SlideShare a Scribd company logo
1 of 12
October/November 2011 Scenario 3 Question 7 and 8(a)
Scenario A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications).  The intranet links into the website.  The data transferred is sometimes subject to corruption and must be checked.  One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security.
Question 7 (a) A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications).  The intranet links into the website.  Customers can access information over the internet which involves the transfer of data to and from a central server. (a) Describe the network protocols needed to transfer data in this situation. Your answer should include references to types of protocol, communication layers and give examples. [8]
Answers Question 7 (a) #1 Any eight points described from: Types: - modems } 1 - wifi/Ethernet } 2 - internet protocol (IP) } 3 - transmission control protocol (TCP) } 4 - user datagram protocol (UDP) } 4 - file transfer protocol (FTP) } 5 - hypertext transfer protocol (HTTP) } 5 - telecommunications network (TelNet) } 5 - secure shell (SSH) } 5
Answers Question 7 (a) #2 Layers: - physical } 1 - data link } 2 - network/internet } 3 - transport } 4 - applications } 5 Examples: - basic communication } 1 - go between from network layer to physical layer } 2 - acts on requests for services from network } 2 - forwarding packets (data gets to source) } 3 - also responsible for routing } 3 - divides data into packets for transmission … } 4 - … and adds addresses of source device } 4 - delivers services to network/internet layer } 5
Question 7 (b) The data transferred is sometimes subject to corruption and must be checked.  One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Describe the process of parity checking.[5]
Answers Question 7 (b) Any five points from: - verifies data transmitted accurately/correctly - parity can be even or odd according to number of 1 – bits - first bit of a byte is parity bit; next 7 are packet of data - e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity 0 1 1 1 0 1 0 0 only needed a 0 since already even parity - if packet arrives at destination and parity doesn’t match up then an error in transmission has occurred - if more than one bit has been changed or bits transposed, parity check may not pick up transmission error - references to block parity to locate errors in blocks of data
Question 8 (a) The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Discuss the advantages and disadvantages of common LAN topologies. [7]
Answers Question 8 (a) #1 Any seven points from: Ring: - drawing/description of ring topology - advantages: - performs well if network traffic is heavy - disadvantages: - faulty connection between 2 stations can cause network crash - difficult to add a new device once network already set up
Answers Question 8 (a) #2 Bus: - drawing/description of bus topology including terminator - advantages: - easy to add in new devices even if network already set up - one device failing doesn’t affect rest of network - no need to rely on hub or switch - less cabling needed reducing cost - disadvantages: - hard to identify problem if fault occurs - if there is a fault in spine, all stations on network fail - network topology is out-dated
Answers Question 8 (a) #3 Star: - drawing/description of star topology - advantages: - if one device fails, rest of network is not affected - can investigate network problems while it is running - disadvantages: - if the hub breaks down the whole network crashes - requires more cabling
Answers Question 8 (a) #4 Tree: - drawing/description of tree topology: - advantages: - brings together advantages of star and bus topologies - disadvantages: - brings together all the disadvantages of star and bus topologies - difficult network to wire up

More Related Content

What's hot

Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentationGopi A
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficTELKOMNIKA JOURNAL
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALASaikiran Panjala
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Dân Chơi
 
Star topology
Star topologyStar topology
Star topologykona paul
 
Definition of computur netwoeks
Definition of computur netwoeksDefinition of computur netwoeks
Definition of computur netwoeksMd Ashikur Rahman
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP ModelMaksudujjaman
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...CSCJournals
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topologyMaksudujjaman
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksMaksudujjaman
 
Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313FatemaYesminAka
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527IJRAT
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODELMd Saylab
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Aditya Kumar
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologiesAnup Pandey
 

What's hot (20)

Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network traffic
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
PACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference ModelPACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference Model
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
Star topology
Star topologyStar topology
Star topology
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Definition of computur netwoeks
Definition of computur netwoeksDefinition of computur netwoeks
Definition of computur netwoeks
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313
 
Network Topology
Network Topology Network Topology
Network Topology
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 

Viewers also liked

Viewers also liked (7)

Diego herrera.
Diego herrera.Diego herrera.
Diego herrera.
 
Caninos club
Caninos clubCaninos club
Caninos club
 
As you like it sets
As you like it   setsAs you like it   sets
As you like it sets
 
La batalla de angamos
La batalla de angamosLa batalla de angamos
La batalla de angamos
 
Presentación1
Presentación1Presentación1
Presentación1
 
GP_Pocket_Park
GP_Pocket_ParkGP_Pocket_Park
GP_Pocket_Park
 
Question One
Question OneQuestion One
Question One
 

Similar to October november 2010 scenario 3 question 7,8(a)

A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesMatthew Wolff
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...IJECEIAES
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inalRaja pirian
 
Intternetworking With TCP/IP
Intternetworking With TCP/IPIntternetworking With TCP/IP
Intternetworking With TCP/IPBIT DURG
 
Ex 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chenEx 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chenĐô GiẢn
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion ciscoyexia
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion ciscoyexia
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptkekeuwoe
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Ronoh Kennedy
 
module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptxDrPreethiD1
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksEswar Publications
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Ramadan Babers, PhD
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...IJERA Editor
 

Similar to October november 2010 scenario 3 question 7,8(a) (20)

A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network Topologies
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
 
Intternetworking With TCP/IP
Intternetworking With TCP/IPIntternetworking With TCP/IP
Intternetworking With TCP/IP
 
Ex 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chenEx 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chen
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.ppt
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptx
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular Networks
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
 
CN Unit-1 PPT.pptx
CN Unit-1 PPT.pptxCN Unit-1 PPT.pptx
CN Unit-1 PPT.pptx
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
 

Recently uploaded

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 

Recently uploaded (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

October november 2010 scenario 3 question 7,8(a)

  • 1. October/November 2011 Scenario 3 Question 7 and 8(a)
  • 2. Scenario A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications). The intranet links into the website. The data transferred is sometimes subject to corruption and must be checked. One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security.
  • 3. Question 7 (a) A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications). The intranet links into the website. Customers can access information over the internet which involves the transfer of data to and from a central server. (a) Describe the network protocols needed to transfer data in this situation. Your answer should include references to types of protocol, communication layers and give examples. [8]
  • 4. Answers Question 7 (a) #1 Any eight points described from: Types: - modems } 1 - wifi/Ethernet } 2 - internet protocol (IP) } 3 - transmission control protocol (TCP) } 4 - user datagram protocol (UDP) } 4 - file transfer protocol (FTP) } 5 - hypertext transfer protocol (HTTP) } 5 - telecommunications network (TelNet) } 5 - secure shell (SSH) } 5
  • 5. Answers Question 7 (a) #2 Layers: - physical } 1 - data link } 2 - network/internet } 3 - transport } 4 - applications } 5 Examples: - basic communication } 1 - go between from network layer to physical layer } 2 - acts on requests for services from network } 2 - forwarding packets (data gets to source) } 3 - also responsible for routing } 3 - divides data into packets for transmission … } 4 - … and adds addresses of source device } 4 - delivers services to network/internet layer } 5
  • 6. Question 7 (b) The data transferred is sometimes subject to corruption and must be checked. One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Describe the process of parity checking.[5]
  • 7. Answers Question 7 (b) Any five points from: - verifies data transmitted accurately/correctly - parity can be even or odd according to number of 1 – bits - first bit of a byte is parity bit; next 7 are packet of data - e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity 0 1 1 1 0 1 0 0 only needed a 0 since already even parity - if packet arrives at destination and parity doesn’t match up then an error in transmission has occurred - if more than one bit has been changed or bits transposed, parity check may not pick up transmission error - references to block parity to locate errors in blocks of data
  • 8. Question 8 (a) The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Discuss the advantages and disadvantages of common LAN topologies. [7]
  • 9. Answers Question 8 (a) #1 Any seven points from: Ring: - drawing/description of ring topology - advantages: - performs well if network traffic is heavy - disadvantages: - faulty connection between 2 stations can cause network crash - difficult to add a new device once network already set up
  • 10. Answers Question 8 (a) #2 Bus: - drawing/description of bus topology including terminator - advantages: - easy to add in new devices even if network already set up - one device failing doesn’t affect rest of network - no need to rely on hub or switch - less cabling needed reducing cost - disadvantages: - hard to identify problem if fault occurs - if there is a fault in spine, all stations on network fail - network topology is out-dated
  • 11. Answers Question 8 (a) #3 Star: - drawing/description of star topology - advantages: - if one device fails, rest of network is not affected - can investigate network problems while it is running - disadvantages: - if the hub breaks down the whole network crashes - requires more cabling
  • 12. Answers Question 8 (a) #4 Tree: - drawing/description of tree topology: - advantages: - brings together advantages of star and bus topologies - disadvantages: - brings together all the disadvantages of star and bus topologies - difficult network to wire up