ACN s22
ACN s22
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 1 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2022
EXAMINATION MODEL
ANSWER
22520
Subject: Advanced Computer Network (Elect) Subject Code :
It is reliable It is unreliable
Page 2 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 3 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 4 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SMTP Commands:
1. HELO: Used by client to identify itself.
2. MAIL FROM: Identify sender.
3. RCPT TO: Identify intended recipient.
4. DATA: Send actual message.
5. QUIT: Terminate the message.
6. RSET: Reset the connection.
7. VRFY: Verify the add of recipient
8. HELP: Mail
Page 5 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 6 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans. Diagram
2M
Explanation
2M
Any other
relevant
Explanation
Shall be
considere
d
1. Version: This 4 bits field defines the version number of IP. The
value is 6 for IPV6.
2. Priority: This 4 bits priority field defines the priority of packet
with respect to traffic congestion.
3. Flow Label: It is 24 bits field that is designed to provide special
handling for a particular flow of data.
4. Payload Length: The 16 bits payload length field defines the
length of the IP datagram excluding the base header.
Page 7 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
5. Next Header: It is an 8 bits field defining the header that
follows the base header in datagram.
6. Hop Limit: This 8 bits field serves the same purpose as
the TTL field in IPV4.
7. Source Address: The source address field is a 128 bits
internet address that identifies the original.
8. Destination Address: It is 128 bits internet address that
usually identifies the final destination of datagram.
9. Payload: Is combination of zero or more extension
headers(options) which is followed by data from other
protocols such as UDP, TCP etc
EXTENSION HEADERS
• The length of the base header is fixed at 40 bytes.
• Types of extension headers are:
1. Hop by Hop option
2. Source routing
3. Fragmentation
4. Authentication
5. Encrypted security payload
6. Destination option
Page 8 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 9 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Full-Duplex Service
TCP offers a full-duplex service where the data can flow in both
directions simultaneously. Each TCP will then have a sending buffer
and receiving buffer. The TCP segments are sent in both directions.
Connection-Oriented Service
Reliable Servic
Page 10 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
i)10.0.199.237/22
ii)192.168.14.87/26
Page 11 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
4M
.
Ans
2M for
each
Calculation
Page 12 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
IM each
d) Use Bellman – Fort algorithm to find the shortest distance for all 4M
nodes in the graphs
Ans
1M each
for each
iteration
Page 13 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 14 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Working of Browsers-
• WWW works on client-server interaction.
• The browser program acts as a client that uses the internet
to contact a remote server for a copy of the requested page.
• The server on the remote system returns a copy of page
along with the additional information.
Web Documents-
1. STATIC DOCUMENTS-
• The contents of static documents are fixed. These contents are created
and stored in a server.
• If required the client can get a copy of static documents.
• The contents of static documents are determined when it is
created.
Page 16 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. DYNAMIC DOCUMENT-
• It is not defined in a pre-define format, like static
documents.
• It is created by a web browser on the request for the
document from a browser.
Explainati
on 2M
Page 17 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Ans Cookies are small files which are stored on a user’s computer. They are 2M for
used to hold a modest amount of data specific to a particular client and Explan
website and can be accessed either by the web server or by the client ation
computer. & 2M
for
Diagra
m
That way the website could remember your language and let you
view the website in your preferred language without having to
select the language again.
A cookie can contain any type of information such as the time when
you visited the website, the items that you added into your shopping
basket, all the links you clicked in website, etc. Cookies themselves
contain no personally identifiable information. Depending on the
publisher’s and the user’s settings, information associated with
cookies used in advertising may be added to the user’s Google
Account.
Page 19 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 20 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
STATIC ALLOCATION
The static allocation method is very popular in modern ISP networks, which do
not use dial-up methods. With the static allocation, the DHCP sever keeps a
database with all clients' LAN MAC addresses and gives them an IP address
only if their MAC address is in the database. This way, the clients can be sure
that they will be getting the same IP address every time.
DYNAMIC ALLOCATION
When the DHCP server is configured to use dynamic allocation, this
means that it uses a lease policy. This way, when an assigned IP address
from the available pool is no longer used, it will be transferred back to the
pool, making it available for someone else to use. The advantage of this
method is that the IP addresses are used to their maximum - as soon as
they are no longer used by the client, they are instantly made available to
others. The disadvantage of this method is that a client will always have a
random IP address.
1. Dual Stack
In this kind of strategy, a station has a dual stack of protocols
run IPv4 and IPv6 simultaneously.
To determine which version to use when sending a packet to a
destination, the source host queries the DNS.
If the DNS returns an IPv4 address, the source host sends an
IPv4 packet.
If the DNS returns an IPv6 address, the source host
sends an IPv6 packet.
Page 23 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
2. Tunnelling
Tunnelling is a strategy used when two computers using IPv6
want to communicate with each other and the packet must
pass through a region that uses IPv4.
• To pass through this region, the packet must have an IPv4
address. So the IPv6 packet is encapsulated in an IPv4 packet
when it enters the region.
• To make it clear that the IPv4 packet is carrying an IPv6
packet as data.
3.Header Translation
In this case, the header format must be totally changed
through header translation. The header of the IPv6 packet is
converted to an IPv4 header see figure.
Page 24 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
• The dotted black lines in the figure represent the transition that a server
normally goes through.
• The solid black lines show the transitions that a client normally goes
through.
Page 25 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
• Sometimes in some situations, a server transitions through a solid line
or a client transition through a dotted line.
Page 26 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
B) In each IP address, the network address section is
determined by the class of the IP address.
i. 132.34.45.133
Network address: 132.34
ii. 14.142.20.20
Network address: 14
iii. 191.0.200.45
Network address: 191.0
iv. 129.16.123.85
Network address: 129.16
Page 27 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Page 28 / 28