Model Answer Paper Winter 2019
Model Answer Paper Winter 2019
Model Answer Paper Winter 2019
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
WINTER – 19 EXAMINATION
Subject Name: Data Communication and Network
Model Answer
1|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It is more efficient and more reliable In this transmission start bits and
than asynchronous transmission to stop bits are added with data.
transfer the large amount of data.
3|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Optical fibers use the principle of ‘reflection’ to pass light through a channel.
c Explain wireless LAN 802.17 architecture. 4M
Ans Consider
Wireless LAN 802.11: IEEE 802.11
The IEEE 802.11 standard defines the physical layer and media access control instead of
(MAC) layer for a wireless local area network. Wireless LANs transmit and 802.17
receive data over the atmosphere, using radio frequency (RF) or infrared optical
technology, thereby; eliminating the need for fixed wired connections.
802.11 Architecture: BSS diagram
1M,
The 802.11architecture defines two types of services: Explanation -
1M-
1. Basic services set (BSS) ESS diagram
1M,
2. Extended Service Set (ESS) Explanation -
1M
1. Basic Services Set (BSS)
• The basic services set contain stationary or mobile wireless stations and a *Note:
central base station called access point (AP). If student
• The use of access point is optional. attempted to
• If the access point is not present, it is known as stand-alone network. Such a solve the
BSS cannot send data to other BSSs. This type of architecture is known as adhoc answer give
architecture. appropriate
• The BSS in which an access point is present is known as an infrastructure marks.
network.
4|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
These extended networks are created by joining the access points of basic services
sets through a wired LAN known as distribution system.
(ii) Stationary stations: These are AP stations that are part of a wired LAN.
5|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
6|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
7|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
3.Radio wave propagation is susceptible to weather effects like rain, thunder and
storm etc.
b Draw and explain block diagram of communication system. 4M
Ans 1 M diagram.
3M
explanation
1. Message
2. Sender
3. Medium
4. Receiver
5. Protocol
Message:
Medium: The message originated from sender needs a path over which it can
travel to the receiver. Such path is called as medium or channel
8|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Receiver: It is the device which receives the message and reproduces it. A
receiver can be host, camera, workstation, telephone etc.
3. Switch
4. Bridge
5. Router
6. Gateway
7. Modem
Repeater:
It is used to take the distorted, weak and corrupt input signal and regenerate
this signal at its output.
It ensures that the signals are not distorted or weak before it reaches the
destination.
It recreates the bit pattern of the signal, and puts this regenerated signal back
on to the transmission medium
Hub:
9|2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It operates in both the physical and the data link layer.
Bridge:
It inspects incoming traffic and decides whether to forward or discard it.
A bridge operates in both the physical and the data link layer.
Gateway:
It is a node in a computer network, a key stopping point for data on its way to
or from other networks.
Router:
It is a device that helps in determining the best and shortest path out of the
available paths, for a particular transmission.
Routers use logical and physical addressing to connect two or more logically
separate networks.
Router read complex network address in packet and efficiently directs packets
from one network to another, reducing excessive traffic.
Modem:
10 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
It is the device used to converts digital signals generated by the computer into
analog signals which can be transmitted over a telephone or cable line
transforms incoming analog signals into their digital equivalents.
11 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
12 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
bandwidth in logical channels and allocates one user to each channel. Each user
can use the channel frequency independently and has exclusive access of it. All
channels are divided in such a way that they do not overlap with each other.
Channels are separated by guard bands. Guard band is a frequency which is not
used by either channel.
When channel A transmits its frame at one end, the De-multiplexer provides
media to channel A on the other end. As soon as the channel A’s time slot
expires, this side switches to channel B. On the other end, the De-multiplexer
13 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
14 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Data Transfer: Once the circuit has been established, data and voice are
transferred from the source to the destination. The dedicated connection
remains as long as the end parties communicate.
Circuit Disconnection: When data transfer is complete, the connection
is relinquished. The disconnection is initiated by any one of the user.
Disconnection involves removal of all intermediate links from the sender
to the receiver.
15 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
2. Protocol is used to connect to the host, so that the packets can be sent over it.
4. Order in which packets are received is different from the way they are sent.
o Delivering IP packets
o Performing routing
o Avoiding congestion
16 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
5. Transport layer breaks the message (data) into small units so that they are
handled more efficiently by the network layer.
The TCP/IP specifications described a lot of applications that were at the top of
the protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
1. Telnets a two-way communication protocol which allows connecting to a
remote machine and run applications on it.
2. FTP (File Transfer Protocol) is protocol that allows File transfer amongst
computer users connected over a network. It is reliable, simple and efficient.
3. SMTP (Simple Mail Transport Protocol) is a protocol, which is used to
transport electronic mail between a source and destination, directed via a route.
4. DNS (Domain Name Server) resolves an IP address into a textual address for
Hosts connected over a network.
17 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Simplex Mode
Half duplex Mode
Full duplex Mode
1. In Simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit; the other can
only receive. The simplex mode can use the entire capacity of the
channel to send data in one direction.
Keyboards, traditional monitors and printers are examples of simplex devices.
2. In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa. The half-duplex mode is used in cases where there is no need for
communication in both directions at the same time. The entire capacity of the
channel can be utilized for each direction
-for example: Walkie-talkies.
18 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
namely, either the link must contain two physically separate transmission
paths or the capacity of the channel is divided between signals traveling in
both directions .One common example of full-duplex communication is the
telephone network. When two people are communicating by a telephone
line, both can talk and listen at the same time.
19 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Circuit switching was designed for voice applications. Telephone is the best
suitable example of circuit switching. Before a user can make a call, a virtual
path between callers and called is established over the network.
Packet Switching: The entire message is broken down into smaller chunks
called packets. The switching information is added in the header of each packet
and transmitted independently.
It is easier for intermediate networking devices to store small size packets and
they do not take much resource either on carrier path or in the internal memory
of switches.
20 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Configure and start the intend daemon on each host machine on the
network. Read TCP/IP daemons and then follow the instructions
in Configuring the intend daemon.
Configure each host machine to perform either local name resolution or to
use a name server. If a hierarchical Domain Name networks being set up,
configure at least one host to function as a name server.
Decide which services each host machine on the network will use.
By default, all services are available. Follow the instructions in Client network
services if you wish to make a particular service unavailable.
Decide which hosts on the network will be servers, and which services a
particular server will provide.Follow the instructions in Server network
services to start the server daemons you wish to run.
21 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
• The communication between the primary and the secondary can be one-to-one
or one-to-many.
22 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
7. Select BOOTP only, set the lease duration to Unlimited, and click OK.
8. Right-click Reservations.
9. Enter the IP address and the MAC address for Controller A. Click
Add.
23 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
10. Enter the IP address and the MAC address for Controller B. Click
Add.
Ans 4 components-
Wireless Network Infrastructures
11/2M each
The infrastructure of a wireless network interconnects wireless users and end
systems. The infrastructure might consist of base stations, access controllers,
application connectivity software, and a distribution system. These components
enhance wireless communications and fulfill important functions necessary for
specific applications.
1. Base Stations
The base station is a common infrastructure component that interfaces the
wireless communications signals traveling through the air medium to a wired
network? Often referred to as a distribution system. Therefore, a base station
enables users to access a wide range of network services, such as web browsing,
e-mail access, and database applications. A base station often contains a wireless
NIC that implements the same technology in operation by the user's wireless
NIC.
Residential gateways and routers are more advanced forms of base stations that
enable additional network functions.
As show in Figure a base station might support point-to-point or point-to-
multipoint communications.
24 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Access Controllers
In the absence of adequate security, quality of service (QoS), and roaming
mechanisms in wireless network standards, companies offer access-control
solutions to strengthen wireless systems. The key component to these solutions
is an access controller, which is typically hardware that resides on the wired
portion of the network between the access points and the protected side of the
network. Access controllers provide centralized intelligence behind the access
points to regulate traffic between the open wireless network and important
resources. In some cases, the access point contains the access control function.
Application Connectivity Software
Web surfing and e-mail generally perform well over wireless networks. All it
takes is a browser and e-mail software on the client device. Users might lose a
wireless connection from time to time, but the protocols in use for these
relatively simple applications are resilient under most conditions.
Special application connectivity software is necessary as an interface between
a user's computer device and the end system hosting the application's software
or database.
25 | 2 6
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
Distribution System
A wireless network is seldom entirely free of wires. The distribution system,
which often includes wiring, is generally necessary to tie together the access
points, access controllers, and servers. In most cases, the common Ethernet
comprises the distribution system.
26 | 2 6