1020244-ACN Summer 2023 Examination Model Answer V2V
1020244-ACN Summer 2023 Examination Model Answer V2V
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 1 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
2M
Diagram
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 2 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 3 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
22520
(e) Differentiate between FTP and TFTP (any two points) 2M
Ans
1m each
point
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 4 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
(f) List types of ICMPv4 messages. 2M
Ans. ICMP Messages are of two types:-
1. Error reporting messages: If a host or router encounter a Any two
problem after processing an IP problem, then it was a error reporting advanta
message for reporting the problem. ges 1M
2. Query Messages: A host or a network manager can used the each
query messages to get some specific information from a router to
another host.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 5 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 6 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
2. Attempt any THREE of the following: 12
4M
(a) Describe flow control under SCTP.
Ans. Flow control under SCTP Flow control in SCTP is similar to that
in
TCP. Like TCP, SCTP executes flow control to prevent
overwhelming the receiver. In SCTP, we need to handle two units
of data, the byte and the chunk. The values of rwnd and cwnd are
expressed in bytes; the values of TSN and acknowledgments are
expressed in chunks. Current SCTP implementations still use a
byte-oriented window for flow control. Receiver Site: The receiver Diagra
has one buffer (queue) and three variables. The queue holds the m 2M
received data chunks that have not yet been read by the process. Explana
The first variable holds the last TSN received,cum TSN. The tion 2M
second variable holds the available buffer size; winsize. The third
variable holds the last accumulative acknowledgment, last ACK.
The following figure shows the queue and variables at the receiver
site.
When the site receives a data chunk, it stores it at the end of the
buffer (queue) and subtracts the size of the chunk from winSize.
The TSN number of the chunk is stored in the cumTSN variable. 2.
When the process reads a chunk, it removes it from the queue and
adds the size of the removed chunk to winSize (recycling). 3. When
the receiver decides to send a SACK, it checks the value of lastAck;
if it is less than cumTSN, it sends a SACK with a cumulative TSN
number equal to the cumTSN. It also includes the value of winSize
as the advertised window size. Sender Site: The sender has one
buffer (queue) and three variables: curTSN, rwnd, and inTransit, as
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 7 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 8 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 9 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
The first variable, curTSN, refers to the next chunk to be sent. All
chunks in the queue with a TSN less than this value have been sent, but
not acknowledged; they are outstanding. The second variable, rwnd,
holds the last value advertised by the receiver (in bytes). The third
variable, inTransit, holds the number of bytes in transit, bytes sent but
not yet acknowledged. The following is the procedure used by the
sender.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 10 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
MODEL ANSWER
• The first field, ICMP type, defines the type of the message.
• The code field specifies the reason for the particular message
type.
• The last common field is the checksum field for checking errors
• The rest of the header is specific for each message type.
• The data section in error messages carries information for
finding the original packet that had the error. In query
messages, the data section carries extra information based on
the type of the
• Query.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 13 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 14 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 15 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
❑ SMTP Commands:
1. HELO: Used by client to identify itself.
2. MAIL FROM: Identify sender.
3. RCPT TO: Identify intended recipient.
4. DATA: Send actual message.
5. QUIT: Terminate the message.
6. RSET: Reset the connection
7. VRFY: Verify the add of recipient
8. HELP: Mail
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 16 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
message queue.
3. Client side of SMTP opens TCP connection with Bob’s mail
server.
4. SMTP client sends Alice message over TCP connection. 5.
Bob’s mail server places the message in Bob’s mailbox.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 17 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
(d) a) For the block of IPv4 address given below build subnet mask, 4M
broadcast Address and Number of Hosts possible.
I. 10.0.199.237/22
II. 192.168.1487/26 2M for each
correct
Ans answer
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 18 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 19 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 20 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Step 3: The first iteration guarantees to give all shortest paths which are at
most 1 edge long. We get the following distances when all edges are
processed
second time
(The last
row shows
final values.
Step 4: The second iteration guarantees to give all shortest paths which are at
most 2 edges long. The algorithm processes all edges 2 more times. The
distances are minimized after the second iteration, so third and fourth
iterations don’t update the distances.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 21 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
WORKING
It makes available users by an interactive and bidirectional textoriented
message system exploit an effective terminal connection which is
much more than 8 byte.
User data is sprinkled in the band long with telnet control information
above the TCP. It helps to achieve some functions in a remote
manner. The user joins the server beside using the TCP protocol, so
that means like the other side connection is also established using the
telnet hostname. These commands are used on the server by the
corresponding user to achieve the need task. These commands are used
SYNTAX
telnet hostname port
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 22 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
(c) List UDP services and UDP application (any 4 each). 4M
Ans Services offered by the UDP are a s follows:
• Process to process port to port transmission of segment. 2M for
• Connectionless and minimum overhead Protocol Services
• Fast and simple transmission
• No flow and error control application using UDP services are 2M for
responsible for providing them. applicati
• UDP encapsulates and decapsulates the message. on
UDP application
• Domain Name Services.
• Simple Network Management Protocol.
• Trivial File Transfer Protocol.
• Routing Information Protocol.
• Kerberos.
(d) Find out the error, if any in the following IPv4 addresses. a. 4M
111.56.054.78
b. 222.34.7.8.20
c. 75.45.301.14 1M
d. 11100101.23.14.67 EACH
Ans Question Answer
111.56.054.78 There must be no leading zero (054)
222.34.7.8.20 4 octets only in IPv4 address
75.45.301.14 Range of each octet is between o and
255
11100101.23.14.67 A mixture of binary and dotted decimal
notation is not allowed
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 23 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
SMTP POP3
Ans.
SMTP stands for SIMPLE POP3 stands for POST
MAIL TRANSFER OFFICE PROTOCOL
PROTOCOL & is also called VERSION 3 & is also called a
Push Protocol. Pop Protocol.
SMTP is used for Sending POP3 is used to retrieve the
emails. emails. Any 4
points
SMTP transfers Email from POP3 retrieves Emails from
1M
Sender’s Device to the the mailbox on the receipting’s
each
mailbox on the recipient’s server to their device.
server.
It is a message transfer Agent. It is a message access Agent.
SMTP has two MTAS. POP3 has two MAAS.
SMTP uses Ports 25, 465 & POP3 uses Ports 110 or 995.
587.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 24 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
(b) Draw & explain IPv6 packet format. 4M
IPV6 PACKET FORMAT-
Ans 2M for
Diagram
& 2M for
Explanati
on
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 25 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 26 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
5. Encrypted security Payload is an extension that provides
confidentiality & guards.
6. Destination option is used when the service needs to pass
information to destination only, intermediate routers are not
permitted access to this information.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 27 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
MODEL ANSWER
It calculates the metric in terms It calculates the metric in terms
of Hop Count. of bandwidth.
In RIP, the whole routing table is In OSPF, parts of the routing
to be broadcasted to the table are only sent when a
neighbors every 30 seconds by change has been made to it.
the routers.
RIP utilizes less memory OSPF device resource
compared to OSPF but is CPU requirements are CPU intensive
intensive like OSPF. and memory
It consumes more bandwidth It consumes less bandwidth as
because of greater network only part of the routing table is to
resource requirements in sending send.
the whole routing table.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 29 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 30 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
(d) Describe the state transaction of TCP. 4M
Ans. To observe the events happening during connection establishment,
connection termination, and data transfer, TCP is specified as the
finite state machine (FSM) as shown in Figure 4.4.1. Here two FSMs
used by the TCP client and server combined in one diagram. The
2M for
rounded-corner rectangles represent the states. The transition from one
Diagra
state to another is shown using directed lines. Each line has two
m & 2M
strings separated by a slash. The first string is the input, what TCP
for
receives. The second is the output, what TCP sends.
Explana
tion
states, a set for the client and another for the server, that are used for
flow and error control. Consider the scenario. Figure 4.4.2 shows the
state transition diagram for this scenario. The client process issues an
active open command to its TCP to request a connection to a specific
socket address.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 32 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 33 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
MODEL ANSWER
until it receives a FIN segment from the client signifying that there
are no more data to be exchanged and the connection can be
closed.The server, upon receiving the FIN segment, sends all queued
data to the server with a virtual EOF marker, which means that the
connection must be closed. It sends an ACK segment and goes to the
CLOSEWAIT state, but postpones acknowledging the FIN segment
received from the client until it receives a passive close command
from its process. After receiving the passive close command, the
server sends a FIN segment to the client and goes to the LASTACK
state, waiting for the final ACK. When the ACK segment is received
from the client,the server goes to the CLOSE state.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 35 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
(e) Explain the process of resolving the given host name into IP 4M
Ans. address using DNS.
You can find the hostname of any computer with a public IP address
by passing the address to any Domain Name System (DNS) server.
However, since the computers on a small business network have
private IP addresses, you can only discover their hostnames if the
network has a local DNS server. To discover the hostname of a 4M for
computer with a private IP address and no local DNS server, you Explanat
need to use a Windows utility to query the host itself. ion
Querying DNS
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 36 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
5. Attempt any two of the following: 12M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 37 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
➢ Tunnelling:
1. When two computers using IPV6 want to communicate with each other
& the packet must pass through a region that uses IPV4.
2. The IPV6 packet is encapsulated in a IPV4 packet when it enter the
region & leaves its capsule when it exits the region.
➢ Header Translation:
1. It is used when some of the system uses IPV4. the sender wants to use
IPV6, but the receiver don’t understand IPV6
2. The header format must be totally changed through header translation.
The header of IPV6 packet is converted to IPV4 header.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 38 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 39 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
(b) Explain TCP with respect to flow control and error control. 6M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 40 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Ans.
TCP Flow Control is a protocol designed to manage the data flow
between the user and the server. It ensures that there is a specific
bandwidth for sending and receiving data so the data can be processed
without facing any major issues. In order to achieve this, the TCP
protocol uses a mechanism called the sliding window protocol.
Each
explan
ation
of flow
control
3M
and
error
control
3M
.
Error control in TCP is mainly done through the use of three simple
techniques :
1. Checksum – Every segment contains a checksum field which is used to
find corrupted segments. If the segment is corrupted, then that
segment is discarded by the destination TCP and is considered lost.
2. Acknowledgement – TCP has another mechanism called
acknowledgement to affirm that the data segments have been
delivered. Control segments that contain no data but have sequence
numbers will be acknowledged as well but ACK segments are not
acknowledged.
3. Retransmission – When a segment is missing, delayed to
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 41 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 42 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Describe the architecture of e-mail system using four scenario.
(c) 6M
To explain the architecture of e-mail, we give four scenarios. We begin
with the simplest situation and add complexity as we proceed. The fourth
Ans
scenario is the most common in the exchange of e-mail. TCP/IP Protocol
Suite 2 Topics Discussed in the Section Correct
• First Scenario describtio
• Second Scenario n using
• Third Scenario scenarios
• Fourth Scenario 6M
• First Scenario
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 43 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 44 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
When the sender and the receiver of an e-mail are on the same mail server, we
need only two user agents.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 45 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
• Second Scenario
When the sender and the receiver of an e-mail are on different mail servers,
we need two UAs and a pair of MTAs (client and server).
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 46 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
• Third Scenario
When the sender is connected to the mail server via a LAN or a WAN, we
need two UAs and two pairs of MTAs (client and server).
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 47 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
• Fourth Scenario
When both sender and receiver are connected to the mail server via a LAN or
a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair
of MAAs (client and server). This is the most common situation today.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 48 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
6. Attempt any TWO of the following: 12
(a) Explain Bellman Ford algorithm with suitable example 6M
Ans
i. Bellman ford algorithm is a single-source shortest path algorithm.
ii. This algorithm is used to find the shortest distance from the single 3M for
vertex to all the other vertices of a weighted graph. explainati
on and 3M
iii. Various other algorithms are used to find the shortest path, like the
for
Dijkstra algorithm.
example
iv. If the weighted graph contains the negative weight values, then the
Dijkstra algorithm does not confirm whether it produces the correct
answer or not.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 49 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Step 2: Let all edges are processed in the following order: (B, E),
(D, B),(B, D), (A, B), (A, C), (D, C), (B, C), (E, D). We get the
following distances when all edges are processed the first time. The
first row shows initial distances. The second row shows distances
when edges (B, E), (D, B), (B, D) and (A, B) are processed. The
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 50 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
third row shows distances when (A, C) is processed. The fourth row
shows when (D, C), (B, C) and (E, D) are processed.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 51 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 52 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Step 3: The first iteration guarantees to give all shortest paths which
are at most 1 edge long. We get the following distances when all
edges are processed second time (The last row shows final values).
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 53 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 54 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
(b) For the IP address given below, find the range of addresses in the 6M
following blocks:
a. 123.56.77.32/29
b. 200.17.21.128/27
c. 17.34.16.0/23
d. 180.34.64.64/30
Ans.
a. 123.56.77.32/29 • The subnet mask “/29” means the first 29 bits 1𝟏 M
𝟐
are network bits, and the remaining 3 bits are host bits.
for
• The network address can be obtained by setting the host bits to
zero: 123.56.77.32 each sub-
• The broadcast address can be obtained by setting the host bits to questio
one: 123.56.77.39 n
• The range of addresses in this block is from 123.56.77.32 to
123.56.77.39
• Range of addresses: 123.56.77.32 to 123.56.77.39
b. 200.17.21.128/27
• The subnet mask "/27" means the first 27 bits are network bits,
and the remaining 5 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 200.17.21.128.
• The broadcast address can be obtained by setting the host bits to
one: 200.17.21.159.
• Range of addresses: 200.17.21.128 to 200.17.21.159
c. 17.34.16.0/23:
• The subnet mask "/23" means the first 23 bits are network bits,
and the remaining 9 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 17.34.16.0.
• The broadcast address can be obtained by setting the host bits to
one: 17.34.17.255.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 55 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 56 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
d. 180.34.64.64/30
• The subnet mask "/30" means the first 30 bits are network bits, and
the remaining 2 bits are host bits.
• The network address can be obtained by setting the host bits to
zero: 180.34.64.64.
• The broadcast address can be obtained by setting the host bits to
one: 180.34.64.67.
• Range of addresses: 180.34.64.64 to 180.34.64.67
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 57 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Ans SCTP transmits data in the form of messages and each message contains 3M for
one or more packets. The control come before data chunks. describi
ng
fields &
3M for
associat
ion
establis
hment
process
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 59 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 60 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SCTP supports also graceful close of an active association upon
request from the SCTP user. The following sequence of events occurs:
i. The client sends a SHUTDOWN signal to the server, which tells
the server that the client is ready to close the connection. ii. The server
responds by sending a SHUTDOWN-ACK acknowledgement. iii.
The client then sends a SHUTDOWN-COMPLETE signal
back to the server.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 61 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 62 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 63 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 1 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 2 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
4. Security Improvements: IPv6 includes features like IPsec (Internet Protocol Security) as
a standard, enhancing the security of communications between devices.
5. Multicast and Any cast: IPv6 incorporates improved support for multicast
communication, enabling efficient one-to-many communication. Anycast is also more easily
implemented in IPv6.
6. Mobility Support: IPv6 is designed to better support mobile devices, ensuring seamless
connectivity as devices move between networks.
7. Simplified Header Structure: IPv6 has a simpler and more efficient header structure,
reducing processing overhead on networking devices.
8. Future-Proofing: As the successor to IPv4, IPv6 is essential for the continued growth of
the internet and the proliferation of connected devices, ensuring there are enough unique addresses
for future expansion.
c Elaborate need of domain name system. 2M
Ans 1. DNS ensures the internet is not only user-friendly but also works smoothly, loading Correct
whatever content we ask for quickly and efficiently. explanati
2. It allows the user to access remote system by entering human readable device hostnames on 2M
instead of IP address. It translates domain name into IP addresses so browser can load
internet resources.
3. It translates human readable domain names into the numerical identifiers associated with
networking equipment, enabling devices to be located and connected worldwide.
Analogous to a network “phone book,” DNS is how a browser can translate a domain
name (e.g., “facebook.com”) to the actual IP address of the server, which stores the
information requested by the browser.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 3 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 4 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 5 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Destination Address (128-bits): This field provides the address of intended recipient of
the packet.
Extension Headers When Extension Headers are used, IPv6 Fixed Header’s Next
Header field points to the first Extension Header. If there is one more Extension Header,
then the first Extension Header’s ‘Next-Header’ field points to the second one, and so on.
The last Extension Header’s ‘Next-Header’ field points to the Upper Layer Header. Thus,
all the headers points to the next one in a linked list manner.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 6 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
The Bellman-Ford algorithm works by grossly underestimating the length of the path
from the starting vertex to all other vertices.
Step 1: Make a list of all the graph's edges. This is simple if an adjacency list represents
the graph.
Step 2: "V - 1" is used to calculate the number of iterations. Because the shortest distance
to an edge can be adjusted V - 1 time at most, the number of iterations will increase the
same number of vertices.
Step 3: Begin with an arbitrary vertex and a minimum distance of zero. Because you are
exaggerating the actual distances, all other nodes should be assigned infinity.
For each edge u-v, relax the path lengths for the vertices: If
Step 4: If the new distance is less than the previous one, update the distance for each
Edge in each iteration. The distance to each node is the total distance from the starting
node to this specific node.
Step 5: To ensure that all possible paths are considered, you must consider alliterations.
You will end up with the shortest distance if you do this.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 7 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 8 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 9 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 10 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
The World Wide Web (WWW), also known as the Web, is an interconnected network of
web pages and documents accessible through the Internet. Tim Berners-Lee created it in
1989 as a way for researchers to share information through linked documents.
Working of WWW:
1. A web browser is a software application that allows users to access and view web
pages on the Internet.
2. It acts as an interface between the user and the World Wide Web by displaying
web pages Web browsers communicate with web servers using the HTTP or
HTTPS protocol, which allows users to access websites hosted on remote servers.
3. A web server is a computer program that serves web pages to clients, such as web
browsers, upon request. It is responsible for hosting websites, processing HTTP
requests, and delivering web content to users online.
4. Hyperlinks one of the key features of the Web is hyperlinks, which allow you to
navigate between web pages by clicking on links.
5. Uniform Resource Locators (URLs) Web pages are identified by URLs, which are
unique addresses that point to the location of the web page on the Internet.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 12 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 13 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
et.
th
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 14 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Fig Tunneling
3. Header Translation
In this case, the header format must be totally changed through header translation. The
header of the IPv6 packet is converted to an Ipv4 header see figure.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 15 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Ans TELNET: TELNET is an abbreviation for TErminaLNETwork. It is the standard TCP/IP Working
protocol for virtual terminal service. of Telnet
TELNET Working: 2M
• TELNET is a client-server application that allows a user to log on to a remote And
machine, giving the user access to the remote system. diagram
• The user sends the keystrokes to the terminal driver, where the local operating 2M
system accepts the characters but does not interpret them.
• A terminal driver correctly interprets the keystrokes on the local terminal or terminal
emulator.
The characters are sent to the TELNET client, which transforms the characters to a
universal character set called network virtual terminal (NVT) characters and delivers them
to the local TCP/IP protocol stack.
• The commands or text, in NVT form, travel through the Internet and arrive at the
TCP/IP stack at the remote machine.
• Here the characters are delivered to the operating system and passed to the TELNET
server, which changes the characters to the corresponding characters understandable by the
remote computer.
• However, the characters cannot be passed directly to the operating system because
the remote operating system is not designed to receive characters from a TELNET server: It
is designed to receive characters from a terminal driver.
• A piece of software called a pseudo terminal driver is added which pretends that the
characters are coming from a terminal.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 16 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 17 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
OR
Considering hexadecimal format as:
BC82000D002B001D
The UDP header has four parts, each of two bytes.
That means we get the following interpretation of the header.
i. Source port number = BC8216 = 48258
ii. Destination port number = 000D16= 13
iii. Total length = 002B16 = 43 bytes iv. Packet direction: Since the destination port
number is 13 (well-known port), the packet is from the client to the server.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 18 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 19 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
i) get
Local System
ii) put
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 20 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 21 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
• Command: 8-bit
The type of message: request (1) or response (2)
• Version: 8-bit
Define the RIP version
• All 0s
This field is not actually used by RFC 1058 RIP; it was added solely to provide backward
compatibility with pre-standard varieties of RIP. Its name comes from its defaulted value,
zero.
• Family:
16-bit field defines the family of the protocol used. For TCP/IP, value is 2 •
IP Address Network Address:
14 bytes n Defines the address of the destination network and
14 bytes for this field to be applicable to any protocol. However, IP currently uses only 4
bytes, the rest are all 0s.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 22 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
• Distance:
32-bit field defines the hop count from the advertising router to the destination network.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 23 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Ans Electronic Mail (e-mail) is one of the most widely used services of the Internet. This service 2M
allows an Internet user to send a message in a formatted manner (mail) to other Internet Descripti
users in any part of the world. Message in the mail not only contain text, but it also contains on
&
images, audio and videos data. The person who is sending mail is called sender and person
2M for
who receives mail is called the recipient. Format of E-mail: An e-mail consists of three Message
parts that are as follows: format
1. Envelope diagram
2. Header
3. Body
Header:
The header consists of a series of lines. Each header field consists of a single line of ASCII
text specifying field name, colon and value. The main header fields related to message
transport are:
1. To: It specifies the DNS address of the primary recipient(s).
2. Cc: It refers to carbon copy. It specifies address of secondary recipient(s).
3. BCC: It refers to blind carbon copy. It is very similar to Cc. The only difference
between Cc and Bcc is that it allows user to send copy to the third party without primary
and secondary recipient knowing about this.
4. From: It specifies name of person who wrote message.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 24 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 25 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Flow controlling TCP has flow control UDP has no flow control
No guarantee of the data
TCP gives guarantee
transmission order
that the order of the
Data transmission
data at the receiving
order
end is the same as the
sending end
Header Size 20 bytes 8 bytes
TCP
UDP has no acknowledgment
Acknowledgment Acknowledges the data
Section
reception
Used where reliability is Used where time Sensitivity is
Use
important more important.
Stream-based: No Message based data: Data sent
Data Interface to
particular structure for in discrete
application
data packages by application
Overhead Low Very low
Speed High Very high
FTP, Telnet, SMTP, DNS, BOOTP, DHCP, TFTP,
Application
DNS, HTTP, POP RIP
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 26 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 27 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
The client chooses an initial sequence number, set in the first SYN packet. The server also
chooses its own initial sequence number, set in the SYN/ACK packet. Each side
acknowledges each other’s sequence number by incrementing it: this is the
acknowledgement number. The use of sequence and acknowledgement numbers allows
both sides to detect missing or out-of-order segments.
Once a connection is established, ACKs typically follow for each segment. The connection
will eventually end with a RST (reset or tear down the connection) or FIN (gracefully end
the connection).
Three-Way Handshake:
The algorithm used by TCP to establish and terminate a connection is called a three-way
handshake. We first describe the basic algorithm and then show how it is used by TCP.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 28 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 29 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Ans The connection is established in TCP using the three-way handshake as discussed earlier 1 M
to create a connection. One side, say the server, passively stays for an incoming link by for
implementing the LISTEN and ACCEPT primitives, either determining a particular other diagram,
2 M
side or nobody in particular. The other side performs a connect primitive specifying the I/O
for
port to which it wants to join. The maximum TCP segment size available, other options are TCP
optionally like some private data (example password). The CONNECT primitive transmits connectio
a TCP segment with the SYN bit on and the ACK bit off and waits for a response. The n
sequence of TCP segments sent in the typical case, as shown in the figure below – And
3M for
call
collision
When the segment sent by Host-1 reaches the destination, i.e., host -2, the receiving server
checks to see if there is a process that has done a LISTEN on the port given in the
destination port field. If not, it sends a response with the RST bit on to refuse the
connection. Otherwise, it governs the TCP segment to the listing process, which can accept
or decline (for example, if it does not look similar to the client) the connection.
Call Collision: If two hosts try to establish a connection simultaneously between the same
two sockets, then the events sequence is demonstrated in the figure under such
circumstances. Only one connection is established. It cannot select both the links because
their endpoints identify connections.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 30 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 31 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Ans The three types of IPv6 addresses are: unicast, anycast, and multicast. 2 M for
a) Unicast address: This type of information transfer is useful when there is a each
participation of single sender and single recipient. So, in short you can term it as a address
one-to-one transmission. For example, a device having IP address 10.1.2.0 in a types
network wants to send the traffic stream (data packets) to the device with IP address
20.12.4.2 in the other network, then unicast comes into picture. This is the most
common form of data transfer over the networks.
c) Anycast address: An IPv6 anycast address is an address that is assigned to more than
one interface (typically belonging to different nodes), where a packet sent to an
anycast address is routed to the nearest interface having that address, according to the
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 32 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 33 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
wants to carry its traffic. This capability is sometimes called source selected policies.
You implement this by configuring anycast addresses to identify the set of routers
belonging to Internet service providers (for example, one anycast address per Internet
service provider). You can use these anycast addresses as intermediate addresses in
an IPv6 routing header, to cause a packet to be delivered by a particular provider or
sequence of providers. You can also use anycast addresses to identify the set of routers
attached to a particular subnet or the set of routers providing entry into a particular
routing domain. You can locate anycast addresses from the unicast address space by
using any of the defined unicast address formats. Thus, anycast addresses are
syntactically indistinguishable from unicast addresses. When you assign a unicast
address to more than one interface, that is, turning it into an anycast address, you must
explicitly configure the nodes to which the address is assigned in order to know that
it is an anycast address.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 34 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 35 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Each OSPF router distributes information about its local state (usable interfaces and
reachable neighbors, and the cost of using each interface) to other routers using a Link State
Advertisement (LSA) message. Each router uses the received messages to build up an
identical database that describes the topology of the AS.
From this database, each router calculates its own routing table using a Shortest Path First
(SPF) or Dijkstra algorithm. This routing table contains all the destinations the routing
protocol knows about, associated with a next hop IP address and outgoing interface. The
protocol recalculates routes when network topology changes, using the Dijkstra algorithm,
and minimizes the routing protocol traffic that it generates.
It provides support for multiple paths of equal cost.
It provides a multi-level hierarchy (two-level for OSPF) called "area routing," so that
information about the topology within a defined area of the AS is hidden from routers
outside this area. This enables an additional level of routing protection and a reduction in
routing protocol traffic.
All protocol exchanges can be authenticated so that only trusted routers can join in the
routing exchanges for the AS.
b For the IP address given below: 6M
1) Identify the classes to which IP address belongs to
2) Identify Network address section
3) Identify Host address section
4) Calculate number of hosts can be assigned with each network i)122.34.45.133
ii)12.12.12.12 iii)192.10.233.26
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 36 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
c Describe DHCP operations, when DHCP client and server on same network. 6M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 37 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Ans DHCP is based on a client-server model and based on discovery, offer, request, and 2 M for
ACK.DHCP client and server can either be on the same network or on different networks. diagram
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to and
4 M for
dynamically assign an IP address to any device, or node, on a network so it can
Explanati
communicate using IP. DHCP automates and centrally manages these configurations rather on
than requiring network administrators to manually assign IP addresses to all network
devices. DHCP can be implemented on small local networks, as well as large enterprise
networks. DHCP assigns new IP addresses in each location when devices are moved from
place to place, which means network administrators do not have to manually configure
each device with a valid IP address or reconfigure the device with a new IP address if it
moves to a new location on the network.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 38 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________
________
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page No: 1/20
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
4) While assessing figures, examiner may give credit for principal components indicated
in the figure. The figures drawn by candidate and model answer may vary. The
examiner may give credit for anyequivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s
answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based
on equivalent concept.
8) As per the policy decision of Maharashtra State Government, teaching in
English/Marathi and Bilingual (English + Marathi) medium is introduced at first year
of AICTE diploma Programme from academic year 2021-2022. Hence if the students
in first year (first and second semesters) write answers in Marathi or bilingual
language (English +Marathi), the Examiner shall consider the same and assess the
answer based on matching of concepts with model answer.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 2 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
SUMMER – 2022 EXAMINATION MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code :
22520
b) State the need of IPV6 . 2M
Ans. Importance of IPV6 over IPV4 (any two) Any two
i) huge number of IP addresses: points
1M each
IPv6 has 128-bit addresses when compared to 32-bit addresses of IPv4 for
which results in a very large increase in the availability of IP addresses relevant
contents
and creates a lot of advantages. ii) End to End Connectivity:
IPv6 eliminates the need for NAT which results in better connectivit in
peer-peer networks. iii) Interoperability: y
IPv6 promotes interoperability between different
IPv6 implementations. iv) Built-in Security: IPv6 provides
authentication and encryption.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 3 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
It is reliable It is unreliable
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 4 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
f) State different applications of UDP.
Ans. Lossless data transmission 2M
UDP can be used in applications that require lossless data transmission.
For example, an application that is configured to manage the process of Any two
retransmitting lost packets and correctly arrange received packets might points 1M
each for
use UDP. This approach can help to improve the data transfer rate of relevant
large files compared to TCP. contents
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 5 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 6 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
2. Attempt any THREE of the following: 12
a) Describe SMTP with suitable diagram. 4M
Ans. It is the protocol that defines MTA client & server in internet.
Diagram
• It is an application layer protocol of TCP/IP model. 2M
• It transfer messages from sender’s mail servers to receivers mail
server. Explanation
• SMTP interacts with local mail system and not user. 2M
• SMTP uses a TCP socket on port 25 to transfer email reliably from
client to server.
• Email is temporarily stored on the local and eventually transferred
directly to receiving server. • It is simple ASCII protocol.
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 7 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
SMTP Commands:
1. HELO: Used by client to identify itself.
2. MAIL FROM: Identify sender.
3. RCPT TO: Identify intended recipient.
4. DATA: Send actual message.
5. QUIT: Terminate the message.
6. RSET: Reset the connection.
7. VRFY: Verify the add of recipient
8. HELP: Mail
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 8 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 9 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 10 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
b) Write Stepwise Procedure to configure IP routing with RIP.
Ans. • The Routing Information Protocol (RIP) uses broadcast
UDP data packets to exchange routing information A device
that is running RIP can receive a default network via an 4M
update from another device that is running RIP, or the
Explanati
device can source the default network using RIP.
on of
• Once you have configured the appropriate IP addresses on
steps
each device, perform the following steps to configure RIP
routing. The default version of RIP.
1. On Router1, execute the following commands to configure
RIP routing. Router1(config)#router rip
Router1(config-router)#network 10.0.0.0
Router1(config-router)#network 192.168.1.0
Router1(config-router)#exit
2. On Router2, execute the following commands to configure
RIP routing. Router2(config)#router rip
Router2(config-router)#network 20.0.0.0
Router2(config-router)#network 192.168.1.0
Router2(config-router)#network 150.150.150.0
Router2(config-router)#exit Router2(config)#
3. On Router3, execute the following commands to configure
RIP routing.
4. Router3(config)#router rip
5. Router3(config-router)#network 150.150.150.0
Router3(config-if)#exit
6. Once you have configured RIP routing protocol on each
router, wait for a few seconds (let complete the convergence
process), and then execute the show ip route command on
any router to show the routing information.
Router(config)#do show ip route
7. In the following figure, you can see the routes learned by the
RIP protocol on Router3.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 12 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_____________________________________________________________________________________________
_____
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page No: 13/20
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Ans. Diagram
2M
Explanation
2M
Any other
relevant
Explanation
Shall be
considere
d
1. Version: This 4 bits field defines the version number of IP. The value
is 6 for IPV6.
2. Priority: This 4 bits priority field defines the priority of packet with
respect to traffic congestion.
3. Flow Label: It is 24 bits field that is designed to provide special
handling for a particular flow of data.
4. Payload Length: The 16 bits payload length field defines the length
of the IP datagram excluding the base header.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 14 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
5. Next Header: It is an 8 bits field defining the
header that follows the base header in
datagram.
6. Hop Limit: This 8 bits field serves the same
purpose as the TTL field in IPV4.
7. Source Address: The source address field is a
128 bits internet address that identifies the
original.
8. Destination Address: It is 128 bits internet
address that usually identifies the final
destination of datagram.
9. Payload: Is combination of zero or more
extension headers(options) which is followed
by data from other protocols such as UDP, TCP
etc
EXTENSION HEADERS
• The length of the base header is fixed at 40
bytes.
• Types of extension headers are:
1. Hop by Hop option
2. Source routing
3. Fragmentation
4. Authentication
5. Encrypted security payload
6. Destination option
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 16 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code : 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 17 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 18 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 19 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 20 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_____________________________________________________________________________________________
_____
Full-Duplex Service
TCP offers a full-duplex service where the data can flow in both
directions simultaneously. Each TCP will then have a sending buffer
and receiving buffer. The TCP segments are sent in both directions.
Connection-Oriented Service
Reliable Servic
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page No: 21/20
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 22 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
b) For the IPV4 addresses given below, calculate subnet mark,
broadcast addresses and number of host possible.
i) 10.0.199.237/22
ii)192.168.14.87/26
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 23 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
. 4M
Ans
2M for
each
Calculation
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 24 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
c) Differentiate between IPv4 and IPv6 (any 4 points) 4M
IM each
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 25 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
d) Use Bellman – Fort algorithm to find the shortest distance for all 4M
Ans
1M each
for each
iteration
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 26 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
nodes in the graphs
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 27 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
_____________________________________________________________________________________________
_____
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page No: 28/20
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 29 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 30 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
4. Attempt any THREE of the following: 12
a) Define WWW. Explain static & dynamic web documents in details. 4M
Working of Browsers-
• WWW works on client-server interaction.
• The browser program acts as a client that uses the internet
to contact a remote server for a copy of the requested page.
• The server on the remote system returns a copy of page
along with the additional information.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 32 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 33 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Web Documents-
1. STATIC DOCUMENTS-
• The contents of static documents are fixed. These contents are created
and stored in a server.
• If required the client can get a copy of static documents.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 34 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
• The contents of static documents are determined when it is created.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 35 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 36 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
2. DYNAMIC DOCUMENT-
• It is not defined in a pre-define format, like static
documents.
• It is created by a web browser on the request for the
document from a browser.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 37 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Explainati
on 2M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 38 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
c) Draw state transition diagram of TCP. 4M
Ans.
4M for
Diagra
m&
labelling
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 39 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 40 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
e) Construct a diagram to show the application of cookies in a 4M
scenario in which the server uses cookies for advertisement.
Ans Cookies are small files which are stored on a user’s computer. They are 2M for
used to hold a modest amount of data specific to a particular client and Explan
website and can be accessed either by the web server or by the client ation
computer. & 2M
for
Diagra
m
That way the website could remember your language and let you
view the website in your preferred language without having to select
the language again.
A cookie can contain any type of information such as the time when
you visited the website, the items that you added into your shopping
basket, all the links you clicked in website, etc. Cookies themselves
contain no personally identifiable information. Depending on the
publisher’s and the user’s settings, information associated with cookies
used in advertising may be added to the user’s Google Account.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 41 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 42 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 43 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 44 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
b) Describe DHCP with its operation & static dynamic allocation.
Ans The Domain Name System, more popular as DNS, and the Dynamic Host
Configuration Protocol, also known as DHCP, represent two crucial
TCP/IP areas of a Windows NT Server network. The DNS is responsible
for converting hostnames into IP addresses, while the DHCP is engaged
in assigning unique dynamic IP addresses and the corresponding subnet
masks and default gateways to TCP/IP running computers within a
particular server network. Thanks to the dynamic addressing executed by
the DHCP, a computer can have a different IP address every time it
connects to the network it belongs to, without the intervention of a UNIX
administrator. Through this DHCP functionality every new computer
added to a network is automatically assigned a unique IP address.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 45 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
DHCP servers greatly simplify the configuration of networks and are built in
the majority of the wireless access points and wired Ethernet routers. In a
network, a DHCP server manages a pool of IP addresses, as well as default
gateway details, DNS details and other information for the clients’ network
configuration. When a new computer is introduced into a DHCP server-enabled
network, it will send a query to the DHCP server requesting all the necessary
information. When the query reaches the DHCP server, it will grant the new
computer a new IP address and a lease - a time frame for which the computer
can use this IP address, as well as other configuration details. The whole
process takes place immediately after the new computer boots, and to be
successful, it has to be completed before initiating IP based communication
with other hosts in the network.
STATIC ALLOCATION
The static allocation method is very popular in modern ISP networks, which do
not use dial-up methods. With the static allocation, the DHCP sever keeps a
database with all clients' LAN MAC addresses and gives them an IP address
only if their MAC address is in the database. This way, the clients can be sure
that they will be getting the same IP address every time.
DYNAMIC ALLOCATION
When the DHCP server is configured to use dynamic allocation, this
means that it uses a lease policy. This way, when an assigned IP address
from the available pool is no longer used, it will be transferred back to the
pool, making it available for someone else to use. The advantage of this
method is that the IP addresses are used to their maximum - as soon as
they are no longer used by the client, they are instantly made available to
others. The disadvantage of this method is that a client will always have a
random IP address.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 46 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
c) Describe Email security Over non-secure channel. 6M
Ans • Email security describes different techniques for keeping
sensitive information in email communication and accounts Any 6
secure against unauthorized access, loss or compromise points
• Email is often used to spread malware, spam and phishing 1M
attacks. Attackers use deceptive messages to entice recipients to each
part with sensitive information, open attachments or click on
hyperlinks that install malware on the victim‟s device.
• Email encryption involves encrypting, or disguising, the content
of email messages to protect potentially sensitive information
from being read by anyone other than intended recipients. Email
encryption often includes authentication.
• Email allows attackers to use it as a way to cause problems in
attempt to profit. Whether through spam campaigns, malware
and phishing attacks, sophisticated targeted attacks, or business
email compromise (BEC), attackers try to take advantage of the
lack of security of email to carry out their actions.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 47 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 48 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
6. Attempt any TWO of the following: 6M
a) Explain the process of transition from IPv4 to IPv6 for a network.
Ans Three Transitions from IPv4 to IPv6 strategies are: 2M for
1. Dual Stack each
2. Tunnelling transitio
n
3. Header Translation
1. Dual Stack
In this kind of strategy, a station has a dual stack of protocols run
IPv4 and IPv6 simultaneously.
To determine which version to use when sending a packet to a destination,
the source host queries the DNS.
If the DNS returns an IPv4 address, the source host sends an IPv4
packet.
If the DNS returns an IPv6 address, the source host sends an
IPv6 packet.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 49 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
2. Tunnelling
Tunnelling is a strategy used when two computers using IPv6
want to communicate with each other and the packet must pass
through a region that uses IPv4.
• To pass through this region, the packet must have an IPv4
address. So the IPv6 packet is encapsulated in an IPv4 packet
when it enters the region.
• To make it clear that the IPv4 packet is carrying an IPv6
packet as data.
3.Header Translation
In this case, the header format must be totally changed through
header translation. The header of the IPv6 packet is converted
to an IPv4 header see figure.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 50 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 51 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 52 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
b) Draw and explain TCP. State transition diagram. 6M
Ans
3M for
diagra
m&
3M for
Explan
ation
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 53 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
• The dotted black lines in the figure represent the transition that a
server normally goes through.
• The solid black lines show the transitions that a client normally goes
through.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 54 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 55 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 56 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
B) In each IP address, the network address section is
determined by the class of the IP address. i. 132.34.45.133
Network address: 132.34 ii.
14.142.20.20
Network address: 14
iii. 191.0.200.45
Network address: 191.0
iv. 129.16.123.85
Network address: 129.16
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 57 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 58 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 59 / 28
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 60 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
(b) State the four advantages of IPv6. 2M
Ans.
4) While assessing figures, examiner may give credit for principal components indicated in the
figure. The figures drawn by candidate and model answer may vary. The examiner may give
credit for any equivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate‟s answers and
model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant
answer based on candidate‟s understanding.
7) For programming language papers, credit may be given to any other program based on
equivalent concept.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 61 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 62 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520
connection i.e. Reset the connection.
5) SYN: Synchronize
When this bit field in present then the sender is attempting to
„synchronize‟ sequence numbers
6) FIN: No more data from sender. If this bit is set then it
terminates the connection.
OR
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 63 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
22520
(g) State the concept of fragmentation in IPv4. 2M
Ans. Fragmentation: When the maximum size of datagram is greater than
maximum size of data that can be held a frame then the network layer
divides the datagram received from x-port layer into fragments. Fragme
OR ntation
Fragmentation is the division of a IP datagram into smaller units. definitio
After fragmentation, each fragment will have its own header with few n 1M
fields changed and few fields remaining same.
OR
Subject: Advanced Computer Network Subject Code:
In fragmentation, a datagram is divided into smaller units. Most of the Concept
fields of the original header are copied into the fragment header. The 1M
three fields Flags, Fragmentation offset and Total length are altered.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 64 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
2. Attempt any THREE of the following: 12
(a) Compare TCP and UDP (any four points). 4M
Ans.
Characteristics TCP UDP
Connection TCP is connection UDP is connection less
oriented Protocol Protocol
Reliability It provides reliable It provides unreliable
delivery of delivery of messages
messages
Error Handling TCP makes checks UDP does error checking
for errors and but no reporting.
Any four
reporting
points
Flow controlling TCP has flow UDP has no flow control 1M each
control
Data transmission TCP gives No guarantee of the data
order guarantee that the transmission order
order of the data at
the receiving end is
the same as the
sending end
Header Size 20 bytes 8 bytes
Acknowledgment TCP acknowledges UDP has no
the data reception acknowledgment Section
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 65 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 66 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 67 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
(b) Explain ICMP protocol. Describe the header format of ICMP. The 4M
Ans. Internet Control Message Protocol (ICMP) supports the unreliable and
connectionless Internet Protocol (IP).
• ICMP messages are encapsulated in IP datagrams. There are
two categories of ICMP messages: error-reporting and query
messages. The error-reporting messages report problems that a router Explana
or a host (destination) may encounter when it processes an IP packet. tion 2M
The query messages, which occur in pairs, help a host or a network
manager get specific information from a router or another host. The
checksum for ICMP is calculated using both the header and the data
fields of the ICMP message.
• There are several tools that can be used in the Internet for
debugging. We can find if a host or router is alive and running. Two
of these tools are ping and traceroute.
Header Format:
Format
1M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 68 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
• The data section in error messages carries information for
finding the original packet that had the error. In query messages, the
data section carries extra information based on the type of the query.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 69 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 70 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
(d) Describe the sub-network address if the destination address is 4M
200.45.34.56 and the subnet mask is 255.255.240.0
Ans.
To find the subnet address we have to AND the IP address and the
subnet mask as shown below: 200.45.34.56
200.45.32.0 Correct
Answer
Subnet address 11001000 . 00101101 . 00100000.00000000 2M
OR
To find the subnet address, keep the network bits in the IP address as it
is, and make all host bits as 0‟s.:
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 71 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
With subnet mask as 255.255.240.0, network bits are 20 and host bits
are 12.
Keeping first 20 bits as it is, and making host bits as 0, the subnet
address is obtained as given below.
11001000 . 00101101 . 00100000.00000000
Subnet address
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 72 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
3. Attempt any THREE of the following: 12
(a) Explain difference between distance vector and link state routing. 4M
(Any four points).
Ans.
Sr. Distance Vector Routing Link State Routing
No.
1 Routing tables are updated by Complete topology is
exchanging information with distributed to every router to
the neighbours. update a routing table.
2 It update full routing table. It updates only link states. Any
four
3 It uses Bellman-Ford It uses Dijkstra algorithm.
points
algorithm
1M each
4 Distance Vector routing Link state routing works best
doesn‟t have any hierarchical for hierarchical routing
structure. design.
5 CPU and memory utilization Higher utilization of CPU
is lower than Link state and memory than distance
routing. vector routing.
6 Bandwidth required is less Bandwidth required is more
due to local sharing, small due to flooding and sending
packets and no flooding. of large link state packets.
7 Example protocols are RIP Example protocols are OSPF
and IGRP. and IS-IS.
8 Slow convergence. Fast convergence.
9 Summarization is automatic Summarization is manual.
10 Easier to configure Harder to configure
11 Count to infinity problem No count to infinity problem
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 73 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 74 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
(b) Explain different transition method of IPv4 to IPv6. 4M
Ans. Three Transition from IPv4 to IPv6 strategies are
1. Dual Stack
2. Tunnelling
3. Header Translation List 1M
1. DUAL STACK
In this kind of strategy a station has a dual stack of protocols run IPv4
and IPv6 simultaneously.
To determine which version to use when sending a packet to a
destination, the source host queries the DNS. If the DNS returns an
IPv4 address, the source host sends an IPv4 packet. If the DNS returns
an IPv6 address, the source host sends an IPv6 packet.
1M for
each
transitio
n method
2. Tunnelling
Tunnelling is a strategy used when two computers using IPv6 want to
communicate with each other and the packet must pass through a
region that uses IPv4.
To pass through this region, the packet must have an IPv4
address. So the IPv6 packet is encapsulated in an IPv4 packet
when it enters the region.
To make it clear that the IPv4 packet is carrying an IPv6 packet as
data the protocol value is set to 41.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 75 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 76 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network Subject Code: 22520
Header Translation
In this case, the header format must be totally changed through header
translation. The header of the IPv6 packet is converted to an IPv4
header see figure.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 77 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
(c) Explain the working of TELNET. 4M
Ans. TELNET: TELNET is an abbreviation for TErminaLNETwork. It is
the standard TCP/IP protocol for virtual terminal service.
TELNET Working:
• TELNET is a client-server application that allows a user to log on
to a remote machine, giving the user access to the remote system. Working
• The user sends the keystrokes to the terminal driver, where the local descripti
operating system accepts the characters but does not interpret them. on 2M
• A terminal driver correctly interprets the keystrokes on the local
terminal or terminal emulator.
• The characters are sent to the TELNET client, which transforms
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Working
diagram
2M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 10 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
22520
SUMMER – 2023 EXAMINATION
MODEL ANSWER
(d) The dump of a UDP header in hexadecimal format is as 4M
follows: BC 82000 D 002 B 001 D Obtain the following from it:
(i) Source port number
(ii) Destination port number
(iii) Total length
(iv) Length of the data
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 12 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
• Figure below shows a scenario in which an electronic store can
benefit from the use of cookies.
• A shopper wants to buy a toy from an electronic store named
BestToys.com.
• The Server sends the Webpage, but it also includes a cookie with
the ID 12343.
• Using this a file is created such that the information clicked by the
user is sent and stored in the file, which are used by the server.
Diagram
3M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 13 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 14 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Message
format
diagram
2M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 15 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 16 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
E.g: HTTP/1.1 200 OK
Headers
Three types of headers are present HTTP Response message which are
as follows.
General Header
The general header gives general information about the message and
can be present in both a request and a response. e.g. Date: Mon, 27
Jul 2009 12:28:53 GMT
Response Header
The response header can be present only in a response message. It
specifies the server's configuration and special information about
the request.
e.g. Server: Apache/2.2.14 (Win32)
Entity Header
The entity header gives information about the body of the
document.
e.g. Content-Length: 88
e.g. Content-Type: text/html
Blank Line
An empty line (i.e., a line with nothing preceding the CRLF) indicating
the end of the header fields Body
It contains actual content. This part is optional.
Diagram
2M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 17 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 18 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
22520
SUMMER – 2023 EXAMINATION
MODEL ANSWER
Subject: Advanced Computer Network Subject Code:
OR
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 19 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 20 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Diagram
1M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 21 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 22 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
TELNET
• TELNET is an abbreviation for TErminaLNETwork. It is the
standard TCP/IP protocol for virtual terminal service
• TELNET enables the establishment of a connection to a remote
system in such a way that the local terminal appears to be a terminal
at the remote system.
• There are two parties involved TELNET Client and TELNET
server.
DNS
• It stands for Domain Name Service. Every time you use a domain
name, therefore, a DNS service must translate the name into the
corresponding IP address.
• For example, the domain name www.abc.com might translate to
198.105.232.4.
• Port number for DNS is 53.
DHCP
• It stands for Dynamic Host Configuration Protocol (DHCP). It
gives IP addresses to hosts.
• There is a lot of information a DHCP server can provide to a host
when the host is registering for an IP address with the DHCP server.
• Port number for DHCP is 67, 68.
POP3
• Post Office Protocol, version 3 (POP3) is simple and limited in
functionality.
• POP works as a Message Access Agent.
• The client POP3 software is installed on the recipient computer; the
server POP3 software is installed on the mail server.
• Mail access starts with the client when the user needs to download
e-mail from the mailbox on the mail server.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 23 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 24 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Connection Establishment
TCP uses a Three way handshaking mechanism to establish a
connection between client and server machines. 1M
The three steps in three way handshaking mechanism are as follows. Diagra
SYN: m
The client sends the first segment, a SYN segment, in which only the
SYN flag is set. This segment is for synchronization of sequence 3M
numbers. Steps
SYN + ACK
The server sends the second segment, a SYN +ACK segment, with 2 2M for
flag bits set. simulta
ACK neous
The client sends the third segment. This is just an ACK segment. It connect
ion
guarantees the completion of three way handshaking.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 25 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 26 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
22520
SUMMER – 2023 EXAMINATION
MODEL ANSWER
Subject: Advanced Computer Network Subject Code:
communication is between two peers that know their local port
numbers.
• Both TCPs go through SYN-SENT and SYN-RCVD states before
going to the ESTABLISHED state.
• Both processes act as client and server.
• The two SYN+ACK segments acknowledge the SYN segments and
open the connection.
OR
Simultaneous Close:
• It's permitted in TCP for both sides to do "active close", which is
called "Simultaneous Close". During "Simultaneous Close", 4
packets are exchanged, the same as in normal situations.
• In this situation, both ends issue an active close.
• Both TCPs go to the FIN-WAIT-1 state and send FIN segments that
are in transit simultaneously.
• After receiving the FIN segment, each end goes to the CLOSING
state and sends an ACK segment.
• The CLOSING state takes the place of FIN-WAIT-2 or
CLOSEWAIT in a common scenario.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 27 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
3M for
diagra
m
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 28 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
To keep track of all the different events happening during connection
establishment, connection termination, and data transfer,
TCP is specified as the Finite State Machine –FSM
TCP State Machine:
• TCP uses a three way handshake to close connection
• Singled by the FIN bit in the packet header
3M for
The figure shows the two FSMs used by the TCP client and server explana
combined in one diagram. tion of
steps
• Ovals/rectangle represents states.
• Transition from one state to another is shown using directed
lines.
• Each line has two strings separated by a slash.
• The first string is the input, what TCP receives.
• The second is the output, what TCP sends.
• The dotted black lines in the figure represent the transition that a
server normally goes through;
• The solid black lines show the transitions that a client normally
goes through.
• Sometimes in some situations, a server transitions through a solid
line or a client transitions through a dotted line.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 29 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 30 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
22520
SUMMER – 2023 EXAMINATION
MODEL ANSWER
Subject: Advanced Computer Network Subject Code:
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 31 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
(c) Explain the addressing scheme in IPv4 and IPv6. When IPv6 6M
protocol is introduced, does the ARP protocol have to be changed?
Explain in details.
Ans. An IPv4 Address:
An IP address is a 32-bit address.
The IP addresses are unique. IPv4 2M
Address space rule
The address space in a protocol That uses N-bits to define an
Address is = 2N
The address space of IPv4 is 232or4,294,967,296. Address
Space Notations:
• Binary Notation :
01110101 10010101 00011101 11101010
• Dotted-decimal notation
Dotted-decimal notation
• Hexadecimal Notation
Hexadecimal Notation
10000001 00001011 00001011 11101111 IPv6 2M
129.11.11.239
Example of Dotted-decimal Notation.
IPv6 Address Representation Examples:
2031:0000:130F:0000:0000:09C0:876A:130B
2031:0:130f::9c0:876a:130b ARP 2M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 32 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
FF01:0:0:0:0:0:0:1 >>> FF01::1 0:0:0:0:0:0:0:1
>>> ::1
0:0:0:0:0:0:0:0 >>> ::
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 33 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 34 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
22520
SUMMER – 2023 EXAMINATION
MODEL ANSWER
6. Attempt any TWO of the following: 12
(a) Explain the 3 intra domain routing protocols. 6M
(Note: Explanation of any other protocols shall be considered). i)
Ans. Distance Vector Routing:
- Require only local state (less overhead smaller footprint)
- Harder to debug
- Can suffer from loops
• Distance vector Routing Protocol:
• Here Distance vector:
Current best known cost to reach a destination Any 3
Idea: exchange vectors among neighbors to learn about lowest protoc
cost paths. ols
Distance vector protocols advertise their routing table to all 2M
directly connected neighbors at regular frequent intervals using each
a lot of bandwidth and are slow to converge.
When a route becomes unavailable, all router tables must be
updated with that new information.
The problem is with each router having to advertise that new
information to its neighbors, it takes a long time for all routers
to have a current accurate view of the network.
Distance vector protocols use fixed length subnet masks which
aren‟t scalable.
- periodically (on the order of several seconds to minutes)
- whenever table changes (called triggered update)
• Each update is a list of pairs:
- (Destination , Cost )
• Update local table if receive a
“better” route - smaller cost
- from newly connected/available neighbor
Subject: Advanced Computer Network Subject Code:
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 35 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
iii) RIPv2:
_ Runs over UDP port 520
_ Limits networks to 15 hops (16 = 1)
_ Depends on count to infinity for loops
_ Supports split horizon, poison reverse
_ RFC 1812 specifies what options routers should or must have.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 36 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
the hosts (using their unicast addresses) that belong to a
particular group.
• Thus a tree that contains all the hosts belonging to a group, but
we use the unicast address of the host in the calculation.
• For efficiency, the router calculates the shortest path trees on
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 37 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 38 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
demand (when it receives the first multicast packet).
• In addition, the tree can be saved in cache memory for future
use by the same source/group pair.
• MOSPF is a data-driven protocol; the first time an MOSPF
router sees a datagram with a given source and group address,
the router constructs the Dijkstra shortest path tree.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 40 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
22520
SUMMER – 2023 EXAMINATION
MODEL ANSWER
Subject: Advanced Computer Network Subject Code:
interface that has an optimal path to a destination.
This unicast protocol can be a distance vector protocol (RIP) or
link state protocol (OSPF).
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 41 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
MODEL ANSWER
proble
m
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 43 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 44 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
interface goes down. 1M for
4. It can also occur when two routers send updates to each other at solutio
the same time. n
OR
For a routing protocol to work properly, if a link is broken (cost
becomes infinity), every other router should be aware of it
immediately, but in distance vector routing, this takes some time. The
problem is referred to as count to infinity. It takes several updates
before the cost for a broken link is recorded as infinity by all routers.
Example:
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 45 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 46 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
22520
SUMMER – 2023 EXAMINATION
MODEL ANSWER
Subject: Advanced Computer Network Subject Code:
C and A, so it corrects its table and changes infinity to 3 (1 for B
to C, and 2 for C to A, as C said).
• Once again, routers exchange their tables.
• When C receives B's routing table, it sees that B has changed the
weight of its link to A from 1 to 3, so C updates its table and
changes the weight of the link to A to 4 (1 for C to B, and 3 for B
to A, as B said).
• This process loops until all nodes find out that the weight of link
to A is infinity.
• This situation is shown in the table below
• In this way, Distance Vector Algorithms have a slow convergence
rate.
• One way to solve this problem is for routers to send information
only to the neighbors that are not exclusive links to the destination.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 47 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 48 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Email encryption involves encrypting, or disguising, the content Any 6
of email messages to protect potentially sensitive information points
from being read by anyone other than intended recipients. Email 1M each
encryption often includes authentication. Email allows attackers
to use it as a way to cause problems in attempt to profit. Whether
through spam campaigns, malware and phishing attacks,
sophisticated targeted attacks, or business email compromise
(BEC), attackers try to take advantage of the lack of security of
email to carry out their actions.
Since most organizations rely on email to do business, attackers
exploit email in an attempt to steal sensitive information.
Because email is an open format, it can be viewed by anyone
who can intercept it. It can be easily read and the contents of an
email by intercepting it.
Email Security Policies can be established by viewing the
contents of emails flowing through their email servers. It‟s
important to understand what is in the entire email in order to act
appropriately. After these baseline policies are put into effect, an
organization can enact various security policies on those emails.
These email security policies can be as simple as removing all
executable content from emails to more in-depth actions, like
sending suspicious content to a sandboxing tool for detailed
analysis.
If security incidents are detected by these policies, the
organization needs to have actionable intelligence about the
scope of the attack.
Enforce email encryption policies to prevent sensitive email
information from falling into the wrong hands.
An email gateway scans and processes all incoming and
outgoing email and makes sure that threats are not allowed in.
Because attacks are increasingly sophisticated, standard security
measures, such as blocking known bad file attachments, are no
longer effective.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Material
Page 49 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for
Study Materia
Page 50 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in
the model answer scheme.
2) The model answer and the answer written by candidate may vary but the examiner
may try to assess the understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given more
Importance (Not applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated
in the figure. The figures drawn by candidate and model answer may vary. The
examiner may give credit for anyequivalent figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed
constant values may vary and there may be some difference in the candidate’s
answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of
relevant answer based on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based
on equivalent concept.
Q. Sub Answer Marking
No Q.N. Scheme
1. Attempt any FIVE of the following: 10
a) Draw and label sketch of ICMPV4 packet format. 2M
Ans. ICMPV4 packet format
Correct
labelled
diagram 2M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 1 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 2 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
c) Distinguish between SMTP and POP3 protocol (Any two points) 2M
Ans. Parameter SMTP POP3
Simple Mail Transfer Post Office Protocol 3 Any two
Full form Protocol (SMTP). points 1M
(POP 3) each
SMTP is designed for POP3 has been for relevant
contents
Designed sending the mails. designed for receiving
the mails.
SMTP is implemented POP3 is implemented
technically and on port number 110.
Implemen physically on port
tation number 25 of the
system.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 3 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 4 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
22520
f) State the use of Telnet. 2M
Ans. Followings are some of the uses of Telnet Any two uses
• TELNET is used to connect remote computers and issue commands 1M each
on those computers.
• It is used as a standard TCP/IP protocol for virtual terminal service
which is given by ISO.
• Telnet can be used to test or troubleshoot remote web or mail servers,
as well as trusted internal networks.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 5 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 6 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 7 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
1. When the site receives a data chunk, it stores it at the end of the
buffer (queue) and subtracts the size of the chunk from winSize. The
TSN number of the chunk is stored in the cumTSN variable.
2. When the process reads a chunk, it removes it from the queue
and adds the size of the removed chunk to winSize (recycling).
3. When the receiver decides to send a SACK, it checks the value
of lastAck; if it is less than cumTSN, it sends a SACK with a cumulative
TSN number equal to the cumTSN. It also includes the value of winSize
as the advertised window size.
Sender Site:
The sender has one buffer (queue) and three variables: curTSN, rwnd,
and inTransit, as shown in the following figure. We assume each chunk
is 100 bytes long.
The buffer holds the chunks produced by the process that either have
been sent or are ready to be sent. The first variable, curTSN, refers to
the next chunk to be sent. All chunks in the queue with a TSN less than
this value have been sent, but not acknowledged; they are outstanding.
The second variable, rwnd, holds the last value advertised by the
receiver (in bytes). The third variable, inTransit, holds the number of
bytes in transit, bytes sent but not yet acknowledged. The following is
the procedure used by the sender.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 8 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 9 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 10 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
22520
c) Describe DHCP with its operation and static and dynamic 4M
allocation
Ans. (Any relevant explanation can be considered) DHCP
DHCP (Dynamic Host Configuration Protocol) is a network Operation
2M
management protocol used to dynamically assign an IP address to any
device, or node, on a network so it can communicate using IP. Static
Working of DHCP: allocation
In a network, a DHCP server manages a pool of IP addresses, as well as 1M
default gateway details, DNS details and other information for the
clients’ network configuration. When a new computer is introduced
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 11 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Dynamic allocation
When the DHCP server is configured to use dynamic allocation, this
means that it uses a lease policy. This way, when an assigned IP address
from the available pool is no longer used, it will be transferred back to
the pool, making it available for someone else to use. The advantage of
this method is that the IP addresses are used to their maximum - as soon
as they are no longer used by the client, they are instantly made available
to others. The disadvantage of this method is that a client will always
have a random IP address.
Static allocation
The static allocation method is very popular in modern ISP networks,
which do not use dial-up methods. With the static allocation, the DHCP
sever keeps a database with all clients' LAN MAC addresses and gives
them an IP address only if their MAC address is in the database. This
way, the clients can be sure that they will be getting the same IP address
every time.
A DHCP server can be set to work using a combination of the allocation
methods. For example, in a public Wi-Fi network, all of the known hosts
and permanent clients can use the static allocation, whereas for guests,
the dynamic allocation is used. This way, known hosts can always use
the same IP address and the IP address pool is equally available to
everyone.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 12 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
22520
d) Give use of OSPF with its reason. 4M
Ans. Following are the uses of OSPF with its reason Any four
uses with
Link state routing protocol like OSPF is that the complete knowledge reasons 1M
of topology allows routers to calculate routes that satisfy particular each
criteria. This can be useful for traffic engineering purposes, where
routes can be constrained to meet particular quality of service
requirements.
Subject: Advanced Computer Network (Elect) Subject Code:
• To handle routing efficiently and on time, this protocol divides an
autonomous system into areas.
• As the name suggested “shortest path first”, OSPF calculates the
shortest route to a destination through the network based on an
algorithm. It uses the Dijkstra algorithm for calculating the shortest
path.
• Authentication type: There are two types of authentications, i.e., 0
and 1. Here, 0 means for none that specifies no authentication is
available and 1 means for password that specifies the passwordbased
authentication.
• Area identification: It defines the area within which the routing takes
place.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 13 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 14 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 15 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
2. Renumbering:
To allow sites to change the service provider, renumbering of the address
prefix (n) was built into IPv6 addressing. Each site is given a prefix by
the service provider to which it is connected. If the site changes the
provider, the address prefix needs to be changed.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 16 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Material
Page 17 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study Materia
Page 18 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
A router to which the site is connected can advertise a new prefix and
let the site use the old prefix for a short time before disabling it. In other
words, during the transition period, a site has two prefixes.
The main problem in using the renumbering mechanism is the support
of the DNS, which needs to propagate the new addressing associated
with a domain name.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 19 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Any other
relevant
explanation
shall be
considered
The header of TCP segment can range from 20-60 bytes.40 bytes are for
option. if there are no options, header is of 20 bytes else it can be of
upmost 60 bytes.
Header Fields in TCP Segment Structure:
Page 20 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 21 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
3) Sequence Number: -
This 32-bit field defines the number assigned to the first byte of data
contained in this segment. As we said before, TCP is a stream transport
protocol. To ensure connectivity, each byte to be transmitted is
numbered. The sequence number tells the destination which byte in this
sequence comprises the first byte in the segment. During connection
establishment, each party uses a random number generator to create an
initial sequence number (ISN), which is usually different in each
direction.
4) Acknowledgment Number: -
This 32-bit field defines the byte number that the receiver of the segment
is expecting to receive from the other party. If the receiver of the
segment has successfully received byte number x from the other party,
it defines x + 1 as the acknowledgment number. Acknowledgment and
data can be piggybacked together.
5) Header length: -
This 4-bit field indicates the number of 4-byte words in the TCP header.
The length of the header can be between 20 and 60 bytes. Therefore, the
value of this field can be between 5 (5 x 4 = 20) and 15 (15 x 4 = 60).
6) Reserved:-
This is a 6-bit field reserved for future use.
7) Control Field:-
This field defines 6 different control bits or flags. These are 6, 1 bit
control bits that controls connection establishment, connection
termination, connection abortion, flow control, mode of transfer etc.
Page 22 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 23 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
8) Window Size: This field tells the window size of the sending
TCP in bytes.
10) Urgent Pointer: This field (valid only if the URG control flag is
set) used to point to data that is urgently required that needs to reach the
receiving process at the earliest. The value of this field is added to the
sequence number to get the byte number of the last urgent byte.
Page 24 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
22520
c) With the help of Diagram, explain architecture of WWW. 4M
Ans. The WWW (World Wide Web) is a way of exchanging information
between computers on the Internet.
WWW works on client server architecture, in which a client using a Diagram 2M
browser can access a service using a server.
Today, the WWW is a distributed client server service. The service Explanation
2M
provided is distributed over many locations called sites and each site
holds one or more documents i.e., Web pages.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 25 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Client sends a request through its browser to the server using HTTP
protocol which specifies the way the browser and web server
communicates.
Then server receives request using HTTP protocol and checks its search
for the requested web page. If found it returns it back to the web browser
and close the HTTP connection.
Now the browser receives the web page, it interprets it and display the
contents of web page in web browser's window.
Page 26 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
transaction (request/response) retrieves a copy of the main document
(file X), which has a reference (pointer) to the second and the third files.
When a copy of the main document is retrieved and browsed, the user
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 27 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 28 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
d) Use Bellman-ford algorithm to find the shortest distance for all node 4M
in the graph.
For each
Ans. correct step
1M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 29 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 30 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
22520
4. Attempt any THREE of the following: 12
a) Construct a diagram to show the application of cookies in a scenario 4M
in which the server uses Cookies for advertisement. Cookies are
Ans small files which are stored on a user’s computer. They are used to hold Diagram 1M
a modest amount of data specific to a particular client and website and
can be accessed either by the web server or by the client computer
Steps 3M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 31 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Any
Relevant
When cookies were invented, they were basically little documents answer shall
containing information about you and your preferences. For instance, be
when you select your language in which you want to view your considered
website, the website would save the information in a document called
a cookie on your computer, and the next time when you visit the
website, it would be able to read a cookie saved earlier.
That way the website could remember your language and let you view
the website in your preferred language without having to select the
language again.
A cookie can contain any type of information such as the time when
you visited the website, the items that you added into your shopping
basket, all the links you clicked in website, etc. Cookies themselves
contain no personally identifiable information. Depending on the
publisher’s and the user’s settings, information associated with
cookies used in advertising may be added to the user’s Google
Account.
Page 32 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Following Fig. Example of how server uses cookies for
advertisement.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 33 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 34 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
b) List Intradomain multicast protocol. Explain any one in detail. 4M
Ans. Intra domain routing protocols carry out the multi cast function within
domains. Diagram 1M
List 1M
Any one
explanation
2M
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 35 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 36 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 37 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 38 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 39 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Fig. RPF
MODEL ANSWER
RPF does not guarantee that each network receives only one copy a
network receives two or more copies. The reason is that RPF is not
based on the destination address forwarding is based on the source
address. In order to solve the problem, RPB is used.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 41 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 42 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 43 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
RPB guarantees that the packet reaches every network and that every
network receives only one copy.
Following Fig, shows the difference between RPF & RPB
Page 44 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 45 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 46 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
What if a leaf router (a router at the bottom of the tree) has sent a prune
message but suddenly realizes, through IGMP, that one of its networks
is again interested in receiving the multicast packet? It can send a graft
message. The graft message forces the upstream router to resume
sending the multicast messages.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 47 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 48 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Page 50 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
PIM was designed to avoid the dense-mode scaling issues of DVMRP
and the potential performance issues of CBT (Core Base Tree) at the
same time.
PIM is used for efficient routing to multicast groups that might span
wide-area and inter domain internetworks. It is called “protocol
independent” because it does not depend on a particular unicast routing
protocol.
Protocol Independent Multicast (PIM) is a family of multicast routing
protocols for Internet Protocol (IP) networks that provide one-tomany
and many-to-many distribution of data over a LAN, WAN or the
Internet.
PIM is not dependent on a specific unicast routing protocol; it can
make use of any unicast routing protocol in use on the network. PIM
does not build its own routing tables. PIM uses the unicast routing table
for reverse path forwarding.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 51 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
22520
) PIM-DM:
PIM Dense Mode (PIM-DM) is a multicast routing protocol designed
with the opposite assumption to PIM-SM, namely that the receivers for
any multicast group are distributed densely throughout the network.
PIM-DM is used when there is a possibility that each router is involved
in multicasting (dense mode). In this environment, the use of a protocol
that broadcasts the packet is justified because almost all routers are
involved in the process.
Page 52 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
) PIM-SM:
PIM Sparse Mode (PIM-SM) is a multicast routing protocol designed
on the assumption that recipients for any particular multicast group
will be sparsely distributed throughout the network.
PIM-SM is used when there is a slight possibility that each router is
involved in multicasting (sparse mode). In this environment, the use
of a protocol that broadcasts the packet is not justified; a protocol such
as CBT (Core Base Tree) that uses a group-shared tree is more
appropriate.
PIM-SM is a group-shared tree routing protocol that has a
Rendezvous Point (RP) as the source of the tree. Its operation is like
CBT; however, it is simpler because it does not require
acknowledgment from a join message.
PIM-SM is used in a sparse multicast environment such as a WAN. PIM-
SM is similar to CBT but uses a simpler procedure.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 53 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 54 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
An HTTP response contains the following things:
1. Status Line
2. Response Header Fields or a series of HTTP headers
Any relevant
3. Blank Line explanation
4. Message Body shall be
In the request message, each HTTP header is followed by a carriage considered.
returns line feed (CRLF). After the last of the HTTP headers, an
additional CRLF is used and then begins the message body.
1) Status Line :
In the response message, the status line is the first line. The status line
contains three items:
a) HTTP Version Number: It is used to show the HTTP
specification to which the server has tried to make the message
comply.
b) Status Code: It is a three-digit number that indicates the result
of the request. The first digit defines the class of the response. The last
two digits do not have any categorization role. There are five values
for the first digit, which are as follows:
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 55 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 56 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Code and Description:
1xx: Information
It shows that the request was received and continuing the process.
2xx: Success
It shows that the action was received successfully, understood, and
accepted.
3xx: Redirection
It shows that further action must be taken to complete the request.
4xx: Client Error
It shows that the request contains incorrect syntax, or it cannot be
fulfilled.
5xx: Server Error
It shows that the server failed to fulfil a valid request.
c) Reason Phrase: It is also known as the status text. It is a
humanreadable text that summarizes the meaning of the status code.
2) Header Lines :
The HTTP Headers for the response of the server contain the
information that a client can use to find out more about the response,
and about the server that sent it. This information is used to assist the
client with displaying the response to a user, with storing the response
for the use of future, and with making further requests to the server
now or in the future. The name of the Response-header field can be
extended reliably only in combination with a change in the version of
the protocol.
3) Blank Line :
It contains cr (Carriage Return) & if (Line Feed) 4)
Entire Body:
The body of the message is used for most responses. The exceptions
are where a server is using certain status codes and where the server is
responding to a client request, which asks for the headers but not the
response body.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 57 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 58 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
d) List different timers used in TCP. 4M
Ans. TCP uses several timers to ensure that excessive delays are not
encountered during communications. Diagram 1M
Several of these timers are elegant, handling problems that are not
immediately obvious at first analysis. Each of the timers used by TCP List 1M
is examined in the following subsections, which reveal its role in
Explanation
ensuring data is properly sent from one connection to another. TCP 2M
implementations use at least four timers as shown in following Fig.
Any other
relevant
explanation
shall be
considered.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 59 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 60 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 61 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Retransmission Timeout:
RTO Calculation: The value of RTO is based on the smoothed round-
trip time and its deviation. Most implementations use the following
formula to calculate the RTO:
Initial value → Original (given in question).
After any measurement→RTO=RTTs +4*RTTd
2) Persistent Timer:
To deal with a zero-window-size deadlock situation, TCP uses a
persistence timer. When the sending TCP receives an acknowledgment
with a window size of zero, it starts a persistence timer.
When the persistence timer goes off, the sending TCP sends a special
segment called a probe. This segment contains only 1 byte of new data.
It has a sequence number, but its sequence number is never
acknowledged; it is even ignored inCalculating the sequence number
for the rest of the data. The probe causes the receiving TCP to resend
the acknowledgment which was lost.
3) Keepalive Timer:
A keepalive timer is used to prevent a long idle connection between
two TCPs. If a client opens a TCP connection to a server transfers
some data and becomes silent the client will crash.
In this case, the connection remains open forever. So a keepalive timer
is used. Each time the server hears from a client, it resets this timer.
The time-out is usually 2 hours. . If the server does not hear from the
client after 2 hours, it sends a probe segment. If there is no response
after 10 probes, each of which is 75 s apart, it assumes that the client
is down and terminates the connection.
Page 62 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
4) Time Wait Timer:
This timer is used during TCP connection termination. The timer starts
after sending the last Ack for 2nd FIN and closing the
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 63 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 64 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
e) Explain the working of SSH. 4M
Ans. SSH (Secure Shell) is the most popular remote login application
program. Diagram 1M
SSH uses client-server architecture in its implementation. An SSH
server can be deployed and allow several SSH clients to connect to it. Explanation
3M
The architecture of SSH is shown in following Fig. and the SSH
process is as follows: Any relevant
1) The SSH client on the left provides authentication to the SSH explanation
server on the right. In the initial connection, the client receives a host may be
key of the server, therefore, in all subsequent connections, the client considered
will know it is connecting to the same SSH server. This places less
emphasis on the IP address of the SSH server, which can be easily
spoofed, and more emphasis on the host key of the server, which
cannot be spoofed very easily.
2) The SSH server determines if the client is authorized to connect
to the SSH service by verifying the username/password or public key
that the client has presented for authentication. This process is
completely encrypted.
3) If the SSH server authenticates the client and the client is
authorized, the SSH session begins between the two entities. All
communication is completely encrypted.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 65 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 66 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
5. Attempt any TWO of the following: 12
a) Describe the BGP3 in detail. 6M
Ans. • To denote any protocol used to pass routing information between two
autonomous systems, Computer scientists use the term Exterior
Gateway Protocol (EGP). Currently a single exterior protocol is used Explanation
in most TCPJIP internets. Known as the Border Gateway Protocol 3M for
Message
(BGP), it has evolved through four (quite different) versions one of Format
the versions is BGP3. diagram and
• Two systems form a transport protocol connection between one explanation
another. They exchange messages to open and confirm the with
message
connection parameters. The initial data flow is the entire BGP routing
types 3M
table.
• Incremental updates are sent as the routing tables change. BGP does
not require periodic refresh of the entire BGP routing table.
Therefore, a BGP speaker must retain the current version of the entire
BGP routing tables of all of its peers for the duration of the
connection.
• Keepalive messages are sent periodically to ensure the liveness of the
connection.
• Notification messages are sent in response to errors or special
conditions. If a connection encounters an error condition, a
notification message is sent and the connection is closed.
• Connections between BGP speakers of different ASs are referred to
as "external" links. BGP connections between BGP speakers within
the same AS are referred to as "internal" links.
• Messages are sent over a reliable transport protocol connection. A
message is processed only after it is entirely received. The maximum
message size is 4096 octets. All implementations are required to
support this maximum message size.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 67 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 68 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
• The smallest message that may be sent consists of a BGP header
without a data portion, or 19 octets. Message Format
• Marker
If the Type of the message is OPEN, or if the Authentication Code used
in the OPEN message of the connection is zero, then the Marker must
be all ones. The Marker can be used to detect loss of synchronization
between a pair of BGP peers, and to authenticate incoming BGP
messages.
• Length
This 2-bytes unsigned integer indicates the total length of the message,
including the header, in bytes.
• Type
This 1-byte unsigned integer indicates the type code of the message. The
following type codes are defined:
1 - OPEN
2 - UPDATE
3 - NOTIFICATION
4 – KEEPALIVE
• OPEN Message
After a transport protocol connection is established, the first message
sent by each side is an OPEN message. If the OPEN message is
acceptable, a KEEPALIVE message confirming the OPEN is sent back.
Once the OPEN is confirmed, UPDATE, KEEPALIVE, and
NOTIFICATION messages may be exchanged.
• UPDATE Message
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 69 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 70 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
NOTIFICATION Message
A NOTIFICATION message is sent when an error condition is detected.
The BGP connection is closed immediately after sending it.
KEEPALIVE Message
BGP does not use any transport protocol-based keep-alive mechanism
to determine if peers are reachable. Instead, KEEPALIVE messages
are exchanged between peers often enough.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 71 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 72 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Flow Control
Flow control make it possible for sender to send the amount of data bytes
that can be sent without worrying an acknowledgment and is one of the
most important duties of the data link layer. In most protocols, flow
control is a set of procedures that tells the sender how much data it can
transmit before it must wait for an acknowledgment from the receiver.
The flow Control procedures not allowed to overwhelm the receiver.
Any receiving device has a limited speed at which it can process
incoming data and a limited amount of memory in which to store
incoming data, if sender sends data in a much speed data loss may occur
to overcome this problem flow control procedures are needful.
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 73 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Fig.
Dual Stack
Page 74 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 75 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
2. Tunnelling
Tunnelling is a strategy used when two computers using IPv6 want to
communicate with each other and the packet must pass through a region
that uses IPv4.
• To pass through this region, the packet must have an IPv4 address.
So the IPv6 packet is encapsulated in an IPv4 packet when it enters
the region.
• To make it clear that the IPv4 packet is carrying an IPv6 packet as
data.
Fig. Tunnelling
3. Header Translation
In this case, the header format must be totally changed through header
translation. The header of the IPv6 packet is converted to an IPv4 header
see figure.
Page 76 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Fig.
Header Translation
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 77 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
22520
6. Attempt any TWO of the following: 12
Subject: Advanced Computer Network (Elect) Subject Code:
Page 78 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
a) With a suitable example, explain Link State Routing algorithm. 6M
What are the serious drawbacks of Link State Routing Algorithm?
(Any relevant explanation can be considered)
Ans. In link state routing, four sets of actions are required to ensure that 4M for
each node has the routing table showing the least-cost node to every explanation
with
other node. example
1. Creation of the states of the links by each node, called the link state
packet(LSP). 2M for
2. Dissemination of LSPs to every other router, called flooding, in an drawbacks
efficient and reliable way.
3. Formation of a shortest path tree for each node. (Dijkstra algorithm)
4. Calculation of a routing table based on the shortest path tree.
Fig. A
graph for Internet (Where nodes denotes routers)
neighbor reverts, the original router considers that the neighbor is up and
running, and accordingly determines the cost based on the factors
discussed earlier. Otherwise, the neighbor is considered to be in some
error.
Using this information, the original router then sends information
Page 80 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
Subject: Advanced Computer Network (Elect) Subject Code: 22520
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 81 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
about all its neighbors to the entire Internet in a process called flooding,
as discussed earlier. For this, it sends a special packet called Link State
Packet (LSP) to all other routers via its neighbors.
For example, a sample portion of the LSP (shown only for router A
about its neighbors) could take the form as shown below
LSP for r
For example, the first row says that between router A (the first column)
and router B (the fourth column), there is network 1 (the second
column), and that the cost of going from router A to router B is 1 (the
fourth column).
Every router receives every LSP packet, and uses it to create a local
database called link state database. Thus, a link state database is a
collection of all LSPs. Every router stores such a database on its disk,
Page 82 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
and uses it for routing packets. A sample link state database for our
example Internet is shown below
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 83 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Drawbacks
• Memory Requirements − the link-state routing algorithm creates
and maintains a database and SPF tree. The database and SPF tree
required more memory than a distance vector algorithm.
• Processing Requirements − to build a complete map of the
topology Link-state routing protocols also require more CPU
processing.
• Bandwidth Requirements − The link-state routing protocol floods
link-state packet during initial start-up and also at the event like
network breakdown, and network topology changes, which affect
the available bandwidth on a network. If the network is not stable it
also creates issues on the bandwidth of the network.
Page 84 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
b) For the IP addresses given below 6M
1. Identify the classes to which the following IP address belongs
to
2. Identify network address sections
3. Identify host address section
4. Calculate number of hosts that can be assigned with each
network
i. 22.34.45.133 ii.
12.12.12.12 iii.
192.0.233.26 iv.
Ans. 126.123.16.87 Each IP
address
22.34.45.133= 00010110.00100010.00101101.10000101
IP address class = Class A
Network Section = 00010110 = 22 description
Host Section = 00100010.00101101.10000101= 34.45.133 M
Number of Host/Network = 2²⁴-2 = 16,777,214
12.12.12.12= 00001100.00001100.00001100.00001100
IP address class = Class A
Network Section = 00001100 = 12
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 85 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
192.0.233.26= 11000000.00000000.11101001.00011010
IP address class = Class C
Network Section = 11000000.00000000.11101001 = 192.0.233
Host Section = 00011010= 26
Number of Host = 28-2 = 154
126.123.16.87= 01111110.01111011.00010000.01010111
IP address class = Class A
Network Section = 01111110 = 126
Host Section = 01111011.00010000.01010111= 123.16.87
Number of Host = 2²⁴-2 = 16,777,214
Page 86 / 39
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
MODEL ANSWER
c) Describe e-mail security over non-secure channel. 6M
(Note: Any other description of the concept shall be considered.)
Ans. • Email security describes different techniques for keeping sensitive Any six
information in email communication and accounts secure against points 1M
each
unauthorized access, loss or compromise.
• Email is often used to spread malware, spam and phishing attacks.
Attackers use deceptive messages to entice recipients to part with
sensitive information, open attachments or click on hyperlinks that
install malware on the victim’s device.
• Email encryption involves encrypting, or disguising, the content of
email messages to protect potentially sensitive information from
being read by anyone other than intended recipients. Email
encryption often includes authentication.
• Email allows attackers to use it as a way to cause problems in attempt
to profit. Whether through spam campaigns, malware and phishing
attacks, sophisticated targeted attacks, or business email compromise
(BEC), attackers try to take advantage of the lack of security of email
to carry out their actions.
• Since most organizations rely on email to do business, attackers
exploit email in an attempt to steal sensitive information.
• Because email is an open format, it can be viewed by anyone who can
intercept it. It can be easily read and the contents of an email by
intercepting it.
• Email Security Policies can be established by viewing the contents of
emails flowing through their email servers. It’s important to
Free Study Material Buy Ty Diploma Buy Sy Diploma Whatsapp Group for Study
Material
Page 87 / 29
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2005 Certified)
SUMMER – 2023 EXAMINATION MODEL ANSWER
Page 88 / 39