Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views43 pages

DCC Epa

The document provides an analysis of examination papers for the Data Communication and Computer Networking course across three semesters (Winter-23, Summer-23, Winter-22). It includes a breakdown of topics, questions, and marks allocated for each unit, highlighting the evolution of exam content over the years. Additionally, it features sample questions and answers related to fundamental concepts in data communication and networking.

Uploaded by

giriraj.dalvi16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views43 pages

DCC Epa

The document provides an analysis of examination papers for the Data Communication and Computer Networking course across three semesters (Winter-23, Summer-23, Winter-22). It includes a breakdown of topics, questions, and marks allocated for each unit, highlighting the evolution of exam content over the years. Additionally, it features sample questions and answers related to fundamental concepts in data communication and networking.

Uploaded by

giriraj.dalvi16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

Examination Paper Analysis and Solution

Data Communication and Computer Networking(22414) S.Y.Diploma:Sem 4

Topic Winter-23 Summer-23 Winter-22


Name of Topic
No.
Question Marks Question Marks Question Mark

1.(a) 2 1.(a) 1.(a) 2


2
1.(b) 2 1.(b) 1.(b) 2
2
Fundamentals of Data 2.(a) 4 2.(a) 2.(a) 4
1 Communication and 4
5.(a) 6 3.(b) 3.(b) 4
Computer Network 4
6.(c) 6 5.(a) 5.(a) 6
6

Total 20 Total 18 Total 12

1.(e) 2 1.(c) 2 1.(c) 2


2.(b) 4 2.(b) 4 2.(b) 4
3.(b) 4 3.(a) 4 3.(a) 4
Transmission Media 3.(c) 4 4.(a) 4 4.(a) 4
2
and Switching 4.(c) 4 4.(c) 4 4.(c) 4
5.(b) 6 5.(b) 6 5.(b) 6

Total 24 Total 24 Total 18


1.(d) 2 1.(d) 2
1.(d) 2
1.(f) 2 1.(e) 2
1.(e) 2
Error Detection, 2.(c) 4 2.(c) 4
4.(e) 4
Correction and 3.(a) 4 4.(e) 4
3 6.(a) 6
Wireless 6.(a) 6
Communication
Total 12 Total 18 Total 28
Examination Paper Analysis and Solution

1.(c) 2
1.(f) 2 1.(f) 2
1.(g) 2
Network Topology and 3.(c) 4 3.(c) 4
4 4.(a) 4
Network Devices 6.(c) 6 6.(c) 6
4.(e) 4

Total 12 Total 12 Total 16


1.(g) 2
2.(d) 4 1.(g) 2
2.(c) 4
3.(d) 4 2.(d) 4
2.(d) 4
4.(b) 4 3.(d) 4
3.(d) 4
4.(d) 4 4.(b) 4
5 Reference Models 4.(b) 4
5.(c) 6 4.(d) 4
4.(d) 4
6.(b) 6 5.(c) 6
5.(c) 6
6.(b) 6 6.(b) 6
6.(b) 6
Total 34 Total 30 Total 28
Examination Paper Analysis and Solution

Exam Unit No Question no as per MSBTE paper Marks


Year and Name

Winter- Unit 1 Q1 a List advantages of Computer Networks. (any two) 2


2023 Q1 b Draw process of data communication 2
Q2 a Compare client-server and peer-to-peer networks 2
Q5 a Explain modes of communication 4
i)Simplex 4
ii)Half-Duplex
ÎIÎ)Full-Duplex
Q6 c Explain wide Area Networks along with its advantages and disadvantages. 6
Summer- Unit 1 Q1 a Define computer Network. 2
2023 Q1 b Describe data Communication 2
Q2 a Explain the components of Data Communication. 4
Q1 b Describe modes of communication. 4
Q5 a Differentiate any six point between LAN and WAN 6

Winter- Unit 1 Q1 a Name the componets of data communication. 2


2022 Q1 b. state any two needs of computer Network. 2
Q2 a Compare LAN and MAN ( four points). 2
Q3 b Describe the various modes of communication in compute network. 4
Q5 a Explain with diagram the process of client server and peer to peer network architecture. 6

Winter- Unit 2 Q1 c Draw neat diagram of twisted pair cable and stae iths type . 2
2023 Q3 b Explain satellite communication wuth the help of neat diagram. 4
Q3 c compare circuit switching and packet switching consider following parameter orientation, flexibity , 4
technology and layer.
Q4 c Describe multiplexing technique. 4
Q5 b Draw and explain fiber-optic cable 6
Summer- Unit 2 Q1 c Stae any two types of ungided media . 2
2023 Q2.b Describe propogation modes in fiber optic cable. 4
Examination Paper Analysis and Solution
Q3 a Describe Satellite Communication with neat diagram. 4
Q4 a Compare FDM TDM(any 4 points each ) 4
Q4 c Describe the principal packet switching teching technique with neat diagram. 4
Q5 c write steps to prepare crossover and straight cble using twisted pair cable. 6
Winter- Unit 2 Q1 e Compare guided and unguided transmission media . 2
2022 Q2 b Explain TDM technice with the help of neat diagram. 4
Q3 e state the physical and transmission characteristics of twisted pair cable along with its applications. 4
Q4 b Draw the neat sketch of fiber optic cable .give the transmission characterstics of fiber optical cable . state 4
its application.

Winter- Unit 3 Q1 d State types of errors. 4


2023 Q1 f Compare LRC and VRC 4
Q2 c Explain wireless LAN 802.11 architecture 6
Q3 a draw and explain piconet Bluetooth architecture 6
.Q4 (a) explain mobile generation
6
i. 1 G
ii. 2G
iii. 3G
iv. 4G
v. 5G

Summer- Unit 3 Q1 d state any two limitataion in Bluetooth 2


2023 Q2 b Compare 3G and 4G mobile Generation on the basis of data speed , tehnology , standard and services. 4
Q4 e The following bit stream is encoded with VRC ,LRC and even parity , Locate and correct the error I it is 4
present.
11000011 11110011
10110010 00001010
00101010 00101011
10100011 0010101 1
11100001 0100 1011
Q6 Calculate CRC for the frame 110101011 and generator polynomial X 4+x+1 and write the transmitted frame. 6
Winter- Unit 3 Q1 c .Enlist types of error. 2
2022 Q2 d Compare LRC and VRC. 2
Examination Paper Analysis and Solution
Q3 e Draw the architecture of Bluetooth and explain. 4
Q4 a Draw the architecture of wireless LAN 802.11 6

Winter- Unit 4 1.(c) list network topology 2


2023 1.(g) list any four networking connecting devices . 4
4(a) With suitable diagram describe 4
STAR Topology 4
RING Topology 4
4.(e) Differentiate between Hub and switch. (any four points ) 6

Summer- Unit 4 Q1 f List any four Network connecting devices. 2


2023 Q3 c Describe the working of router with sutiable diagram . 4
Q6 c Draw suitable lab with 10 hosts and a wireless printers.List all components in the Layout. 6

Winter- Unit 4 Q1 f state the function of Reapeter qand Modem. 2


2022 Q3 c Diffrantiate Between HUB and Switch with respect to layer ,port, device type , Speed. 4
Q4 c Explain with neat sketch the working of Router and switch. 6
Winter- Unit 5 2.(d) Explain OSI reference model in detail. 2
2023 1.(g) State four electrical specifications of microwave oven 2
3.(d) Explain the function of presentation layer and network laycr. 4
4.(b) Describe the various IP address classes with suitable example 4
4.(c) Compare IPV4 and IPV6 packet format. 4
6
5.(c) Explaiç l SMTPy HTTP protocol in detail.
6

Summer- Unit 5 Q1 g List any four application layer protocol. 2


2023 Q2 d Describe the process of DHCP server configuration. 4
Q3 Name the protocol used in 4
I. Data link layer
II. Network layer
III. Transport layer
IV. Presentationn layer
Q4 d Describe OSI reference model with its Layerd structure. 4
Q5 c Compare IPV4 and IPV6. (any six point each) 6
Q6 b Compare OSI and TCP/IP network model (any six point each) 6
Examination Paper Analysis and Solution

Winter- Unit 5 Q1 g State the service of transport layer. 2


2022 Q2 c state features of various mobile generation. 4
Q2 d Draw and Explain TCP/IP protocol suite. 4
Q3 d State the OSI models Layers and give its Function. 4
Q5 e Describe the terms with sutible example. 6
i)subnetting
ii) supernatting
iii) Masking
Q6 b Describe with the neat sketch the working of Router and Switch. 6

UNIT 1 Fundamentals of Data Communication and Computer Network

Q.1 List advantages of Computer Networks. (any two) (w-23) 2Marks

Ans:

• Convenient Sharing of Resources.

• Easy File/Data Sharing.


Examination Paper Analysis and Solution

• Highly Flexible.
.

Q.2 Draw process of data communication (W-23) 2 Marks

Ans:

Q.3 Compare client-server and peer-to-peer networks (W-23,) 4 Marks


Ans.
Sr client-server networks peer-to-peer networks
no.
1 In Client-Server In Peer-to-Peer Network, Clients and
Network, Clients and server are not differentiated
server are
differentiated, Specific
server and clients are
present..
2 Client-Server Network While Peer-to-Peer Network focuses
focuses on information on connectivity..
sharing.
3 In Client-Server While in Peer-to-Peer Network, Each
Network, Centralized peer has its own data.
Examination Paper Analysis and Solution
server is used to store
the data.
4 In Client-Server While in Peer-to-Peer Network, Each
Network, Server and every node can do both request
respond the services and respond for the services.
which is request by
Client.

Q4. Q5 a Explain modes of communication (W-23,) 4 Marks

i)Simplex
ii)Half-Duplex
ÎIÎ)Full-Duplex
Transmission mode refers to the mechanism of transferring of data between two devices connected over a network. It is also called Communication Mode.
These modes direct the direction of flow of information. There are three types of transmission modes. They are:
Simplex Mode
Half duplex Mode
Full duplex Mode
1. In Simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two devices on a link can transmit; the other can only receive.
The simplex mode can use the entire capacity of the channel to send data in one direction. Keyboards, traditional monitors and printers are examples of simplex
devices.
2. half-duplex mode, each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive, and vice
versa. The half-duplex mode is used in cases where there is no need for communication in both directions at the same time. The entire capacity of the
channel can be utilized for each direction -for example: Walkie-talkies.
Examination Paper Analysis and Solution
3. full-duplex mode both stations can transmit and receive data simultaneously. The transmission medium sharing can occur in two ways, namely, either the
link must contain two physically separate transmission paths or the capacity of the channel is divided between signals traveling in both directions .One common
example of full-duplex communication is the telephone network. When two people are communicating by a telephone line, both can talk and listen at the same
time.

Q4 Explain wide Area Networks along with its advantages and disadvantages. (W-23) 4 Marks

• WAN is wide area network. WAN is a long-distance communication network that covers a wide geographic area, such as state or country. The most
common example is internet.
• Wide Area Networks (WANs) connect networks in larger geographic areas, such as Maharashtra, India, or the world. Dedicated transoceanic cabling
or satellite uplinks may be used to connect this type of global network.
• Using a WAN, schools in Maharashtra can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two
users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time.
• A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like
the Internet. To users, however, a WAN will not appear to be much different than a LAN.
Examination Paper Analysis and Solution

Q5Define computer Network. (S-23) 2 marks

Ans. A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to
facilitate communication and resource sharing among a wide range of users.

Q6 Describe data Communication. (S-23) 2 marks


Ans
• Communication is defined as a process in which more than one computer transfers information, instructions to each other and for sharing resources.
Or in other words, communication is a process or act in which we can send or receive data.
• Data Communication is a process of exchanging data or information In case of computer networks this exchange is done between two devices over a
transmission medium. This process involves a communication system which is made up of hardware and software. The hardware part involves the
sender and receiver devices and the intermediate devices through which the data passes. The software part involves certain rules which specify what
is to be communicated, how it is to be communicated and when. It is also called as a Protocol.
Examination Paper Analysis and Solution
Q7 Explain the components of Data Communication.(S-23) 2 marks

Ans. A communication system is made up of the following components:

1. Message: A message is a piece of information that is to be transmitted from one person to another. It could be a text file, an audio file, a video file, etc.
2. Sender: It is simply a device that sends data messages. It can be a computer, mobile, telephone, laptop, video camera, or workstation, etc.
3. Receiver: It is a device that receives messages. It can be a computer, telephone mobile, workstation, etc.
4. Transmission Medium / Communication Channels: Communication channels are the medium that connect two or more workstations. Workstations can be
connected by either wired media or wireless media.2

5. Set of rules (Protocol): When someone sends the data (The sender), it should be understandable to the receiver also otherwise it is meaningless. For

example, Sonali sends a message to Chetan. If Sonali writes in Hindi and Chetan cannot understand Hindi, it is a meaningless conversation.

Q8 Differentiate any six point between LAN and WAN (S-23) 6 marks

Sr no. Pareameter LAN WAN


1 Area covered Small Geographical Area Large Geographical area
2 Bandwidth High Low
3 Errors Rate Lowest Highest
4 Example Office , Cyber Caffe Internet
5
6

Q9 Name the componets of data communication. (W-22) 2 marks


Ans. 1)Message
2) Sender
3)Reciver
4)Transmissio Media
5) Set Of Rule (protocol)

Q9. state any two needs of computer Network . (W-22 ) 2 marks


Ans. 1. Sharing of information and data over the geographically wide areas.
2. Communication from one computer to the other computer.
3. Sharing the resources such as printers among the network users.
4. Exchange of data and information amongst the data and users, via the network.
Examination Paper Analysis and Solution
5. Sharing of expensive software's and database.

Q 10 . Explain with diagram the process of client server and peer to peer network architecture. . (W-22 ) 6 Marks
Ans. Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on
other computers. However, they do not have a file server or a centralized management source (See figure 8 given below).
• In 17 Network Classifications and Topologies a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources
available on the network. Peer-topeer networks are designed primarily for small to medium local area networks.
• AppleShare and Windows for Workgroups are examples of programs that can function as peer-to-peer network operating systems. Figure 8: Peer to Peer
network.
• The advantages of peer-to-peer over client-server NOSs include: i) No need for a network administrator ii) Network is fast/inexpensive to setup &
maintain iii) Each PC can make backup copies of its data to other PCs for security. By far the easiest type of network to build, peer-to-peer is perfect for
both home and office use.

Client/Server:
• Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The file
servers become the heart of the system, providing access to resources and security.
• Individual workstations (clients) have access to the resources available on the file servers. The network operating system provides the mechanism to
integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location.
Novell Netware and Windows NT Server are examples of client/server network operating system.
Examination Paper Analysis and Solution

UNIT 2 Transmission Media and Switching


Q1 Draw neat diagram of twisted pair cable and stae iths type .(W-23) 2 Marks
Ans.
A twisted pair cable comprises of two separate insulated copper wires, which are twisted together and run in parallel, as shown in following fig:

One of the wires is used to carry signals to the receiver and the other is used only as ground reference. There are two type of twisted pair
cable:
1. Unshielded Twisted Pair (UTP)
2. Shielded Twisted Pair (STP)
Q2 Explain satellite communication with the help of neat diagram. (W-22) 4 Marks
1.Satellite is a natural /man-made system which is kept in continuous rotation around the earth in a specific orbit at a specific height above the earth and with
specific speed.
2. In satellite communication, signal transferring between the sender and receiver is done with the help of satellite.
3. In this process, the signal which is basically a beam of modulated microwaves is sent towards the satellite called UPLINK (6 GHz).
4,Then the satellite amplifies the signal and sent it back to the receiver’s antenna present on the earth’s surface called as DOWNLINK (4Ghz), as shown in the
diagram given
Examination Paper Analysis and Solution

As the entire signal transferring is happening in space. Thus, this type of communication is known as space communication. The satellite
does the functions of an antenna and the repeater together.

Q3 compare circuit switching and packet switching consider following parameter orientation, flexibity , technology and layer. (W-23) 4 Marks
Ans.
Sr no. parameter Circuit Switching Message Switching
1 orientation Connection oriented. Connectionless.
2 flexibility Inflexible, because once a path is set all Flexible, because a route is created for each packet to travel to the
parts of a transmission follows the same destination
path.
3 technology Circuit switching can be achieved using two Packet Switching hastwo approaches Datagram Approach and Virtual
technologies, either Space Division Circuit Approach.
Switching or Time- Division Switching.
4 layers Circuit Switching is implemented at Physical Packet Switching is implemented at Network Layer.
Layer.

Q4 Describe multiplexing technique. (W-23) 4 Marks


Examination Paper Analysis and Solution
Ans. Multiplexing is a technique by which different analog and digital streams of transmission can be simultaneously processed over a shared link. Multiplexing
divides the high capacity medium into low capacity logical medium which is then shared by different streams. Communication is possible over the air (radio
frequency), using a physical media (cable), and light (optical fiber). All mediums are capable of multiplexing. When multiple senders try to send over a single
medium, a device called Multiplexer divides the physical channel and allocates one to each. On the other end of communication, a De-multiplexer receives data
from a single medium, identifies each, and sends to different receivers.
Different multiplexing techniques are
1.Frequency Division multiplexing
2.Time division multiplexing
Frequency Division Multiplexing: When the carrier is frequency, FDM is used. FDM is an analog technology. FDM divides the spectrum or carrier bandwidth in
logical channels and allocates one user to each channel. Each user can use the channel frequency independently and has exclusive access of it. All channels
are divided in such a way that they do not overlap with each other. Channels are separated by guard bands. Guard band is a frequency which is not
used by either channel.

Time Division Multiplexing: TDM is applied primarily on digital signals but can be applied on analog signals as well. In TDM the shared channel is divided
among its user by means of time slot. Each user can transmit data within the provided time slot only. Digital signals are divided in frames, equivalent to time
slot i.e. frame of an optimal size which can be transmitted in given time slot. TDM works in synchronized mode. Both ends, i.e. Multiplexer and De- multiplexer
are timely synchronized and both switch to next channel simultaneously.
Examination Paper Analysis and Solution

Q5 Draw and explain fiber-optic cable(W-23) 6 Marks


Fiber optic cable:
• A fiber-optic cable is made up of glass or plastic.
• It transmits signals in the form of light.
• The outer jacket is made up of PVC or Teflon.
• Kevlar strands are placed inside the jacket to strengthen the cable.
• Below the Kevlar strands, there is another plastic coating which acts as a cushion.
• The fiber is at the center of the cable, and it consists of cladding and glass core.
• The density of the cladding is less than that of the core.
• Optical fibers use the principle of ‘reflection’ to pass light through a channel.

Ans.

Q 6 Stae any two types of ungided media . (S-23) 2 Marks


Ans.1)Radiowaves
2)Microwaves
3) Infrared
Examination Paper Analysis and Solution

Q7 Describe propogation modes in fiber optic cable. (S-23) 4 Marks


Ans
1) Multimode:
Multimode is so named because multiple beams from a light source move through the core in different paths. How these beams move within the cable depends
on the structure of the core. Multimode having 2 types of modes:
1) Multimode step-index fiber
2) Multimode graded-index fiber
In multimode step-index fiber, the density of the core remains constant from the center to the edges. The term step index refers to the suddenness of this
change, which contributes to the distortion of the signal as it passes through the fiber. (refer fig a) A second type of fiber, called multimode graded-index fiber,
decreases this distortion of the signal through the cable. The word index here refers to the index of refraction. As we saw above, the index of refraction is related
to density. (refer fig b)
B) Single-Mode
Single-mode uses step-index fiber and a highly focused source of light that limits beams to a small range of angles, all close to the horizontal. In this case,
propagation of different beams is almost identical, and delays are negligible. All the beams arrive at the destination "together" and can be recombined with little
distortion to the signal. (refer fig c)

Q9 Compare FDM TDM(any 4 points each (S-23) 4 Marks


Examination Paper Analysis and Solution
Ans
Frequency Division Multiplexing Time division Multiplexing
1) FDM divides the channel into twoor more frequency ranges that do not 1) TDM divides and allocates certain time periods to each channel in an
overlap. alternating manner
2) Frequency is shared 2) Times scale is shared
3) Used with Analog signals 3) Used with both Digital signals and analog signals
4) Interference is high 4) Interference is Low or negligible

Q10 Describe the principal packet switching teching technique with neat diagram. (S-23) 4 Marks

Ans packet Switching:


• The entire message is broken down into smaller chunks called packets. The switching information is added in the header of each packet
and transmitted independently. It is easier for intermediate networking devices to store small size packets and they do not take much resource either on carrier
path or in the internal memory of switches.
• Packet switching enhances line efficiency as packets from multiple applications can be multiplexed over the carrier. The internet uses packet
switching technique. Packet switching enables the user to differentiate data streams based on priorities. Packets are stored and forwarded according to
their priority to provide quality of service.

Q11 write steps to prepare crossover and straight cble using twisted pair cable (S-23) 6 Marks

Ans. In this cable, wires are placed in the same position at both ends. The wire at pin 1 on one end of the cable connects to pin 1 at the other end of the cable.
The wire at pin 2 connects to pin 2 on the other end of the cable; and so on. The following table lists the wire positions of the straight-through cable on both
sides.
Examination Paper Analysis and Solution

A straight-through cable is used to connect the following devices.


1. PC to Switch
2. PC to Hub
3. Router to Switch
4. Switch to Server
5. Hub to Server
cross-over cable n this cable, transmitting pins of one side connect with the receiving pins of the other side. The wire at pin 1 on one end of the cable connects
to pin 3 at the other end of the cable. The wire at pin 2 connects to pin 6 on the other end of the cable. Remaining wires connect in the same positions at both
ends. The following table lists the wire positions of the cross-over cable on both side
Examination Paper Analysis and Solution
The cross-over cable is used to connect the following devices
1. Two computers
2. Two hubs
3. A hub to a switch
4. A cable modem to a router
5. Two router interfaces.

Q12 Compare guided and unguided transmission media . (W-22) 2 Marks

Ans
Sr Guided transmission media Unguided transmission media
No.
1 Guided media also called bounded or wired Unguided media also called unbounded or
media. wireless media.
2 Twisted pair wires , Coaxial cable are the Radio and infrared light are the example of
examples of wired media. wireless media.
3 Additional transmission capacity can be It is not possible to obtain additional capacity.
obtained by adding more wires.
4 Installation is costly , time consuming and Installatin need less time and money .
complicated

Q13 Explain TDM technice with the help of neat diagram. (W-22) 4 Marks
Ans
• Time Division Multiplexing: TDM is applied primarily on digital signals but can be applied on analog signals as well. In TDM the shared channel is
divided among its user by means of time slot. Each user can transmit data within the provided time slot only. Digital signals are divided in frames,
equivalent to time slot i.e. frame of an optimal size which can be transmitted in given time slot. TDM works in synchronized mode. Both ends, i.e.
Multiplexer and De- multiplexer are timely synchronized and both switch to next channel simultaneously.
Examination Paper Analysis and Solution

Q14 state the physical and transmission characteristics of twisted pair cable along with its applications. (W-22) 4 Marks
Ans

Applications:
• telephone lines
• Digital Subscriber Line
• local area networks.

Q15 Draw the neat sketch of fiber optic cable .give the transmission characterstics of fiber optical cable . state its application. (W-22) 4 Marks
Examination Paper Analysis and Solution
Ans

Transmission Characteristics of Optical Fibers Fiber attenuation


• Absorption – Extrinsic and Intrinsic
• Scattering
• Coupling Loss
• Bending
• Dispersion
• Group velocity
• Polarization-maintaining fibers
Applications-
• Fiber-optic cable is often found in backbone networks because its
• wide bandwidth is cost-effective.
• High speed- with wavelength-division multiplexing (WDM), we
• can transfer data at a rate of 1600 Gbps.

UNIT 3 Error Detection, Correction and Wireless Communication


Examination Paper Analysis and Solution
Q1. State types of error. (W-23) 4 Marks
Ans.Types of errors are;
• Single Bit Error
• Multiple Bit Error
• Burst Error
Q. Compare LRC and VRC(W-23) 4 Marks
Ans.
VRC LRC
It stands for Vertical Redundancy Check. It stands for Longitudinal Redundancy Check.
In this redundant bit called parity bit is added to In this redundant row of bits is added to the whole
each data unit. block.
VRC can detect single bit errors. LRC can detect burst errors.
It is also known as parity checker. It is also known as 2-D parity checker.
The advantage of using VRC is that it can checks The advantage of using LRC over VRC is that it
all single bit errors but can check odd parity only can check all the burst errors.
in the case of change of odd bits.

Q. Explain wireless LAN 802.11 architecture. (W-23) 6 Marks


Ans.
Wireless LAN 802.11:
The IEEE 802.11 standard defines the physical layer and media access control (MAC) layer for a wireless local area network. Wireless LANs transmit and
receive data over the atmosphere, using radio frequency (RF) or infrared optical technology, thereby eliminating the need for fixed wired connections.
802.11 Architecture:
The 802.11architecture defines two types of services:
1. Basic services set (BSS)
2. Extended Service Set (ESS)
Basic Services Set (BSS)
• The basic services set contain stationary or mobile wireless stations and a
central base station called access point (AP).
• The use of access point is optional.
• If the access point is not present, it is known as stand-alone network. Such a BSS cannot send data to other BSSs. This type of architecture is known as
adhoc architecture.
• The BSS in which an access point is present is known as an infrastructure network.
Examination Paper Analysis and Solution

Extend Service Set (ESS)


An extended service set is created by joining two or more basic service sets (BSS) having access points (APs).
These extended networks are created by joining the access points of basic services sets through a wired LAN known as distribution system.

There are two types of stations in ESS:


(i) Mobile stations: These are normal stations inside a BSS.
(ii) Stationary stations: These are AP stations that are part of a wired LAN.

Q. Draw and Explain Piconet Bluetooth Architecture(W-23) 6 Marks


Ans.
• Piconet is a Bluetooth network that consists of one primary (master) node and seven active secondary (slave) nodes.
• Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or stations within the distance of 10 meters.
• There can be only one primary or master station in each piconet.
• The communication between the primary and the secondary can be one-to-one or one-to-many.
Examination Paper Analysis and Solution
• All communication is between master and a slave. Salve-slave communication is not possible.
• In addition to seven active slave station, a piconet can have upto 255 parked nodes. These parked nodes are secondary or slave stations and cannot take
part in communication until it is moved from parked state to active state.

Q. State any two limitations of Bluetooth. (S-23) 2 Marks


Ans.
It can be hacked and hence, less secure.
It has a slow data transfer rate: of 3 Mbps.
It has a small range: 10 meters.
Bluetooth communication does not support routing.
The issues of handoffs have not been addressed.

Q. Compare 3G and 4G mobile generation on the basis of data speed, technology, standard and services. (S-23) 4 Marks
Ans.
Aspect 3G 4G
Data Speed Typically, 0.5 to 2 Mbps Up to 100 Mbps (mobile) to 1
Gbps (fixed)
Technology UMTS, HSPA, CDMA2000 LTE, WiMAX
Standard IMT-2000 IMT-Advanced
Services Voice, limited data services High-definition video streaming,
online gaming, video
conferencing, IoT
Applications Email, basic web browsing, Advanced mobile applications,
multimedia streaming IoT devices, augmented reality

Q. The following bit stream is encoded with VRC, LRC and even parity Locate and correct the error if it is present. (S-23) 4 Marks
11000011 11110011
10110010 00001010
Examination Paper Analysis and Solution
00101010 00101011
10100011 00101011
11100001 01001011

Ans.
Original Data –
11000011
10110010
00101010
10100011
11111000

Corrected Data with LRC is as follows:


11000011
10110010
00101010
10100011
11111000

Original Data –
11000011
10110010
00101011
00101011
01001011

Corrected Data with LRC is as follows:


11000011
10110010
00101011
00101011
01111001

Q. Calculate CRC for the frame 110101011 and generator polynomial x4 + x + 1 and write the transmitted frame. (S-23) 6 Marks
Examination Paper Analysis and Solution

Q. Draw the architecture of Bluetooth and explain. (W-22) 4 Marks


Ans.
Piconet:
• Piconet is a Bluetooth network that consists of one primary (master) node and seven active secondary (slave) nodes.
• Thus, piconet can have up to eight active nodes (1 master and 7 slaves) or stations within the distance of 10 meters.
• There can be only one primary or master station in each piconet.
• The communication between the primary and the secondary can be one-to-one or one-to-many.
• All communication is between master and a slave. Salve-slave communication is not possible.
• In addition to seven active slave station, a piconet can have upto 255 parked nodes. These parked nodes are secondary or slave stations and cannot take part in
communication until it is moved from parked state to active state.
Examination Paper Analysis and Solution

Scatternet
• Scatternet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other piconet.
• Such a station or node can receive messages from the master in the first piconet and deliver the message to its slaves in other piconet where it is acting as master.
This node is also called bridge slave.
• Thus, a station can be a member of two piconets.
• A station cannot be a master in two piconets.

Q14 state features of various mobile generation. (W-22) 4 Marks

Ans Features of various mobile generation are the following:


Examination Paper Analysis and Solution
1G (1st Generation):
• First-time calling was introduced in mobile systems.
• It used analog signals.
• It used an FDD scheme and typically allocated a bandwidth of 25 Mhz.
• The coverage area was small.
• No roaming support between various operators.
• Low sound quality.
• Speed:- 2.4 kbps.

2G (2nd Generation) :
• Shifted from analog to digital.
• It supported voice and SMS both.
• Supported all 4 sectors of the wireless industry namely Digital cellular, Mobile Data, PCS, WLAN,
• Moderate mobile data service.
• 2G WLAN provided a high data rate & large area coverage.
• Speed:- 64 kbps.

3G (3rd Generation) :
• The Internet system was improved.
• Better system and capacity.
• Offers high-speed wireless internet.
•The connection used was UMTS and WCMA.
• Speed:- 2mbps.

4G (4th Generation) :
• IP-based protocols.
• LTE (Long term evaluation) was mainly for the internet.
• Vo-LTE (Voice over LTE) is for both voice and the internet.
• Freedom and flexibility to select any desired service with reasonable QoS.
• High usability.
• Supports multimedia service at a low transmission cost.
• HD Quality Streaming
. • Speed:-100mbps
.
5G (5th Generation): It is yet to come in many countries but here are some notable points about 5G
. • Higher data rates.
• Connectivity will be more fast and more secure,
Examination Paper Analysis and Solution
• Data Latency will be reduced to a great level.
• Massive network capacity.
• It is 30 times faster than 4G.
• There would be more flexibility in the network.

UNIT 4 Network Topologie and devices

Q1 list network topology (W-23) 2 Marks


Ans. The structure of a network including physical arrangement of devices is called topology. Topologies are of following types:
1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
5. Hybrid Topology
6. Tree Topology
Q2 list any four networking connecting devices . (W-23) 4 Marks

Ans Followings are the Network Control/Connecting device:


1. Repeater
2. Hub
3. Switch
4. Bridge
5. Router
6. Gateway
7. Modem

Q3 With suitable diagram describe(W-23) 4 Marks

STAR Topology
RING Topology
Ans. i) STAR Topology
Star topology is a network topology where each individual piece of a network is attached to a central node (often called a hub or switch). The attachment of these
network pieces to the central component is visually represented in a form similar to a star. The hub and hosts, and the transmission lines between them, form a graph
with the topology of a star. Data on a star network passes through the hub before continuing to its destination. The hub manages and controls all functions of the
network. It also acts as a repeater for the data flow.
Examination Paper Analysis and Solution

The star network is one of the most common computer network topologies.
ii) RING Topology
A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a
ring. Data travels from node to node, with each node along the way handling every packet. Ring topology refers to a specific kind of network setup in which
devices are connected in a ring and pass information to or from each other according to their adjacent proximity in the ring structure.

Q4Differentiate between Hub and switch. (any four points) (W-23) 4 Marks
Ans
Sr. No HUB SWITCH
1 Hub is operated on Physical layer of OSI model While switch is operated on Data link layer of OSI Model.
2 Hub have 4/12 ports. Switch can have 24 to 48 ports
3 Hub is not an intelligent device that sends message to all While switch is an intelligent device that sends message to selected destination, so it is
ports hence it is comparatively inexpensive. Hub cannot be expensive. Switch can be used as a repeater
used as a repeater
4 Speed of original hub 10Mbps and modern internet hub is Maximum speed is 10Mbps to 100Mbps
100Mbps

Q8 Describe the working of router with sutiable diagram . (S-23) 4 Marks


Ans
Router is a device that connects 2 or more networks. It consist of hardware and software .hardware includes the physical interfaces to the various networks in the
internetwork. Software in a router is OS and routing protocols management software. 1) Router use logical and physical addressing to connect two or more logically
separate networks. 2) They accomplish this connection by organizing the large network into logical
network called subnets. 3) Each of the subnet is given a logical address. This allows the network to be separate but still access to each other and exchange data.
4) Data is grouped into packets. Each packet has physical device address and logical network address.
Examination Paper Analysis and Solution

Q9 Draw suitable lab with 10 hosts and a wireless printers.List all components in the Layout. (S-23) 6 Marks
Ans

Components required to design above layout:


Router/Switch
Laptop(10)/computers
Cat5/Cat6 cable
RJ45 connector
Examination Paper Analysis and Solution
Q11 Diffrantiate Between HUB and Switch with respect to layer ,port, device type , Speed. (W-22) 4 Marks
Ans
Sr No. HUB SWITCH
1 Hub is operated on Physical layer of OSI model. While switch is operated on Data link layer of OSI Model
2 Hub have 4/12 ports. Switch can have 24 to 48 ports.
3 Hub is not an intelligent device that sends message to all ports hence While switch is an intelligent device that sends message to selected
it is comparatively destination, so it is
inexpensive. Hub cannot be used as a repeater expensive. Switch can be used as a repeater
4 Speed of original hub 10Mbps and modern internet hub is 100Mbps Maximum speed is 10Mbps to 100Mbps.

Q12 Explain with neat sketch the working of Router and switch. (W-22) 6 Marks
Ans Router is a device that connects 2 or more networks. It consist of hardware and software .hardware includes the physical interfaces to the various networks in the
internetwork. Software in a router is OS and routing protocols management software.
1) Router use logical and physical addressing to connect two or more logically separate networks.
2) They accomplish this connection by organizing the large network into logical network called subnets.
3) Each of the subnet is given a logical address. This allows the network to be separate but still access to each other and exchange data.
4) Data is grouped into packets. Each packet has physical device address and logical network address.

Switch:-
Switch : Switch is used to connect the multiple devices together in a LAN segment. Switches are network devices used to connect multiple computers in
which it can direct a transmission to its specific destination. (Unicast the signals). There are two types of switches namely, Layer-2 and Layer-3 switches.
They can be used to connect single or multiple networks. Layer 2 Switches operate in the data link layer (layer 2) using the MAC addresses. Layer 3 Switches
operate in the network layer (layer 3) using the IP address
Examination Paper Analysis and Solution

UNIT 5 Referance Model


Q1 Explain OSI reference model in detail. (W-23) 2 Marks
Ans. OSI model (Open System Interconnection) model was developed by ISO (international standard organization) which provides way to understand how
internetwork operates. It gives guidelines for creating network standard. OSI model has 7 layers as shown in the figure.

Physical Layer: OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through the network at the electrical and mechanical
level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects.
Data Link Layer: At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and
handles errors in the physical layer, flow control and frame synchronization..
Network Layer: Layer 3 provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node.
Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Transport Layer: This Layer, provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow
control. It ensures complete data transfer from source to destination.
Session Layer: This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates
conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination
Presentation Layer: This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format,
and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be
sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax & semantics.
Application Layer: This Layer, supports application and end-user processes. Everything at this layer is application-specific. This layer provides application
services for file.

Q3. Explain the function of presentation layer and network layer. (W-23) 4 Marks
Examination Paper Analysis and Solution
Ans Translation: The processes in two systems exchange the information in the form of character strings, numbers and so on. Different computers use different
encoding methods, the presentation layer handles the interoperability between the different encoding methods. It converts the data from sender-dependent
format into a common format and changes the common format into receiver-dependent format at the receiving end.
Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting the sender-transmitted information into another form and sends the
resulting message over the network.
Compression: Data compression is a process of compressing the data, i.e., it reduces the number of bits to be transmitted. Data compression is very important
in multimedia such as text, audio, video.
Functions of Network Layer: Internetworking: An internetworking is the main responsibility of the network layer. It provides a logical connection between different
devices.
Addressing: A Network layer adds the source and destination address to the header of the frame. Addressing is used to identify the device on the internet.
Routing: Routing is the major component of the network layer, and it determines the best optimal path out of the multiple paths from source
to the destination.
Packetizing: A Network Layer receives the packets from the upper layer and converts them into packets. This process is known as Packetizing. It is achieved
by internet protocol (IP).

Q4.Describe the various IP address classes with suitable example. (W-23) 4 Marks
Ans An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is
the set of rules governing the format of data sent via the internet or local network. There are different types of IP Address classes Class A, Class B, Class C,
Class D, Class E.

In this, the first bit is ‘0’. The next 7 bits are used indicate network id. Rest of the 3 bytes are used to indicate host id. Thus the First Byte in Class A type of IP
address will have a range from 0 to 126.
Example : 10.1.2.1 In this, the first byte ‘10’ has first bit 0, and hence it belongs to class A IP address.
Class B :
Class B IP address format is given below:
Examination Paper Analysis and Solution
n this, the first two bits are ‘1 0’. The next 14 bits are used indicate network id. Rest of the 2 bytes are used to indicate host id. Thus, the first byte of class B
type of IP address has a range from 128 to 191.
Example : 187.4.5.1 In this address, the first byte ‘187’ has first two bits as 10.
Class C :
Class C IP address format is given below:

In this, the first three bits are ‘1 1 0’. The next 21 bits are used indicate network id. Rest of the One byte is used to indicate host id. Thus the first byte of the IP
address in class C has range from 192 to 223.
Example : 192.168.1.2 In this the first three bits are 110, which represents the Class C type IP address.
Class D:
Class D IP address format is given below:

If first 4 bits are ‘1 1 1 0’ the IP address belongs to class D. The IPv4 networking standard defines Class D addresses as reserved for multicast. Multicast is a
mechanism for defining groups of nodes and sending IP messages to that group rather than to every node on the LAN (broadcast) or just one other node
(unicast). Multicast is mainly used on research networks. As with Class E, Class D addresses should not be used by ordinary nodes on the Internet. The
range for first byte of class D starts from 224 till 239.
Example: 225.25.2.1 Here, the first 4 bits are 1110.
Class E:
Class E IP address format is given below:

If first 5 bits are ‘1 1 1 1 0’ the IP address belongs to class E. For class E minimum value for reserved address is 240.0.0.0 to 255.255.255.255. These are used
for research work in IP addresses.
Example: 245.5.6.2 Here, the first 5 bits are 11110.

Q4. Compare IPV4 and IPV6 packet format. (W-23) 6 Marks


Examination Paper Analysis and Solution
Ans.
Sr No. IPV4 IPV6
1 Source and destination addresses are 32 bits (4 bytes) in length. Source and destination addresses are 128Bits (16 bytes) in length.
2 No. addresses are limited to number of bits (32 bits) Larger addressing area
3 Uses broadcast addresses to send traffic to all nodes on a There are no IPv6 broadcast addresses. Instead, multicast scoped
subnet. addresses aroused
4 Fragmentation is supported at Originating hosts and intermediate Fragmentation is not supported at routers. It is only supported at the
routers. originating host

Q5. Explaiç l SMTPy HTTP protocol in detail. (W-23) 6 Marks


Ans SMTP (Simple Mail Transfer Protocol): SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving email. SMTP is an
application layer protocol.

SMTP Model:

Components of SMTP
Mail User Agent (MUA)
Mail Submission Agent (MSA)
Mail Transfer Agent (MTA)
Mail Delivery Agent (MDA)
Working of SMTP
1. Communication between the sender and the receiver: The sender’s user agent prepares the message and sends it to them MTA. The MTA’s responsibility
is to transfer the mail across the network to the receiver’s MTA. To send mail, a system must have a client MTA, and to receive mail, a system must have a
server MTA.
2. Sending Emails:
Examination Paper Analysis and Solution
Mail is sent by a series of request and response messages between the client and the server. The message which is sent across consists of a header and a .
A null line is used to terminate the mail header and everything after the null line is considered the body of the message, which is a sequence of ASCII
characters. The message body contains the actual information read by the receipt.
3. Receiving Emails:
The user agent on the server-side checks the mailboxes at a particular time of intervals. If any information is received, it informs the user
about the mail. When the user tries to read the mail it displays a list of emails with a short description of each mail in the mailbox. By selecting any of the mail
users can view its contents on the terminal. HTTP (Hypertext Transfer Protocol):
The HTTP protocol can be used to transfer the data in the form of plain text, hypertext, audio, video, and so on.
HTTP is similar to SMTP as the data is transferred between client and server.
The HTTP differs from the SMTP in the way the messages are sent from the client to the server and from server to the client.
SMTP messages are stored and forwarded while HTTP messages are delivered immediately.
HTTP is an application layer protocol.
Features of HTTP:
Connectionless protocol: HTTP is a connectionless protocol. HTTP client initiates a request and waits for a response from the server.
Media independent: HTTP protocol is a media independent as data can be sent as long as both the client and server know how to handle the data content.
Stateless: HTTP is a stateless protocol as both the client and server know each other only during the current request. HTTP messages are of two types:
request and response. Both the message types follow the same message format. Request Message: The request message is sent by the client that consists
of a request line, headers, and sometimes a body.

Response Message: The response message is sent by the server to the client that consists of a status line, headers, and sometimes a body.
ARP( Address Resolution Protocol):
ARP works at Data link layer in the OSI model. It is responsible to find the hardware address of a host from a known IP address. The ARP’s main task is to
convert the 32-bit IP address (for IPv4) to a 48- bit MAC address. ARP Packet Format The ARP packet format is used for ARP requests and replies and
consists of multiple fields including hardware type, protocol type, hardware and protocol size, operation, sender and target hardware, and IP addresses.

Q7 List any four application layer protocol. (S-23) 2 Marks


Ans
1. Simple Mail Transfer Protocol (SMTP)
Examination Paper Analysis and Solution
2. File Transfer Protocol (FTP)
3. Hyper Text Transfer Protocol (HTTP)
4. Trivial File Transfer Protocol (TFTP)
5. TELetype NETwork (TELNET)
6. Simple Network Management Protocol
7. Dynamic Host Configuration Protocol (DHCP)

Q8 Describe the process of DHCP server configuration. (S-23) 4 Marks


Ans
A DHCP server (Dynamic Host Configuration Protocol) is a server that automatically assigns IP addresses to computers and other devices on the network.
Without a DHCP server, each device on the network would need to be manually configured with an IP
address. Process of DHCP server configuration
Step 1: Open Server Manager Click the start button then click the Server Manager
Step 2: Add roles and features On the server manager dashboard click “Add roles and features” This will start the add roles and features wizard. Click next on
the before you begin page.
Step 3: Select Role-based or feature-based installation Make sure “Role-based or feature-based installation is selected and click next
Step 4: Select destination server On this page, choose the server you want the DHCP service installed on
Step 5: Select server roles On this page, you want to select the DHCP server roles and click next. When you select the roll you will get a pop up asking to add
features that are required for DHCP server. Click add features Back on the select server roles page click next
Step 6: Feature, DHCP Server On the features, screen click next. On the DHCP server click next.
Step 7: Confirmation On the confirmation page, you can select to automatically restart the server if required. On 2016 server, it does not require a restart.
Configure DHCP Server If you followed, the steps above you should now have the DHCP service installed. But, It still needs to be configured.
Step 1: Server Manager In the server manager dashboard, you will see a yellow notification at the top left. Click on it Now click on “Complete DHCP configuration”
Step 2: Post-Install configuration wizard On the description screen click next On the authorization page use AD credentials if the server is joined to the domain.
Choose “Skip AD authorization” if the DHCP server is standalone and not joined to the domain. Click commit
You will see a summary page of the configuration steps Click close Now you can open the DHCP management console to configure DHCP scopes and other
options. To access the DHCP management console click start -> Windows Administrative Tool -> DHCPThe next steps are to configure a new scope, configure
scope options and ensure clients can access the DHCP server.

Q9 Name the protocol used in (S-23) 4 Marks


I. Data link layer
II. Network layer
III. Transport layer
IV. Presentationn layer
Ans
Data Link Layer: ARP, CSLIP, HDLC, IEEE.802.3, PPP, X-25, SLIP, ATM, SDLS and PLIP.
Network Layer: Internet Protocol (IPv4), Internet Protocol (IPv6), IPX, AppleTalk, ICMP, IPSec and IGMP.
Examination Paper Analysis and Solution
Transport Layer: Transmission Control Protocol (TCP), UDP, SPX, DCCP and SCTP.
Presentation Layer: XDR, TLS, SSL and MIME.

Q12 Compare OSI and TCP/IP network model (any six point each) (S-23) 6 Marks
Ans
Sr No. OSI TCP/IP
1 OSI model provides a clear distinction TCP/IP doesn’t have any clear distinguishing
between interfaces, services, and protocols. points between services, interfaces, and
protocols

2 OSI refers to Open Systems TCP refers to Transmission Control Protocol.


Interconnection.
3 OSI uses the network layer to define TCP/IP uses only the Internet layer.
routing standards and protocols.
4 OSI follows a vertical approach. TCP/IP follows a horizontal approach.
5 OSI layers have seven layers TCP/IP has four layers.
6 In the OSI model, the transport layer is A layer of the TCP/IP model is both
only connection-oriented. connection-oriented and connectionless.

Q13 State the service of transport layer. (W-22) 2 Marks


Ans
Functions of Transport Layer In OSI Model:
• The transport layer provides services to the application layer and takes services from the network layer.
• The data in the transport layer is referred to as Segments. It is responsible for the End-to-End Delivery of the complete message.
• The transport layer also provides the acknowledgement of the successful data transmission and re-transmits the data if an error is found. Transport layer
receives the formatted data from the upper layers, performs Segmentation, and also implements Flow & Error control to ensure proper data transmission.
• It also adds Source and Destination port numbers in its header and forwards the segmented data to the Network Layer.
• Transport Layer reads the port number from its header and forwards the Data which it has received to the respective application. It also performs sequencing
and reassembling of the segmented data.

Q15 Draw and Explain TCP/IP protocol suite. (W-22) 4 Marks

Ans
Examination Paper Analysis and Solution
TCP/IP Reference Model is a four-layered suite of communication protocols It is named after the two main protocols that are used in the model, namely, TCP
and IP. TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. The four layers in the TCP/IP protocol suite are –
1. Network Access Layer −It is the lowest layer that is concerned with the physical transmission of data. TCP/IP does not specifically define any protocol here
but supports all the standard protocols.
2. Internet Layer −It defines the protocols for logical transmission of data over the network. The main protocol in this layer is Internet Protocol (IP) and it is
supported by the protocols ICMP, IGMP, RARP, and ARP.
3. Transport Layer − It is responsible for error-free end-to-end delivery of data. The protocols defined here are Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP).
4.. Application Layer − This is the topmost layer and defines the interface of host programs with the transport layer services. This layer includes all high-level
protocols like Telnet, DNS, HTTP, FTP, SMTP, etc. The following diagram shows the TCP/IP layers

Q17 Describe the terms with sutible example. (W-22) 6 Marks

i)subnetting
ii) supernatting
iii) Masking
Ans
i)subnetting
When a bigger network is divided into smaller networks, in order to maintain security, then that is known as Subnetting. So, maintenance is easier for smaller
networks. In supernetting, Host addresses’s bits are increased. For example, if we consider a class A address, the possible number of hosts is 224 for each
network, it is obvious that it is difficult to maintain such a huge number of hosts, but it would be quite easier to maintain if we divide the network into small parts.
Examination Paper Analysis and Solution

In the above diagram, there are two Subnets. Note: It is a class C IP so, there are 24 bits in the network id part and 8 bits in the host id part. Subnetting for a
network should be done in such a way that it does not affect the network bits. In class C the first 3 octets are network bits so it remains as it is.

ii) Supernetting
Supernetting is the procedure to combine the small networks into larger space. In subnetting, Network addresses’s bits are increased. Supernetting is
implemented via Classless interdomain routing. Example: Suppose we have four small networks with network ID as 201.1.0.0, 201.1.1.0, 201.1.2.0, 201.1.3.0.
The ability to aggregate these networks can be assessed based on the following
1. Contiguous: As we can see that all the four networks are Class C networks. The range of the first network is from 201.1.0.0 to 201.1.0.255. The range of the
second network start from 201.1.1.0. If we add 1 to the last IP address of the first network we get the starting IP address of the second network. Similarly, we
can check that all the networks are contiguous.
2. Same Size: All the networks are of class C.
3. Divisibility: The first IP address should be divisible by the total size of the networks. First IP address binary representation: 11001001.00000001.000000
00.00000000 The last 10 bits are zero. Hence it divisible by the size of the network. Hence, all three conditions are satisfied. These four networks can be
combined to form a supernet. The supernet ID or the network ID for all the four networks will be 201.1.0.0 .
Examination Paper Analysis and Solution

iii) Masking A subnet mask is a 32-bit number which is used to identify the subnet of an IP address. The subnet mask is combination of 1’s and 0’s. 1’s
represents network and subnet ID while 0’s represents the host ID. For the IP address 255.255.255.192, subnet mask is,
11111111.11111111.11111111.11000000

You might also like