SlideShare a Scribd company logo
October/November 2011 Scenario 3 Question 7 and 8(a)
Scenario A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications).  The intranet links into the website.  The data transferred is sometimes subject to corruption and must be checked.  One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security.
Question 7 (a) A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications).  The intranet links into the website.  Customers can access information over the internet which involves the transfer of data to and from a central server. (a) Describe the network protocols needed to transfer data in this situation. Your answer should include references to types of protocol, communication layers and give examples. [8]
Answers Question 7 (a) #1 Any eight points described from: Types: - modems } 1 - wifi/Ethernet } 2 - internet protocol (IP) } 3 - transmission control protocol (TCP) } 4 - user datagram protocol (UDP) } 4 - file transfer protocol (FTP) } 5 - hypertext transfer protocol (HTTP) } 5 - telecommunications network (TelNet) } 5 - secure shell (SSH) } 5
Answers Question 7 (a) #2 Layers: - physical } 1 - data link } 2 - network/internet } 3 - transport } 4 - applications } 5 Examples: - basic communication } 1 - go between from network layer to physical layer } 2 - acts on requests for services from network } 2 - forwarding packets (data gets to source) } 3 - also responsible for routing } 3 - divides data into packets for transmission … } 4 - … and adds addresses of source device } 4 - delivers services to network/internet layer } 5
Question 7 (b) The data transferred is sometimes subject to corruption and must be checked.  One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Describe the process of parity checking.[5]
Answers Question 7 (b) Any five points from: - verifies data transmitted accurately/correctly - parity can be even or odd according to number of 1 – bits - first bit of a byte is parity bit; next 7 are packet of data - e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity 0 1 1 1 0 1 0 0 only needed a 0 since already even parity - if packet arrives at destination and parity doesn’t match up then an error in transmission has occurred - if more than one bit has been changed or bits transposed, parity check may not pick up transmission error - references to block parity to locate errors in blocks of data
Question 8 (a) The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Discuss the advantages and disadvantages of common LAN topologies. [7]
Answers Question 8 (a) #1 Any seven points from: Ring: - drawing/description of ring topology - advantages: - performs well if network traffic is heavy - disadvantages: - faulty connection between 2 stations can cause network crash - difficult to add a new device once network already set up
Answers Question 8 (a) #2 Bus: - drawing/description of bus topology including terminator - advantages: - easy to add in new devices even if network already set up - one device failing doesn’t affect rest of network - no need to rely on hub or switch - less cabling needed reducing cost - disadvantages: - hard to identify problem if fault occurs - if there is a fault in spine, all stations on network fail - network topology is out-dated
Answers Question 8 (a) #3 Star: - drawing/description of star topology - advantages: - if one device fails, rest of network is not affected - can investigate network problems while it is running - disadvantages: - if the hub breaks down the whole network crashes - requires more cabling
Answers Question 8 (a) #4 Tree: - drawing/description of tree topology: - advantages: - brings together advantages of star and bus topologies - disadvantages: - brings together all the disadvantages of star and bus topologies - difficult network to wire up

More Related Content

What's hot

Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
Gopi A
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network traffic
TELKOMNIKA JOURNAL
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
Saikiran Panjala
 
PACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference ModelPACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference Model
Pace IT at Edmonds Community College
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
Dân Chơi
 
Star topology
Star topologyStar topology
Star topology
kona paul
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
Md Ashikur Rahman
 
Definition of computur netwoeks
Definition of computur netwoeksDefinition of computur netwoeks
Definition of computur netwoeks
Md Ashikur Rahman
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
Maksudujjaman
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
Satyendra Mohan
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
MD. Naimur Rahman
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
CSCJournals
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
Maksudujjaman
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
Maksudujjaman
 
Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313
FatemaYesminAka
 
Network Topology
Network Topology Network Topology
Network Topology
Md.Al-amin Hossen
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527
IJRAT
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
Md Saylab
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...
Aditya Kumar
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
Anup Pandey
 

What's hot (20)

Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network traffic
 
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALAINTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
 
PACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference ModelPACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference Model
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
Star topology
Star topologyStar topology
Star topology
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Definition of computur netwoeks
Definition of computur netwoeksDefinition of computur netwoeks
Definition of computur netwoeks
 
OSI and TCP/IP Model
OSI and TCP/IP ModelOSI and TCP/IP Model
OSI and TCP/IP Model
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
Types of network topology
Types of network topologyTypes of network topology
Types of network topology
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313
 
Network Topology
Network Topology Network Topology
Network Topology
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527
 
THE OSI MODEL
THE OSI MODELTHE OSI MODEL
THE OSI MODEL
 
Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...Improving the search mechanism for unstructured peer to-peer networks using t...
Improving the search mechanism for unstructured peer to-peer networks using t...
 
Computer network : models and topologies
Computer network : models and topologiesComputer network : models and topologies
Computer network : models and topologies
 

Viewers also liked

Caninos club
Caninos clubCaninos club
Caninos club
Maicol871223
 
As you like it sets
As you like it   setsAs you like it   sets
As you like it sets
Andrew Diaz
 
La batalla de angamos
La batalla de angamosLa batalla de angamos
La batalla de angamos
zxloim
 
Presentación1
Presentación1Presentación1
Presentación1
Jhoana Rodriguez
 
GP_Pocket_Park
GP_Pocket_ParkGP_Pocket_Park
GP_Pocket_Park
Martha Robinson
 
Question One
Question OneQuestion One
Question One
beccahodson
 

Viewers also liked (7)

Diego herrera.
Diego herrera.Diego herrera.
Diego herrera.
 
Caninos club
Caninos clubCaninos club
Caninos club
 
As you like it sets
As you like it   setsAs you like it   sets
As you like it sets
 
La batalla de angamos
La batalla de angamosLa batalla de angamos
La batalla de angamos
 
Presentación1
Presentación1Presentación1
Presentación1
 
GP_Pocket_Park
GP_Pocket_ParkGP_Pocket_Park
GP_Pocket_Park
 
Question One
Question OneQuestion One
Question One
 

Similar to October november 2010 scenario 3 question 7,8(a)

A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network Topologies
Matthew Wolff
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
Yoram Orzach
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
Mukesh Gautam
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
IJECEIAES
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
Raja pirian
 
Intternetworking With TCP/IP
Intternetworking With TCP/IPIntternetworking With TCP/IP
Intternetworking With TCP/IP
BIT DURG
 
Ex 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chenEx 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chen
Đô GiẢn
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
Kathirvel Ayyaswamy
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
yexia
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
yexia
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.ppt
kekeuwoe
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
Ronoh Kennedy
 
module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptx
DrPreethiD1
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular Networks
Eswar Publications
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
Ramadan Babers, PhD
 
CN Unit-1 PPT.pptx
CN Unit-1 PPT.pptxCN Unit-1 PPT.pptx
CN Unit-1 PPT.pptx
AnithaVanama1
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
AAKASH S
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
IJERA Editor
 

Similar to October november 2010 scenario 3 question 7,8(a) (20)

A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network Topologies
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
 
Intternetworking With TCP/IP
Intternetworking With TCP/IPIntternetworking With TCP/IP
Intternetworking With TCP/IP
 
Ex 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chenEx 1 chapter04-transport-layer-tony_chen
Ex 1 chapter04-transport-layer-tony_chen
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
 
Preparacion certificacion cisco
Preparacion certificacion ciscoPreparacion certificacion cisco
Preparacion certificacion cisco
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.ppt
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptx
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular Networks
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
 
CN Unit-1 PPT.pptx
CN Unit-1 PPT.pptxCN Unit-1 PPT.pptx
CN Unit-1 PPT.pptx
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

October november 2010 scenario 3 question 7,8(a)

  • 1. October/November 2011 Scenario 3 Question 7 and 8(a)
  • 2. Scenario A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications). The intranet links into the website. The data transferred is sometimes subject to corruption and must be checked. One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security.
  • 3. Question 7 (a) A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications). The intranet links into the website. Customers can access information over the internet which involves the transfer of data to and from a central server. (a) Describe the network protocols needed to transfer data in this situation. Your answer should include references to types of protocol, communication layers and give examples. [8]
  • 4. Answers Question 7 (a) #1 Any eight points described from: Types: - modems } 1 - wifi/Ethernet } 2 - internet protocol (IP) } 3 - transmission control protocol (TCP) } 4 - user datagram protocol (UDP) } 4 - file transfer protocol (FTP) } 5 - hypertext transfer protocol (HTTP) } 5 - telecommunications network (TelNet) } 5 - secure shell (SSH) } 5
  • 5. Answers Question 7 (a) #2 Layers: - physical } 1 - data link } 2 - network/internet } 3 - transport } 4 - applications } 5 Examples: - basic communication } 1 - go between from network layer to physical layer } 2 - acts on requests for services from network } 2 - forwarding packets (data gets to source) } 3 - also responsible for routing } 3 - divides data into packets for transmission … } 4 - … and adds addresses of source device } 4 - delivers services to network/internet layer } 5
  • 6. Question 7 (b) The data transferred is sometimes subject to corruption and must be checked. One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Describe the process of parity checking.[5]
  • 7. Answers Question 7 (b) Any five points from: - verifies data transmitted accurately/correctly - parity can be even or odd according to number of 1 – bits - first bit of a byte is parity bit; next 7 are packet of data - e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity 0 1 1 1 0 1 0 0 only needed a 0 since already even parity - if packet arrives at destination and parity doesn’t match up then an error in transmission has occurred - if more than one bit has been changed or bits transposed, parity check may not pick up transmission error - references to block parity to locate errors in blocks of data
  • 8. Question 8 (a) The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Discuss the advantages and disadvantages of common LAN topologies. [7]
  • 9. Answers Question 8 (a) #1 Any seven points from: Ring: - drawing/description of ring topology - advantages: - performs well if network traffic is heavy - disadvantages: - faulty connection between 2 stations can cause network crash - difficult to add a new device once network already set up
  • 10. Answers Question 8 (a) #2 Bus: - drawing/description of bus topology including terminator - advantages: - easy to add in new devices even if network already set up - one device failing doesn’t affect rest of network - no need to rely on hub or switch - less cabling needed reducing cost - disadvantages: - hard to identify problem if fault occurs - if there is a fault in spine, all stations on network fail - network topology is out-dated
  • 11. Answers Question 8 (a) #3 Star: - drawing/description of star topology - advantages: - if one device fails, rest of network is not affected - can investigate network problems while it is running - disadvantages: - if the hub breaks down the whole network crashes - requires more cabling
  • 12. Answers Question 8 (a) #4 Tree: - drawing/description of tree topology: - advantages: - brings together advantages of star and bus topologies - disadvantages: - brings together all the disadvantages of star and bus topologies - difficult network to wire up