboxes at a particular
time of intervals. If any information is received, it informs the user
about the mail. When the user tries to read the mail it displays a list of
emails with a short description of each mail in the mailbox. By
selecting any of the mail users can view its contents on the terminal.
HTTP (Hypertext Transfer Protocol):
 The HTTP protocol can be used to transfer the data in the form of
plain text, hypertext, audio, video, and so on.
 HTTP is similar to SMTP as the data is transferred between client
and server.
 The HTTP differs from the SMTP in the way the messages are
sent from the client to the server and from server to the client.
 SMTP messages are stored and forwarded while HTTP messages
are delivered immediately.
 HTTP is an application layer protocol

Features of HTTP:
 Connectionless protocol: HTTP is a connectionless protocol.
HTTP client initiates a request and waits for a response from the
server.
 Media independent: HTTP protocol is a media independent as
data can be sent as long as both the client and server know how to
handle the data content.
 Stateless: HTTP is a stateless protocol as both the client and
server know each other only during the current request.

HTTP messages are of two types: request and response. Both the
message types follow the same message format.
Request Message: The request message is sent by the client that
consists of a request line, headers, and sometimes a body.

Page 20 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Response Message: The response message is sent by the server to the


client that consists of a status line, headers, and sometimes a body.

ARP( Address Resolution Protocol):


ARP works at Data link layer in the OSI model. It is responsible to
find the hardware address of a host from a known IP address. The
ARP’s main task is to convert the 32-bit IP address (for IPv4) to a 48-
bit MAC address.

ARP Packet Format


The ARP packet format is used for ARP requests and replies and
consists of multiple fields including hardware type, protocol type,
hardware and protocol size, operation, sender and target hardware,
and IP addresses.

6 Attempt any TWO of the following: 12


a) Explain mobile generations. 6M
i. 1G
ii. 2G
iii. 3G
iv. 4G
v. 5G
Ans. Mobile communication generation includes the evolving mobile Definition of
communications technologies that provide increasing data rates, Mobile
faster response times and better performance. New Standards are generation
developed from time to time to achieve these characteristics. 1M
First Generation (1G):
In 1979, Nippon Telegraph and Telephone Company (NTTC)
launched the first generation mobile network in Tokyo, Japan. It
expanded the whole of Japan within five years. Then worldwide, it
was known as the 1G Cellular Network.

Page 21 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Features:
 Analog technology. Each
 Maximum speed 2.4kbps. generation
with any two
 Nordic Mobile Telephone System (NMTS). valid
 Advanced Mobile Phone System (AMPS). features&
 Total Access Communication System (TACS). limitations
 Only voice service. 1M
 800 & 900 MHz frequency.
 10 MHz bandwidth.
 Frequency modulation.
 Frequency Division Multiple Access (FDMA) technique.

Limitations:
 Ordinary battery life.
 Due to interference, voice quality is poor.
 The number of cell coverage and limited users.
 Between similar systems, roaming was not possible.
 Flawed security system.
 Not convenient to carry as it was significant in size.

Second Generation (2G):


In 1991, a second-generation mobile network was launched by
Radiolinja based on the GSM. It’s a digital network, and providing a
reliable & secure communication channel was the 2G network’s
primary motive. Because of transmitting wireless transmission of 2G
mobile network was known as the Global System of Mobile
Communication. 2G network also has some features and limitations.

Features:
 Digital technology.
 Small data services like SMS and MMS (Multimedia Message
System).
 Roaming was possible.
 First internet system with poor data rate.
 Better voice call.
 Conference calls are allowed.
 Comparatively enhanced security.
 Data speed up to 64 Kbps.

Page 22 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

 30 to 200 kHz bandwidth.

Limitations:
 Restricted mobility.
 Data rate low.
 Fewer features.
 Less hardware capability.
 User numbers are limited.

Third Generation (3G):


To standardize any generation of mobile networks takes
approximately ten years. From this perspective, 3G was commercially
introduced in 2001 and first used in Europe, Japan, and China. It is
the best popular wireless technology developed by UMTS, which
means Universal Mobile Telecommunications System. To facilitate
better voice calls and data systems were the main target of the 3G
network.
Some unique features and limitations are listed below-

Features:
 High data rates with low cost.
 Email.
 Web browsing.
 Video downloading.
 Picture sharing.
 Better voice call.
 15 to 20 MHz bandwidth.
 Speed 2 Mbps.
 Much better security system than 1G & 2G.
 Support fire alarms.
 Support mobile app.
 TV streaming.
 3D quality was high.
 Support multimedia messages.
 Location tracking.
 Map location.

Page 23 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

Limitations:
 Mobile devices were costly.
 Spectrum licenses are expensive.
 To support a higher data rate requires higher bandwidth.

Fourth Generation (4G):


According to the ITU (International Telecommunication Union) in
December 2010, 4G refers to LTE (Long Term Evolution), HSPA+
(Evolved High-Speed Packet Access), and WiMAX (Worldwide
Interoperability for Microwave Access). It is a broadband cellular
network different from 1G, 2G, and 3G mobile networks. 4G
network was developed by IEEE and here used LTE and LTE
advanced technology. It focuses on providing high-speed and quality
data rates. This improved data service comes from the most used LTE
system. WiMAX increases the network performance of 4G mobile.
Key features and demerits are given below-

Features:
 High data speed.
 The maximum speed is 100 Mbps, which is 1 Gbps.
 Improved security.
 Voice calls service at low cost.
 Multimedia message service.
 Worldwide web access.
 IP telephony.
 Gaming service.
 High-definition mobile TV.
 Video conferencing.
 3D TV connection without buffering.
 Frequency 1800 MHz.
 Global and scalable mobile networks.
 Ad hoc and multi-hop networks.
 High capacity and low bit per bit.

Limitations:
 Expensive infrastructure.
 Expensive hardware.
 Expensive spectrum.

Page 24 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

 A comprehensive upgrade is time-consuming.

Fifth Generation (5G):


5G network is currently under development that began in 2019 by
cellular phone companies worldwide. According to the GSM, up to
2025, more than 1.7 billion subscribers would have a 5G mobile
network. This network is connected with massive MIMO to improve
connection, data speed, and other services. It also provides higher
downloading speed and higher bandwidth with the association of
different devices. There are several features and due to technical
problems also has some limitations. They are-

Features:
 Deliver ultra-fast data.
 Low latency in milliseconds.
 Reliability of the network.
 Better quality of almost all services.
 Higher security.
 Try to fulfill customer demands.
 Higher connection density.
 Better battery consumption.
 Improved wireless coverage.
 Higher download speed up to 10 Gbps.
 24 to 47 GHz frequency.
 GPS tracking.
 Multimedia message experience for customers.
 Supercharged system.
 Support massive data rate for the internet of things.
 Cost deduction for data.
 Small cell technologies use.
b) Differentiate between OSI and TCP / IP network model. 6M
Ans.
OSI TCP / IP
Any six
OSI represents Open System TCP/IP model represents the valid points
Interconnection. Transmission Control Protocol 1M each
/ Internet Protocol.

Page 25 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

OSI is a generic, protocol TCP/IP model depends on


independent standard. It is standard protocols about
acting as an interaction which the computer network
gateway between the network has created. It is a connection
and the final-user. protocol that assigns the
network of hosts over the
internet.

The OSI model was The protocols were created


developed first, and then first and then built the TCP/IP
protocols were created to fit model.
the network architecture’s
needs.

The OSI model defines It does not mention the


administration, interfaces and services, interfaces, and
conventions. It describes protocols.
clearly which layer provides
services.

The protocols of the OSI The TCP/IP model protocols


model are better unseen and are not hidden, and we cannot
can be returned with another fit a new protocol stack in it.
appropriate protocol quickly.

It provides both connection It provides connectionless


and connectionless oriented transmission in the network
transmission in the network layer and supports connecting
layer; however, only and connectionless-oriented
connection-oriented transmission in the transport
transmission in the transport layer.
layer.

It uses a vertical approach. It uses a horizontal approach.

The smallest size of the OSI The smallest size of


header is 5 bytes. the TCP/IP header is 20 bytes.

Page 26 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

OSI Model

c) Explain wide Area Networks along with its advantages and 6M


Disadvantages.
 WANs have a large capacity, connecting a large number of
Ans. computers over a large area, and are inherently scalable.
Explanation
 They facilitate the sharing of regional resources.
of WAN
 They provide uplinks for connecting LANs and MANs to the with diagram
Internet. 2M
 Communication links are provided by public carriers like
telephone networks, network providers, cable systems, satellites Advantages
etc. 2M
 Typically, they have low data transfer rate and high propagation
delay, i.e. they have low communication speed. Disadvatages
Examples of WAN: -2M
 The Internet
 4G Mobile Broadband Systems
 A network of bank cash dispensers.

Page 27 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2023 EXAMINATION


MODEL ANSWER
Subject: Data Communication & Computer Network Subject Code: 22414

OR

Advantages of WAN
 Large area coverage: WAN covers a large geographical area
(1000 km or more than).
 Higher bandwidth: WAN networks usually cover large
geographical areas.
 Centralized data: Using the WAN network you can share the data
connected to all the devices in the respective network.

 Disadvantages of WAN
 Security issue: WAN faces more security problems than LAN and
MAN networks since many technologies are merged in WAN
networks. It can open a security gap, which paves the way of
occurring malicious attacks and identity intruders.
 Installation cost: WANs are default complex and complicated
because of large geographical area coverage. Hence there is a set-
up cost in expensive WAN that also needs routers, switches, and
other security solutions.
 Troubleshooting issues: Troubleshoot the big challenge on the
WAN network and it requires more time. If any issue occurs in the
computer network then it is the most difficult part to find out the
proper cause due to their broad coverage area.
 Maintenance issues: In a WAN network, it is difficult to maintain
the network especially a data center that operates 24/7 is the
biggest challenge out of all. Here 24/7 needs assistance from
network administrators and technicians. In a WAN, maintenance
cost is high.

Page 28 / 28

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy