MSBTE Solution APP
MSBTE Solution APP
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
equivalent figure drawn.
AP
5) Credits may be given step wise for numerical problems. In some cases, the assumed constant values
may vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer
n
based on candidate’s understanding. tio
7) For programming language papers, credit may be given to any other program based on equivalent
concept.
lu
8) As per the policy decision of Maharashtra State Government, teaching in English/Marathi and Bilingual
(English + Marathi) medium is introduced at first year of AICTE diploma Programme from academic
So
year 2021-2022. Hence if the students in first year (first and second semesters) write answers in
Marathi or bilingual language (English +Marathi), the Examiner shall consider the same and assess the
answer based on matching of concepts with model answer.
TE
SB
N. Scheme
i) bit rate
ii) baud rate
Page 1/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
Ans: Classification of networks on the basis of transmission technologies 1M
AP
Each
1. Broadcast Network
2. Point-to-Point Network
n
tio
(c) Compare TCP/IP and OSI reference model (any two points). 2M
lu
Ans: Sr.no TCP/IP Model OSI Model Any 2
So
correct
1. It stands for Transmission It stands for Open System
answers
Control Protocol Interconnection.
TE
1M each
2. It was developed by OSI model has been developed
SB
Network)
Page 2/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
(d) Name the layer of the OSI model at which the mechanical, electrical , functional and 2M
P
procedural characteristics are defined. State its function.
AP
Ans: Physical layer of the OSI model at which the mechanical, electrical , functional and Name of
n
procedural characteristics are defined. tio layer
1m
Functions of the physical layer are
lu
Any two
So
1. It defines the physical characteristics and functions of the physical devices and function
interfaces so that transmission can occur. 1M
TE
Page 3/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
1M each
3. Router.
AP
4. Bridge.
5. Gateway.
n
6. Modem.
tio
7. Repeater.
lu
8. Access Point.
So
The primary function of IPv6 is to allow for more unique TCP/IP address identifiers to
SB
be created, now that we’ve run out of the 4.3 billion created with IPv4. This is one of the
M
main reasons why IPv6 is such an important innovation for the Internet of Things (IoT).
Internet-connected products are becoming increasingly popular, and while IPv4
addresses couldn’t meet the demand for IoT products, IPv6 gives IoT products a
platform to operate on for a very long time.
Page 4/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
N. Scheme
a) Draw the block diagram of data communication system and state the function of each 4M
block.
P
Ans: 1.5M
AP
for
block
n diagram
tio
and 1/2
lu
M for
So
each
Block diagram of data communication system
function
TE
communication between transmitter and receiver which takes place with the help
M
of protocol.
2. Sender: it is a device which sends the message for example, computer system,
cameras or telephone.
3. Medium: it is a physical path over which the message travel from sender to the
receiver. Medium can be a co-axial cable , twisted pair wire , fiber optic cables or
radio waves.
4. Message : it is information or data which is to be send from one point to other. It
can be in the form of sound , text , number or picture.
5. Receiver: it is a device which receives the message. for example computer system
, picture tube.
Page 5/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) Cost
ii) Performance
P
iii) Backup
AP
iv) Security
n
tio point
no.
1M
lu
i. Cost less more
So
Page 6/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
4. Error Control: Sometimes signals may have encountered problem in transition
AP
and the bits are flipped .These errors are detected and attempted to recover
actual data bits.
5. Flow Control: Stations on same link may have different speed or capacity. Data-
n
tio
link layer ensures flow control that enables both machine to exchange data on
same speed.
lu
6. Multi-Access: When host on the shared link tries to transfer the data, it has a
So
Systems.
SB
d) Describe hamming code error correction technique with the help of example. 4M
M
Page 7/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
y solved
forming a 3-bit number out of three parity checks.
AP
example
Example of Detection and correction of a single bit error : or 4M
for the
n
If received 7-bit Hamming code word is 10 1 1 0 1 1. Assuming even parity. By using
tio
solved
following method we can detect and correct error .
example
lu
if steps
So
are
included
TE
SB
M
Page 8/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
AP
n
tio
lu
So
TE
SB
M
Page 9/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
Total
AP
Marks
a) State the names of the layers that perform the following functions – 4M
n
tio
i) Data Encryption
ii) File transfer
lu
layer
for
function
given
Page 10/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1. Flag Field (1 Byte): The flag field identifies the boundaries of PPP frame i.e. each
frame begins and ends with flag field. This field is 1 byte in length.
2. Address Field (1 Byte): This field contains a value indicating that the packet is
addressed to all recipients. Address field indicates the address of destination. Address
P
field is 1 byte (8 bits).
AP
When the address field contains all 1’s i.e. 11111111, this indicates that all stations are to
accept the frames (broadcast).
n
tio
3.Control Field (1 Byte): PPP normally runs in connectionless mode therefore control
field is set to 11000000. This indicates unnumbered frames i.e. frame does not contain
lu
4. Protocol Field (2 Bytes): Protocol field defines the information of data field. The
TE
5. Data Field: The data field contains the actual data to transmit, plus padding if
SB
6. Frame Check Sequence (FCS): The FCS field is 24 byte long and contains CRC code.
It checks length of all fields in frame.
Page 11/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
i) Switch
ii) Router
Ans: 4M for
correct
diagram
P
AP
n
tio
lu
So
TE
SB
M
i) Address
ii) Packet Size
Page 12/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
iii) Configuration
iv) IP Security
P
ii) Packet size Packet size 576 bytes 1208 bytes required son
AP
required, fragmentation without fragmentation point
optional
n
tio
iii) Configuration It Supports Manual and It supports Auto and
DHCP address renumbering address
lu
configuration configuration
So
OR OR
TE
OR OR
Page 13/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
4 Attempt any THREE of the following: 12-
AP
Total
Marks
n
tio
(a) State the need of multiplexing and switching. Summarize the situations for the 4M
implementations of TDM, FDM, Circuit Switched Network & Packet Switched Network.
lu
So
multiple
It is not possible to lay a separate pair of wires between each source and destination
xing
this is very expensive and practically impossible.
SB
optical fiber cable to carry many telephone signals from different sources
together
Multiplexing is a technique that allows simultaneous transmission of
multiple signals over common transmission path
Multiplexing is used to send multiple signals simultaneously ,
reduce the cost of Transmission and to make effective use of available bandwidth (1M) for
Page 14/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
connectivity as and when required. Once a connection has been made, information can
be sent and received
(1/2M)
TDM is implemented in
each for
Satellite Communication system.
any one
Cellular Radio.
implent
Public Switched Telephone Network or PSTN system.
ation/ap
P
digital audio mixing system.
plicatio
AP
Pulse Code Modulation (PCM) transmission system. n of
FDM is implemented in TDM,F
n
Television and Radio Broadcasting. tio DM,
Satellite Communication system. Circuit
lu
First generation cellular systems switchin
So
other
Packet switching is implemented in
valid
Internet and most local area networks.
applicat
Ethernet and frame relay
ion
Newer mobile phone technologies (e.g., GSM, LTE)
should
Wide Area Network (WAN) protocols be
consider
ed
(b) Explain a one bit sliding window protocol under normal condition and with damaged 4M
Page 15/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans: 1. One bit sliding window protocol is used for delivery of data frames.
2. The sender and receiver’s windows size is 1. (2m)
3. One bit sliding window protocol uses Stop and Wait concept.
Diagra
4. Its bidirectional protocol. (full duplex communication)
m
P
AP
n
tio
lu
So
TE
SB
M
OR
Page 16/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
AP
n
tio
lu
So
(1M)
TE
Normal Operation : In normal operation the sender sends a frame and waits for Normal
acknowledgement from receiver .The acknowledgement should be received operatio
SB
transmitted .If it matches the next frame is transmitted otherwise previous frame
is transmitted (1M)
Damaged frame : .When the receiver receives a damaged frame it discards it Damage
which means the frame is lost .The receiver remains silent about the lost frame d frame
.After the timer expires for that frame the sender retransmits the same frame .
(c) Draw structural diagram of fiber optic cable and write its functions. 4M
Page 17/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans:
2M
diagram
P
AP
(2M)
n
tio
explaina
lu
tion
So
Core − The core is innermost part of fibre optic cable . It is made up of glass or
plastic
SB
Function : The core has a higher refractive index w.r.t cladding. This ensures that
light is confined within the core and propagates by total internal reflection.
M
Page 18/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Function :
1) It prevents light rays from outside to enter the optical fiber.
2) prevents the fibers from physical damage.
3) It adds strength to the fiber.
P
(d) On which layer of OSI reference model following protocol works – 4M
AP
i) UDP
ii) IP
n
iii) FTP
tio
iv) SCTP
lu
So
iii) writing
iv) SCTP – Transport Layer correct
SB
layer of
OSI
M
model
Page 19/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Ans:
2M for
Diagra
m
P
AP
n
tio
In a datagram network, each packet is treated independently of all others.
lu
. Datagram switching is normally done at the network layer.
So
. Figure shows how the datagram approach is used to deliver four packets from 2M for
station A to station X. explaina
TE
travel different paths to reach their destination. This is so because the links may
be involved in carrying packets from other sources and do not have the necessary
M
Page 20/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Datagrams can contain the full destination address rather than using some
number.
There is no set up phase required for the datagram circuits. This means that no
resources are consumed.
If any fault or loss occurs on a communication line, the datagrams circuits are
capable of compensating for it.
P
AP
n
tio
Q. Sub Answers Markin
No. Q. g
lu
N. Scheme
So
Total
Marks
SB
i) Bus topology
ii) Ring topology
In networking, a topology that allows all network nodes to receive the same message 1M
through the network cable at the same time is called as bus topology. Diagra
m of
In this type of network topology, all the nodes of a network are connected to a common
Bus
transmission medium having two endpoints.
topology
All the data that travels over the network is transmitted through a common
Page 21/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
transmission medium known as the bus or the backbone of the network. and 2M
explanat
Working of Bus Topology:
ion
Fig. shows bus topology. The central cable is the backbone of the network and is known
as Bus (thus the name). Every workstation or node communicates with the other device
through this Bus.
P
A signal from the source is broadcasted and it travels to all workstations connected to
AP
bus cable. Although the message is broadcasted but only the intended recipient, whose
MAC address or IP address matches, accepts it.
n
tio
If the MAC/IP address of machine does not match with the intended address, machine
discards the signal. A terminator is added at ends of the central cable, to prevent
lu
II.Ring Topology:
Ring topology is a network topology that is set-up in circular fashion. The data and the
signals that pass over the network travel in a single direction. It is called ring topology
because it forms a ring as each computer is connected to another computer, with the last
one connected to the first. Exactly two neighbors for each device.
Each node in this topology contains repeater. A signal passes node to node, until it
reaches its destination. If a node receives a signal intended for another node its repeater
Page 22/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Token is a special three byte frame that travels around the ring network. It can flow
clockwise or anticlockwise. Ring topology is a point to point network.
A number of repeaters are used for Ring topology with large number of nodes, because
if someone wants to send some data to the last node in the ring topology with 100 nodes,
P
then the data will have to pass through 99 nodes to reach the 100th node. Hence to
AP
prevent data loss repeaters are used in the network.
Fig. shows a ring topology. The token travels along the ring until it reaches its
n
destination. Once, token reaches destination, receiving computer acknowledges receipt
tio
with a return message to the sender. The sender then releases the token for the token for
lu
use by another computer.
So
TE
SB
1M
M
Diagra
m of
Ring
topology
and 2M
explanat
ion
Page 23/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
b) Draw layered architecture of the OSI model. State the functions of various layers. 6M
P
for
AP
explanat
ion of
n each
tio
layer
lu
So
TE
SB
Page 24/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
transmitted over the physical layer.
AP
2. The main function of this layer is to make sure data transfer is
n
error free from one node to another, over the physical layer.
tio
3. Transmitting and receiving data frames sequentially is managed by
lu
So
this layer.
Page 25/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
AP
3. It receives messages from the Session layer above it, convert the
n
tio
4. Transport layer can be very complex, depending upon the
lu
network requirements.
So
Transport layer breaks the message (data) into small units so that they
TE
ends of the messages are not cut prematurely and data loss is
avoided.
Page 26/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
1. Presentation Layer takes care that the data is sent in such a way
that the receiver will understand the information (data) and will
P
AP
3. Languages(syntax) can be different of the two communicating
n
tio
translator.
lu
etc.
TE
Ans: Electromagnetic waves having frequencies between 1 and 300 GHz are called 3M for
diagram
Page 27/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
spectrum has developed.
AP
• Electromagnetic radiation beyond the frequency range of radio and television can be
used to transport information. Microwave transmission is usually point-to-point using
n
directional antennae with a clear path between transmitter and receiver.
tio
Fig. shows typical example of microwave link using dish antenna and satellite.
lu
• A parabolic dish antenna can be used to focus the transmitted power into a narrow
So
beam to give a high signal to noise ratio, and before the advent of optical fiber, some
TE
long distance telephone transmission systems were heavily dependent on the use of a
series of microwave towers.
SB
Because microwaves travel in a straight line, the curvature of the earth limits the
maximum distance over which microwave towers can transmit, so repeaters are needed
M
Page 28/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
AP
n
tio
lu
So
Typically the line of sight due to the Earth's curvature is only 50 km to the horizon.
SB
Repeater stations must be placed so the data signal can hop, skip and jump across the
country.
M
Advantages of Microwave:
2. They can carry high quantities of information due to their high operating frequencies.
Page 29/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Disadvantages of Microwave:
P
AP
3. Diffracted (split) around solid objects.
n
tio
There are two types of microwave data communication systems namely, Terrestrial
lu
Microwave Transmission and Satellite Microwave Transmission.
So
• Terrestrial microwave systems typically use directional parabolic antennas to send and
receive signals in the lower gigahertz (GHz) range.
M
• The signals are highly focused and the physical path must be line-of-sight. Relay
towers are used to extend signals. Terrestrial microwave systems are typically used
when using cabling is costprohibitive.
Advantages:
Page 30/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Disadvantages:
1. Attenuation.
P
AP
3. Line of sight is required.
n
tio
lu
So
TE
SB
M
• In satellite microwave, the signals are transmitted from a ground station to a satellite
and then after amplifying, from the satellite to some other ground station.
Page 31/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
No. N. Scheme
a) Draw and explain architecture for network using tree topology for an office in 3 – Storey 6M
P
building.
AP
Ans:
n
tio
3M
lu
diagram
So
TE
SB
M
Page 32/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
secured as all the devices connected to the hub can listen to the message.
AP
10) It allows the expansion of existing network enables a campus to configure
network to meet their needs
11) The failure of one hub/switch will affect only that part of network
n
tio
12) The failure of bus(backbone cable) will bring entire network down
lu
b) Explain stop and wait ARQ with example. 6M
So
TE
In this method after sending the data, the sender stops and waits till an
acknowledgment is received from the receiver. It is a data-link layer protocol
SB
In stop and wait ARQ the frames and acknowledgements are alternately
numbered
M
3M
Page 33/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Diagra
m
P
AP
n
tio
lu
So
TE
3M
SB
explaina
tion
M
1) Normal Operation : In normal operation the sender sends a frame and waits for
acknowledgement from receiver .The acknowledgement should be received
before the timer for each frame expires
Page 34/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
c) Explain the addressing scheme in IPv4 and IPv6, when IPv6 protocol is introduced, does 6M
the ARP protocol have to be changed? Explain in details.
P
AP
Ans:
n
Addressing schemes in IPv4
tio
The 32 bit IPV4 address is divided into five sub-classes. These are: 3M for
lu
Class A 2)Class B 3) Class C 4) Class D 5)Class E (any 3)
So
ng
Class A: schemes
SB
The Network ID is 1 byte long and Host host ID is 3 byte long diagram
The most significant bit of class A is always set to 0. OR
explaina
tion
should
Class B: be
IP address belonging to class B are assigned to the networks that ranges consider
from medium-sized to large-sized networks. ed
Page 35/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Class C:
IP address belonging to class C are assigned to small-sized networks.
The Network ID is 3 byte long and Host ID is 1 byte long
P
AP
The most significant bits of the class C are always set to 110 The
remaining 21 bits are used to determine network ID.
n
tio
lu
Class D:
So
Class E:
IP addresses belonging to class E are reserved for experimental and
research purposes.
The most significant bits of class E are always set to 1111.
Page 36/
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
P
Anycast (any 2)
AP
Identifies a group of interfaces, usually on different nodes. Packets that are sent IPv6
to the anycast address go to the anycast group member node that is physically addressi
closest to the sender. ng
n
tio
schemes
lu
(in IPv4, ARP is used for this), Router Discovery etc., are now performed using
Neighbor Discovery Protocol (NDP).
1M
Besides replacing these functions of IPv4, it also provides a lot of additional
functionalities that simplify network administration and management. Hence
there was no need to change ARP protocol when IPV6 was intoduced
Page 37/