[go: up one dir, main page]

100% found this document useful (1 vote)
2K views21 pages

Technical Exam Guide

1. The document provides instructions to examiners for evaluating answers to a computer network exam for the Maharashtra State Board of Technical Education. 2. It includes a sample exam question and answer key that addresses topics like applications of computer networks, repeaters, the OSI model layers, network typologies, network layer protocols, IP addressing, and network devices used in tree topologies. 3. The instructions emphasize assessing student understanding over exact word-for-word answers and allow for variation in diagrams or code while still crediting equivalent concepts. Language errors and different numerical values are not heavily penalized.

Uploaded by

jacksparrowcom4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views21 pages

Technical Exam Guide

1. The document provides instructions to examiners for evaluating answers to a computer network exam for the Maharashtra State Board of Technical Education. 2. It includes a sample exam question and answer key that addresses topics like applications of computer networks, repeaters, the OSI model layers, network typologies, network layer protocols, IP addressing, and network devices used in tree topologies. 3. The instructions emphasize assessing student understanding over exact word-for-word answers and allow for variation in diagrams or code while still crediting equivalent concepts. Language errors and different numerical values are not heavily penalized.

Uploaded by

jacksparrowcom4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given
in the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components
indicated in the figure. The figures drawn by candidate and model answer may
vary. The examiner may give credit for anyequivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the
assumed constant values may vary and there may be some difference in the
candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner
of relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program
based on equivalent concept.
8) As per the policy decision of Maharashtra State Government, teaching in
English/Marathi and Bilingual (English + Marathi) medium is introduced at first year
of AICTE diploma Programme from academic year 2021-2022. Hence if the
students in first year (first and second semesters) write answers in Marathi or
bilingual language (English +Marathi), the Examiner shall consider the same and
assess the answer based on matching of concepts with model answer.

Q. Sub Answer Marking


No Q.N. Scheme
1. Attempt any FIVE of the following: 10
a) State any two application of computer networks 2M
Ans.  Marketing and sales Any 2
application
 Financial services 1M each
 Information services
 Banking
 Television
 E-mail
 Electronic data interchange (EDI)
 Teleconferencing
b) Describe use of repeaters. 2M
Ans. A repeater is a network device that retransmits a received signal with Explanation
more power and to an extended geographical or topological network 2M
boundary than what would be capable with the original signal.

Page 1 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417
A repeater is implemented in computer networks to expand the
coverage area of the network, repropagate a weak or broken signal
and or service remote nodes. Repeaters amplify the received/input
signal to a higher frequency domain so that it is reusable, scalable and
available.

Repeaters were introduced in wired data communication networks


due to the limitation of a signal in propagating over a longer distance
and now are a common installation in wireless networks for
expanding cell size.
c) List layers of OSI model. 2M
Ans. 1. Physical Layer. Listing all
2. Data Link Layer. layers 2M
3. Network Layer.
4. Transport Layer.
5. Session Layer.
6. Presentation Layer
7. Application Layer

d) Classify computer networks based on transmission technology. 2M


Ans. There are two types of networks based on transmission, Each correct
definition 2M
Broadcast Network: In this type of network many computer
networks are connected through a single communication channel i.e.
all the data is shared through this single channel. In packets, data is
transferred from one computer and received by other.

Point to Point: This type of network is also known as Store and


Forward network. It is a private network that securely connects two
or more locations for data transmission. It is a close connection type
between two or more endpoints.
e) State any two network layer protocols. 2M
Ans. The network layer protocols are as follows: Any 2
 IP: primary protocol, in charge of best effort host-to-host protocols 1M
each
transmission
 ARP: maps the next hop's IP address to its MAC/physical address
(used for sending packets to the data-link layer)
 ICMP: Hosts and routers use this protocol to handle uncommon
circumstances such as IP packet-header problems, inaccessible

Page 2 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417
hosts and networks, and so on.
 IGMP: Hosts and routers employ it to perform efficient network-
layer multi-casting.
 Routing protocols: is charge of routing table maintenance
f) Define IP address. 2M
Ans. IP address: An Internet Protocol address (IP address) is a numerical Correct
label assigned to each device connected to a computer network that definition 2M
uses the Internet Protocol for communication.
Or
An IP address is an address used to uniquely identify a device on an
IP network.
Classes:
Class A
Class B
Class C
Class D
Class E
g) Write any two connecting devices used for tree topology. 2M
Ans. Hub: A hub is a physical layer networking device which is used to Any 2 devices
connect multiple devices in a network. They are generally used to 1M each
connect computers in a LAN.

Switch: A switch is a multi-port bridge with a buffer and a design


that can boost its efficiency (large number of ports implies less
traffic) and performance. They connect devices in a network and use
packet switching to send, receive or forward data packets or data
frames over the network.

Router: Router is network layer device that routes packets based on


their logical address (host to host address).A router is a device that
connects two or more packet-switched networks or subnet works.
They are responsible for receiving, analysing, and forwarding data
packets among the connected computer networks. When a data packet
arrives, the router inspects the destination address, consults its routing
tables to decide the optimal route and then transfers the packet along
this route.
2. Attempt any THREE of the following: 12
a) Differentiate between Hub & Switch on the basis of layer, port, 4M
device type and speed.

Page 3 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

Ans.
Parameters Hub Switch Each
difference
Layer 1M
Physical layer. Hubs Data Link Layer.
are classified as Layer Network switches
1 devices per the OSI operate at Layer 2 of the
model. OSI model.
port 4/12 port 24/48 ports
Devices Passive Device Active Device (With
type (Without Software) Software) &
Networking device
speed low High
b) Draw and explain TCP/IP protocol suit. 4M
Ans. TCP/IP Reference Model is a four-layered suite of communication
protocols. The four layers in the TCP/IP protocol suite are:

Diagram 2M

 Host-to- Host Layer: It is the lowest layer that is concerned with


the physical transmission of data. TCP/IP does not specifically define
any protocol here but supports all the standard protocols.
 Internet Layer: It defines the protocols for logical transmission of
data over the network. The main protocol in this layer is Internet Explanation
Protocol (IP) and it is supported by the protocols ICMP, IGMP, 2M
RARP, and ARP.
 Transport Layer: It is responsible for error-free end-to-end
delivery of data. The protocols defined here are Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP).
 Application Layer: This is the topmost layer and defines the
interface of host programs with the transport layer services. This layer
includes all high-level protocols like Telnet, HTTP, FTP, SMTP, etc

Page 4 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

c) Describe networking as a layered approach. 4M


Ans.  A communication subsystem is a complex piece of Hardware and
software. Early attempts for implementing the software for such Correct
description
subsystems were based on a single, complex, unstructured 4M
program with many interacting components. The resultant
software was very difficult to test and modify. To overcome such
problem, the ISO has developed a layered approach. In a layered
approach, networking concept is divided into several layers, and
each layer is assigned a particular task. Therefore, we can say that
networking tasks depend upon the layers.
 Layered Architecture: The main aim of the layered architecture is
to divide the design into small pieces. Each lower layer adds its
services to the higher layer to provide a full set of services to
manage communications and run the applications.
 It provides modularity and clear interfaces, i.e., provides
interaction between subsystems.
 It ensures the independence between layers by providing the
services from lower to higher layer without defining how the
services are implemented. Therefore, any modification in a layer
will not affect the other layers.
 The number of layers, functions, contents of each layer will vary
from network to network. However, the purpose of each layer is to
provide the service from lower to a higher layer and hiding the
details from the layers of how the services are implemented.
 The basic elements of layered architecture are services, protocols,
and interfaces.
o Service: It is a set of actions that a layer provides to the higher
layer.
o Protocol: It defines a set of rules that a layer uses to exchange
the information with peer entity. These rules mainly concern
about both the contents and order of the messages used.
o Interface: It is a way through which the message is transferred
from one layer to another layer.
 In a layer n architecture, layer n on one machine will have a
communication with the layer n on another machine and the rules
used in a conversation are known as a layer-n protocol.
Advantages:-
 Divide-and-conquer approach: Divide-and-conquer approach
makes a design process in such a way that the unmanageable tasks

Page 5 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417
are divided into small and manageable tasks. In short, we can say
that this approach reduces the complexity of the design.
 Modularity: Layered architecture is more modular. Modularity
provides the independence of layers, which is easier to understand
and implement.
 Easy to modify: It ensures the independence of layers so that
implementation in one layer can be changed without affecting
other layers.
 Easy to test: Each layer of the layered architecture can be
analyzed and tested individually.
d) Give the names of layers, where following protocols are belong to 4M
(i) SMTP (ii) TCP/UDP (iii) IP (iv) PPP Identified
Ans. 1.SMTP: Application Layer. four layers
1M each
2.TCP/UDP: Transport Layer.
3.IP:Network Layer
4.PPP: Data-Link Layer
3. Attempt any THREE of the following: 12
a) Classify computer networks based on transmission technology 4M
and network relationships
Ans. Classification of networks based on transmission technology:
 Broadcast network
Broadcast networks have a single communication channel that is
shared or used by all the machines on the network. Short messages Classification
called packets sent by any machine are received by all the others. ofbasednetworks
on
Broadcast systems generally use a special code in the address field transmission
for addressing a packet to all the concerned computers. This mode of technology
operation is called broadcasting. 2M
 Point-to-point network
Point to point networks consists of many connections between Network
individual pairs of machines. To go from the source to the destination Relationships
a packet on these types of networks may have to go through 2M
intermediate computers before they reach the desired computer.

Classification of networks based on Network Relationship:


 Client Server network
In this network, a centralized computer, server is used for sharing the
resources and providing services to other computers, clients. Thus,
the name Client Server. The servers store all the network's shared

Page 6 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417
files and applications programs, such as word processor documents,
compilers, database applications, spreadsheets, and the network
operating system. Client will send request to access information from
the server. Based on the request, server will send the required
information to the client.
 Peer to peer network
In this type of network, each computer/node shares its resources
using its own file system. There are no servers required in this
network. Thus, there is no centralized management, but each system
owns its resources and services to be shared with other computers.
b) With suitable diagram explain Tokan ring topology. What 4M
happens if tokan is lost?
Ans. 1. Token Ring uses a ring topology whereby the data is sent from one Diagram 1M
machine to the next and so on around the ring until it ends up back
Explanation
where it started. of tokan ring
2. It also uses a token passing protocol which means that a machine 2M
can only use the network when it has control of the Token, this
ensures that there are no collisions because only one machine can
use the network at any given time.
3. At the start, a free Token is circulating on the ring, this is a data
frame which to all intents and purposes is an empty vessel for
transporting data.
4. To use the network, a machine first must capture the free Token
and replace the data with its own message.

Fig: Token Ring Topology

Page 7 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417
In above diagram machine1 wants to send some data to machine4, so
it first must capture the free token. It then writes its data and the
recipient's address onto the token. The packet of data is then sent to
machine2 who reads the address, realizes it is not its own, so passes it
on to machine3. Machine3 does the same and passes the token on to
machine4.
If a token is lost in above network message cannot be transferred in a
Explanation
network and communication is interrupted. In this case the token will if tokan is
be lost. To deal with such situations, it is the responsibility of lost 1M
Monitor to generate new Token.
c) Describe specific functions of i) Transport Layer ii) Data Link 4M
Layer.
Ans. Functions of Transport Layer are: Any two
correct
1) Service Point Addressing: Transport Layer header includes service functions of
point address which is port address. This layer gets the message to the transport
correct process on the computer unlike Network Layer, which gets layer 2M
each packet to the correct computer.
2)
3) Segmentation and Reassembling: A message is divided into
segments; each segment contains sequence number, which enables
this layer in reassembling the message. Message is reassembled
correctly upon arrival at the destination and replaces packets which
were lost in transmission.
4)
5) Connection Control: It includes 2 types:
 Connectionless Transport Layer:
Each segment is considered as an independent packet and delivered to
the transport layer at the destination machine.

 Connection Oriented Transport Layer:
Before delivering packets, connection is made with transport layer at
the destination machine.
6) Flow Control: In this layer, flow control is performed end to end.
7) Error Control: Error Control is performed end to end in this layer to
ensure that the complete message arrives at the receiving transport
layer without any error. Error Correction is done through
retransmission.

Page 8 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

Functions of Data Link Layer:


1) Framing: Data-link layer takes packets from Network Layer and
encapsulates them into Frames. Then, it sends each frame bit-by-bit Any two
on the hardware. At receiver’ end, data link layer picks up signals correct
from hardware and assembles them into frames. functions of
Data link
2) layer 2M
3) Addressing: Data-link layer provides layer-2 hardware addressing
mechanism. Hardware address is assumed to be unique on the link. It
is encoded into hardware at the time of manufacturing.
4)
5) Synchronization: When data frames are sent on the link, both
machines must be synchronized in order to transfer to take place.
6)
7) Error Control: Sometimes signals may have encountered problem in
transition and the bits are flipped. These errors are detected and
attempted to recover actual data bits. It also provides error reporting
mechanism to the sender.
8)
9) Flow Control: Stations on same link may have different speed or
capacity. Data-link layer ensures flow control that enables both
machines to exchange data on same speed.

Multi-Access: When host on the shared link tries to transfer the data,
it has a high probability of collision. Data-link layer provides
mechanism such as CSMA/CD to equip capability of accessing a
shared media among multiple Systems.

d) Differentiate between TCP and UDP 4M


Ans.
Sr. TCP UDP
Any four
No. correct
1 TCP is a connection- UDP is the Datagram comparisons
oriented protocol. oriented protocol. This is 1M each
Connection orientation because there is no
means that the overhead for opening a
communicating devices connection, maintaining a
should establish a connection, and

Page 9 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

connection before terminating a connection.


transmitting data and UDP is efficient for
should close the broadcast and multicast
connection after type of network
transmitting the data. transmission.
2 TCP is reliable as it The delivery of data to the
guarantees delivery of data destination cannot be
to the destination router. guaranteed in UDP.
3 TCP provides extensive UDP has only the basic
error checking error checking mechanism
mechanisms. It is because using checksums.
it provides flow control
and acknowledgment of
data.
4 Sequencing of data is a There is no sequencing of
feature of Transmission data in UDP. If ordering is
Control Protocol (TCP). required, it has to be
This means that packets managed by the
arrive in-order at the application layer.
receiver.
5 TCP is comparatively UDP is faster, simpler and
slower than UDP. more efficient than TCP.
6 Retransmission of lost There is no retransmission
packets is possible in TCP, of lost packets in User
but not in UDP. Datagram Protocol (UDP).
7 TCP header size is 20 UDP Header size is 8
bytes. bytes.
8 TCP is heavy weight as it UDP is light weight.
needs three packets to
setup a connection
9 TCP is used by HTTP, UDP is used by DNS,
HTTPs, FTP, SMTP and DHCP, TFTP, SNMP,
TELNET. RIP, and VoIP.
4. Attempt any THREE of the following: 12
a) Define NOS. Explain its types and features (Any two type & 2 4M
features)
Ans. A network operating system (NOS) is a computer operating system
Definition
(OS) that is designed primarily to support workstations, personal 1M
computers and, in some instances, older terminals that are connected

Page 10 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417
on a local area network (LAN). The software behind a NOS allows
multiple devices within a network to communicate and share
resources with each other.
Types of network operating system:
There are two basic types of network operating system:
1. 1. Peer-to Peer NOS Any two types
It allows users to share resources and files located on their computers and two
features 3M
and to access shared resources found on other computers. In peer-to-
peer network, all computers have same privileges to use the resources
available on the network. Peer-to-peer networks are designed
primarily for small to medium local area networks.
Example: Windows for workgroups
2.
3. 2. Client/server NOS: It allows the network to centralize functions
and applications in one or more dedicated file servers. File servers
provide access to resources for clients and provide security. It allows
multiple users to simultaneously share the same resources irrespective
of physical location.
Example: Novell Netware, Windows 2000 Server.

Features of network operating systems:


 Features of network operating systems are typically associated
with user administration, system maintenance and resource
management functionality. This includes:
 Basic support for operating systems like protocol and processor
support, hardware detection and multiprocessing.
 Printer and application sharing.
 Common file system and database sharing.
 Network security capabilities such as user authentication and
access control.
 Directory Services.
 Backup and web services.
 Internetworking of various resources connected in the network.
 Providing access to remote printers, managing which users are
using which printers when, managing how print jobs are queued,
and recognizing when devices aren't available to the network.
 Enabling and managing access to files on remote systems,

Page 11 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

determining who can access what—and who can't.


 Granting access to remote applications and resources, such as the
Internet, and making those resources seem like local resources to
the user (the network is ideally transparent to the user).
 Providing routing services, including support for major
networking protocols, so that the operating system knows what
data to send where.
 Monitoring the system and security, to provide proper security
against viruses, hackers, and data corruption.
 Providing basic network administration utilities (such as SNMP,
or Simple Network Management Protocol), enabling an
administrator to perform tasks involving managing network
resources and users.
b) Draw a neat diagram of fiber optic cable and state its type (any 4M
Ans. two)

Diagram 2M

Any two types


2M

Types of fiber optic cable:


1. Single mode fiber optic
2. Multimode fiber optic

Page 12 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

c) Describe any four basic network services. 4M


Ans. 1. 1. Directory services: A directory service or name service maps the
names of network resources to their respective network addresses. It
is a shared information infrastructure for locating, managing, Description
administering and organizing everyday items and network resources, of any four
network
which can include volumes, folders, files, printers, users, groups,
services 1M
devices, telephone numbers and other objects. each
2. 2. e-Mail: Electronic mail services mean a service whereby
subscribers may send messages to one or more addressees and receive
messages using a combination of data storage and retransmission
techniques so that the final subscriber may recover the message.
3. File sharing: File sharing is the practice of sharing or offering
access to digital information or resources, including documents,
multimedia (audio/video), graphics, computer programs, images, and
e-books. It is the private or public distribution of data or resources in
a network with different levels of sharing privileges.
4. Instant messaging: Instant messaging (IM) technology is a type
of online chat allowing real-time text transmission over
the Internet or another computer network.
5. Online game :An online game is a video game that is either
partially or primarily played through the Internet or any other
computer network available.
6. Printing: Printing is a process for mass reproducing text
and images using a master form or template.
7. File server: A file server is a computer containing files available to
all users connected to a local-area network (LAN).
8. Voice over IP: VoIP (voice over Internet Protocol) is the
transmission of voice and multimedia content over an internet
connection. VoIP allows users to make voice calls from a computer,
smartphone, other mobile devices, special VoIP phones and
WebRTC-enabled browsers.
9. Video on demand: Video on demand (VOD) is a generic term
covering several areas. It includes all video content requested on-
demand by users. This could be premium movies or libraries of TV
shows, sporting events or concerts. It could also include user-created
video content.

Page 13 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

10. Video telephony: Video telephony is defined as full-duplex


telecommunications, where data flows two ways at the same time,
and participants can hear each other simultaneously, too.
11. World Wide Web
It is an information system on the internet which allows documents to
be connected to other documents by hypertext links, enabling the user
to search for information by moving from one document to another.
12. Simple Network Management Protocol
Simple Network Management Protocol (SNMP) is an application-
layer protocol for monitoring and managing network devices on a
local area network (LAN) or wide area network (WAN).
d) Describe any four classes of IPv4 addresses with its range. 4M
Ans. 1. Class A
 The first bit of the first octet is always set to 0 (zero). Thus, the Description
first octet ranges from 1 – 127, i.e. of any four
IPv4 classes
with range
1M each

 Class A addresses only include IP starting from 1.x.x.x to


126.x.x.x only.
 The default subnet mask for Class A IP address is 255.0.0.0
which implies that Class A addressing can have 126 networks
(27-2) and 16777214 hosts (224-2).

2. Class B
 An IP address which belongs to class B has the first two bits in
the first octet set to 10, i.e.

 Class B IP Addresses range from 128.0.x.x to 191.255.x.x.


 The default subnet mask for Class B is 255.255.x.x.
 Class B has 16384 (214) Network addresses and 65534 (216-2)
Host addresses.
3. Class C
 The first octet of Class C IP address has its first 3 bits set to 110,

Page 14 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

i.e.

 Class C IP addresses range from 192.0.0.x to 223.255.255.x.


 The default subnet mask for Class C is 255.255.255.x.
 Class C gives 2097152 (221) Network addresses and 254 (28-2)
host addresses.
4. Class D
 Very first four bits of the first octet in Class D IP addresses are set
to 1110, giving a range of

 Class D has IP address range from 224.0.0.0 to 239.255.255.255.


 Class D is reserved for Multicasting.
 In multicasting data is not destined for a particular host, that is
why there is no need to extract host address from the IP address,
and Class D does not have any subnet mask.

5. Class E
 This IP Class is reserved for experimental purposes only for R&D
or Study.
IP addresses in this class ranges from 240.0.0.0 to 255.255.255.254.
Like Class D, this class too is not equipped with any subnet mask.
e) Suggest suitable network computing model for a LAN of 25 4M
machines and 3 printers
Ans. Correct /
relevant
diagram with
suggested
specification
4M

Page 15 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

5. Attempt any TWO of the following: 12


a) Explain working of ARP and RARP. 6M
Ans. ARP:
ARP (Address Resolution Protocol) is a network layer protocol. As
Working of
ARP is a dynamic mapping protocol, each host in the network knows ARP 3M
the Logical address of another host. Now, suppose a host needs to
send the IP datagram to another host. But, the IP datagram must been
capsulated in a frame so that it can pass through the physical network
between sender and receiver. Here, the sender needs the physical
address of the receiver so that it is being identified that to which
receiver the packet belong to when the packet travel in the physical
network. For retrieving the physical address of the receiver the sender
performs the following action.
i. The sender sends the ARP query packet on the network which is
broadcasted to all the other host or router present in the network.
ii. The ARP query packet contains the logical and physical address of
the sender and the logical address of the receiver.
iii. All the host and router receiving the ARP query packet process it but,
only the intended receiver identifies its logical address present in the
ARP query packet. The receiver then sends ARP response packet
which contains the logical (IP) address and physical address of the
receiver. The ARP response packet is unicast message sent directly to
the sender whose physical address is present in the ARP query
packet.

Page 16 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

RARP:
RARP (Reverse Address Resolution Protocol) is also a network layer
protocol. RARP is a TCP/IP protocol that allows any host to obtain Working of
its IP address from the server. RARP is adapted from the ARP RARP 3M
protocol and it is just reverse of ARP.RARP perform following steps
to obtain an IP address from the server. The sender broadcast the
RARP request to all the other host present in the network.
i. The RARP request packet contains the physical address of the sender.
ii. All the host receiving the RARP request packet process it but, the
authorized host only which can serve RARP service, responds to the
RARP request packet such host are known as RARP Server.
iii. The authorized RARP server replies directly to requesting host with
the RARP response packet which contains IP address for the sender.

b) What is subnet mask? Explain with example. 6M


Ans. Subnet mask is nothing but breaking a larger Network into smaller Definition
parts and each smaller section will use different sets of address 2M
numbers. Subnet masking is used to identify/separate network address Explanation
(including subnets) and host address. A Subnet mask is a 32-bit 2M
number that masks an IP address, and divides the IP address into
network address and host address. Example 2M
The network bits are represented by the 1s in the mask, and the node
bits are represented by the 0s.
Performing a bitwise logical AND operation between the IP address
and the subnet mask results in the Network Address or number.
Default masks for classful addressing:

Example:
A router receives a packet with the destination address
140.179.240.200. Show how the router finds the network address of
the packet.
Given IP address: 140.179.240.200

Page 17 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417
Class of given IP Address: B
10001100 10110011 11110000 11001000 Binary conversion of given
IP address
11111111 11111111 00000000 00000000 255.255.0.0 Default Class
B Subnet Mask
--------------------------------------------------------
10001100 10110011 00000000 00000000
140.179.000.000 Network Address
c) Suggest suitable network layout for an organization’s office in a 6M
building of 5 floors. Each floor needs 20 machines and 2 printers.
Identify appropriate topology & connecting devices.

Ans.
Any relevant
diagram 6M

Page 18 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

6. Attempt any TWO of the following: 12


a) Describe procedure to configure TCP/IP network layer services. 6M
Ans. Before beginning configuration procedure, the following are the Step by step
prerequisites. procedure
6M
● Network hardware is installed and cabled. .
● TCP/IP software is installed.
To configure your TCP/IP network, the following steps are followed:
● Read TCP/IP protocols for the basic organization of TCP/IP.
● Minimally configure each host machine on the network.
This means adding a network adapter, assigning an IP address,
and assigning a host name to each host, as well as defining a
default route to your network. For background information on
these tasks, refer to TCP/IP network interfaces, TCP/IP
addressing, and Naming hosts on your network.
● Configure and start the intended daemon on each host machine on
the network. Read TCP/IP daemons and then follow the
instructions in Configuring the intended daemon.
● Configure each host machine to perform either local name
resolution or to use a name server. If a hierarchical Domain Name
networks being set up, configure at least one host to function as a
name server.
● If the network needs to communicate with any remote networks,
configure at least one host to function as a gateway. The gateway
can use static routes or a routing daemon to perform inters
network routing.
● Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in
Client network services if you wish to make a particular service
unavailable.
● Decide which hosts on the network will be servers, and which
services a particular server will provide. Follow the instructions in
Server network services to start the server daemons you wish to
run.
● Configure any remote print servers that are needed.
● Optional: If desired, configure a host to use or to serve as the
master time server for the network.
b) Design a network of class B with network address 136.10.0.0 with 6M
2 subnets. State the subnet mask used & subnet addresses

Page 19 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

Ans. Given network address 136.10.0.0


Design: 2M,
Convert above address into Binary form:
10001000 00001010 00000000 00000000
We will use class B address which takes 1 bit from Host field for Subnet
subnetting and leaves 7 bits for defining hosts. Having 7 bits Mask: 2M ,
available for defining subnets means we have up to 2(21) different
subnets.
Subnet
Address: 2M

Let’s use IP address136.10.0.0 with subnet mask 255.255.128.0

Step 1: convert to binary


136.10.0.0
10001000 00001010 00000000 00000000
255 255 1280
11111111 11111111 100000000 000000000
Subnet Mask is: 255.255.128.0
Step 2: Calculate subnet address

To calculate the subnets IP address you need to perform bit wise


AND operation (1+1=1, 1+0=0 or 0+1=0, 0+0=0) on the host IP
address and subnet mask:
IP address:
10001000 00001010 00000000 00000000
AND
11111111 11111111 100000000 000000000

Page 20 / 21
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)

WINTER – 2022 EXAMINATION


MODEL ANSWER
Subject: Computer Network Subject Code: 22417

10001000 00001010 00000000 00000000


Subnet Address is: 136.10.0.0
c) For a trading firm organization with 50 users, draw network 6M
architecture design of wireless LAN. State devices used and its
Relevant
specifications. Diagram 3 M
Ans.
 Personal Computers (Latest Specifications mention by student)
Devices used
 Laptops (As per specifications available in market) 3M
 Smartphone (As per student mention) etc.

 Wi-Fi Routers(Wi-Fi Standard (802.11 a/b/g/n/ac), Router's


wireless frequency (2.4GHz or 5GHz), Speed more than 4
MBPS, Antenna Range:2-4dBi, Router ports etc as per
specification available in market)

Page 21 / 21

You might also like