Important Instructions To Examiners:: Enlist Four Advantages of LAN
Important Instructions To Examiners:: Enlist Four Advantages of LAN
Important Instructions To Examiners:: Enlist Four Advantages of LAN
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 2 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
LAN offers high bandwidth for WAN offers low bandwidth for
the transmission. the transmission.
It works on the principle of It operates on the principle of
broadcasting. point-to-point.
If there is a requirement to When it comes to WAN, the
connect more devices in a LAN, setup of additional devices will
it can be easily done. It will not cost high because networks in
cost much. remote areas must be
connected.
e) List four commands of SMTP. 2M
Ans. Commands of SMTP: ½M
1. HELO each,
2. EHLO any four
3. MAIL FROM correct
4. RCPT TO comman
5. SIZE ds
6. DATA
7. VRFY
8. TURN
9. AUTH
10. RSET
11. EXPN
12. HELP
13. QUIT
Page 3 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
ii) Star
Page 4 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. Cladding
This is the thin layer that surrounds the fibre core and serves as a
boundary that contains the light waves and causes the refractions,
enabling data to travel throughout the length of fibre segment.
3. Coating
This is a layer of plastic that surrounds the core and cladding to
reinforce and protect the fibre core. Coatings are measured in
microns and can range from 250 to 900 microns.
4. Strengthening Fibres
These components help to protect the core against crushing forces
and excessive tension during installation.
5. Cable Jacket
This is the outer layer of any cable. Most fibre optic cables have
an orange jacket, although some types can have black or yellow
jackets.
Page 5 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
OSI model has following 7 layers as Physical layer, Data link layer,
Network layer, Transport layer, Session layer, Presentation layer,
Application layer.
Following are the functions performed by the above layers.
1. Physical layer:
It deals with the mechanical and electrical specification of the
interface and transmission medium.
Physical characteristics of interfaces and medium.
Representation of bits or signals.
Data rate
Synchronization of bit
Line configuration or connection type.
Physical topology
Transmission mode.
2. Data link layer
It performs node to node delivery of the data. It is responsible
for transmitting group of bits between the adjacent nodes. The
group of bits is called as frame.
Framing
Physical addressing
Flow control
Error control
Media access control
Node to node delivery
Page 6 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
3. Network layer:
It is responsible for routing the packets within the subnet i.e.
from source to destination. It is responsible for source to
destination delivery of individual packets across multiple
networks. It ensures that packet is delivered from point of
origin to destination.
Logical addressing
Routing
Congestion control
Accounting and billing
Address transformation
Source host to destination host error free delivery of
packet.
4. Transport layer:
Responsibility of process to process delivery of message
ensures that whole message arrives in order.
Service point addressing
Segmentation and reassembly
Connection control
Flow control is performed end to end
Error control
6. Presentation layer:
It is concerned with syntax, semantics of information
exchanged between the two systems.
Translation: Presentation layer is responsible for
converting various formats into required format of the
Page 7 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
recipient.
Encryption: Data encryption and decryption is done by
presentation layer for security.
Compression and Decompression: data is compressed
while sending and decompress while receiving for
reducing time of transmission.
Page 8 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 9 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 11 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
OR
Page 12 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 13 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
The above figure shows the basic model of the FTP. The FTP client
has three components: the user interface, control process, and data
transfer process. The server has two components: the server control
process and the server data transfer process. The control connection is
made between the control processes. The data connection is made
between the data transfer processes.
FTP client is a program that implements a file transfer protocol which
allows you to transfer files between two hosts on the internet. It
allows a user to connect to a remote host and upload or download the
files. The FTP program is also available as a built-in component in a
Web browser. This GUI based FTP client makes the file transfer very
easy and also does not require to remember the FTP commands.
Advantages of FTP:
Speed: One of the biggest advantages of FTP is speed. The FTP
is one of the fastest way to transfer the files from one computer to
Page 14 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
another computer.
Efficient: It is more efficient as we do not need to complete all
the operations to get the entire file.
Security: FTP is more secure as it required username and
password to access the FTP server.
Back & forth movement: FTP allows us to transfer the files
back and forth. For example a manager of the company sends
some information to all the employees, and they all send
information back on the same server.
Disadvantages of FTP:
It also doesn't allow to run simultaneous transfers to multiple
receivers.
Passwords and file contents are sent in clear text that allows
unwanted eavesdropping. So, it is quite possible that attackers can
carry out the brute force attack by trying to guess the FTP
password.
It is not compatible with every system.
Page 15 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 16 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
The session layer in a network model allows two systems to enter into
a dialog. It allows the communication between two processes to take
place in either half-duplex (one way at a time) or full-duplex (two
ways at a time) mode.
2. Synchronization:
Page 17 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
that need to be resent after system recovery are pages 501 to 523.
Pages previous to 501 need not be resent.
Subnet Masking:
• Applying a subnet mask to an IP address allows you to identify the
network and node parts of the address.
• The network bits are represented by the 1s in the mask, and the node
bits are represented by the 0s.
• Performing a bitwise logical AND operation between the IP address
and the subnet mask results in the Network Address or number.
Page 18 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Example:
A router receives a packet with the destination address
140.179.240.200. Show how the router finds the network address of
the packet.
Given IP address: 140.179.240.200
Class of given IP Address: B
10001100 10110011 11110000 11001000 Binary conversion of given IP
address
11111111 11111111 00000000 00000000 255.255.0.0 Default Class B
Subnet Mask
--------------------------------------------------------
10001100 10110011 00000000 00000000
140.179.000.000 Network Address
e) Describe working of NOS. State its salient features. 4M
Ans. Working of NOS : A network operating system (NOS) is a computer 2M for
operating system (OS) that is designed primarily to support descripti
workstations, personal computers and, in some instances, older on
terminals that are connected on a local area network (LAN). The 1M
software behind a NOS allows multiple devices within a network to each,
communicate and share resources with each other. The composition any two
of hardware that typically uses a NOS includes a number of personal featues
computers, a printer, a server and file server with a local network that
connects them together. The role of the NOS is to then provide basic
network services and features that support multiple input requests
simultaneously in a multiuser environment.
Types of network operating systems
There are two basic types of network operating systems, the peer-to
peer NOS and the client/server NOS:
Features of network operating systems
Features of network operating systems are typically associated with
user administration, system maintenance and resource management
functionality.
This includes:
Basic support for operating systems like protocol and processor
support, hardware detection and multiprocessing.
Printer and application sharing.
Common file system and database sharing.
Network security capabilities such as user authentication and
access control.
Directory Services
Page 19 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 20 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 21 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Problems in SMTP
1. Some older versions of SMTP are not capable of handling
messages longer than 64 kb.
2. If client and server have different time-outs then one of them
may give up when the other is still busy.
This will terminate the connection unnecessarily.
b) Draw and explain structure of IPV6 address. Highlight major 6M
enhancement w.e.f IPV4.
Ans. 1. IPV6 i.e., internet protocol version 6 is 128-bit address having an 2M for
address space of 2128 which is bigger than IPV4. diagram
2. In IPV6 we use Colon-Hexa representation. 2M for
3. Structure of IPV6 format is as shown below: explanat
ion
2M for
enhance
ment
Page 22 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Major Enhancement
1. More efficient routing;
2. More efficient packet processing;
3. Security;
4. Support for new services;
5. Simplified network configuration; and
6. Larger address space.
Page 23 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans. 2M for
printer
sharing,
2M for
network
sharing
and
2M for
proper
departm
ent and
users
Page 24 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
L4 Dat
Header a
5. Now data will travel down and reach to network layer. Here layer
3 header is added which contains information like source IP,
destination IP and so on. The encapsulated data in network layer
is called packets.
L3 L4 Dat
Header Header a
6. Now network layer sends packet to data link layer and new
header of layer 2 is added.
7. Also, a trailer is added. It contains information like source MAC
address, destination MAC address and so on.
8. The encapsulated data in data link layer is called frames.
L2 L3 L4 Data L2
Header Header Header Trailer
9. The physical layer takes frames from data link layer and send data
to receiving side.
10. This is how encapsulation takes place.
;
b) Design a network of Class C with network address 192.168.5.0 6M
with 2 subnets. State the subnet mask and subnet address.
Ans. 1. Given IP address (Class C) – 192.168.5.0 3M for
2. In order to design 2 equal subnets, we have to use: calculati
21 = 2 ng
Extra bits from the host id field. subnet
Page 25 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Subnet address:
192. 168. 5. 0
IP address: 11000000.10101000.00000101.0000
0000
255 255 255 128
ANDING
Page 26 / 27
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
OR
Page 27 / 27