SlideShare uma empresa Scribd logo
1 de 11
October/November 2011 Scenario 3 Question 7 and 8(a)
Scenario A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications).  The intranet links into the website.  The data transferred is sometimes subject to corruption and must be checked.  One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security.
Question 7 (a) A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications).  The intranet links into the website.  Customers can access information over the internet which involves the transfer of data to and from a central server. (a) Describe the network protocols needed to transfer data in this situation. Your answer should include references to types of protocol, communication layers and give examples. [8]
Answers Question 7 (a)
Question 7 (b) The data transferred is sometimes subject to corruption and must be checked.  One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Describe the process of parity checking.[5]
Answers Question 7 (b) Any five points from: - verifies data transmitted accurately/correctly - parity can be even or odd according to number of 1 – bits - first bit of a byte is parity bit; next 7 are packet of data - e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity 0 1 1 1 0 1 0 0 only needed a 0 since already even parity - if packet arrives at destination and parity doesn’t match up then an error in transmission has occurred - if more than one bit has been changed or bits transposed, parity check may not pick up transmission error - references to block parity to locate errors in blocks of data
Question 8 (a) The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Discuss the advantages and disadvantages of common LAN topologies. [7]
Answers Question 8 (a) #1 Any seven points from: Ring: - drawing/description of ring topology - advantages: - performs well if network traffic is heavy - disadvantages: - faulty connection between 2 stations can cause network crash - difficult to add a new device once network already set up
Answers Question 8 (a) #2 Bus: - drawing/description of bus topology including terminator - advantages: - easy to add in new devices even if network already set up - one device failing doesn’t affect rest of network - no need to rely on hub or switch - less cabling needed reducing cost - disadvantages: - hard to identify problem if fault occurs - if there is a fault in spine, all stations on network fail - network topology is out-dated
Answers Question 8 (a) #3 Star: - drawing/description of star topology - advantages: - if one device fails, rest of network is not affected - can investigate network problems while it is running - disadvantages: - if the hub breaks down the whole network crashes - requires more cabling
Answers Question 8 (a) #4 Tree: - drawing/description of tree topology: - advantages: - brings together advantages of star and bus topologies - disadvantages: - brings together all the disadvantages of star and bus topologies - difficult network to wire up

Mais conteúdo relacionado

Mais procurados (6)

Opnet final year project in ludhiana
Opnet final year project in ludhianaOpnet final year project in ludhiana
Opnet final year project in ludhiana
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
 
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless StandardsPACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless Standards
 
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006 PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
 
Pace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport LayerPace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport Layer
 

Destaque

A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesMatthew Wolff
 
Dragons Den Template3
Dragons Den Template3Dragons Den Template3
Dragons Den Template3iarthur
 
«реалії та кроки до якісної освіти»
«реалії та кроки до якісної освіти»«реалії та кроки до якісної освіти»
«реалії та кроки до якісної освіти»jekah
 
Digipak design ideas
Digipak design ideasDigipak design ideas
Digipak design ideasabby149
 
Văn phòng thoải mái như ở nhà của hãng walmart
Văn phòng thoải mái như ở nhà của hãng walmartVăn phòng thoải mái như ở nhà của hãng walmart
Văn phòng thoải mái như ở nhà của hãng walmartThi công sơn giá rẻ
 
Ester scribd 2
Ester scribd 2Ester scribd 2
Ester scribd 2stermaciel
 
Rubric for presentations
Rubric for presentationsRubric for presentations
Rubric for presentationsLisa Schmidt
 
Guion tecnico para_video_-_ejemplo
Guion tecnico para_video_-_ejemploGuion tecnico para_video_-_ejemplo
Guion tecnico para_video_-_ejemplokathe2496
 
Robbins eob9 inst_ppt_10
Robbins eob9 inst_ppt_10Robbins eob9 inst_ppt_10
Robbins eob9 inst_ppt_10leng81287
 
Barreres tecnològiques de la e-factura en la caib
Barreres tecnològiques de la e-factura en la caibBarreres tecnològiques de la e-factura en la caib
Barreres tecnològiques de la e-factura en la caibAinona_68
 
Patrons tàctics i la seva eficàcia en l’esgrima d’elit
Patrons tàctics i la seva eficàcia en l’esgrima d’elitPatrons tàctics i la seva eficàcia en l’esgrima d’elit
Patrons tàctics i la seva eficàcia en l’esgrima d’elitINEF_Catalunya
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lessonMukalele Rogers
 

Destaque (15)

A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network Topologies
 
Dragons Den Template3
Dragons Den Template3Dragons Den Template3
Dragons Den Template3
 
Unit 5
Unit 5Unit 5
Unit 5
 
«реалії та кроки до якісної освіти»
«реалії та кроки до якісної освіти»«реалії та кроки до якісної освіти»
«реалії та кроки до якісної освіти»
 
Digipak design ideas
Digipak design ideasDigipak design ideas
Digipak design ideas
 
EXECyL octubre 2016
EXECyL octubre 2016EXECyL octubre 2016
EXECyL octubre 2016
 
Văn phòng thoải mái như ở nhà của hãng walmart
Văn phòng thoải mái như ở nhà của hãng walmartVăn phòng thoải mái như ở nhà của hãng walmart
Văn phòng thoải mái như ở nhà của hãng walmart
 
Ester scribd 2
Ester scribd 2Ester scribd 2
Ester scribd 2
 
Rubric for presentations
Rubric for presentationsRubric for presentations
Rubric for presentations
 
Guion tecnico para_video_-_ejemplo
Guion tecnico para_video_-_ejemploGuion tecnico para_video_-_ejemplo
Guion tecnico para_video_-_ejemplo
 
Robbins eob9 inst_ppt_10
Robbins eob9 inst_ppt_10Robbins eob9 inst_ppt_10
Robbins eob9 inst_ppt_10
 
Barreres tecnològiques de la e-factura en la caib
Barreres tecnològiques de la e-factura en la caibBarreres tecnològiques de la e-factura en la caib
Barreres tecnològiques de la e-factura en la caib
 
Patrons tàctics i la seva eficàcia en l’esgrima d’elit
Patrons tàctics i la seva eficàcia en l’esgrima d’elitPatrons tàctics i la seva eficàcia en l’esgrima d’elit
Patrons tàctics i la seva eficàcia en l’esgrima d’elit
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
Intranet 47
Intranet 47Intranet 47
Intranet 47
 

Semelhante a October november 2010 scenario 3 question 7,8(a)

module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptxDrPreethiD1
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptkekeuwoe
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksEswar Publications
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inalRaja pirian
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docxdohertyjoetta
 
Netw410 week 3 i lab 3
Netw410 week 3 i lab 3Netw410 week 3 i lab 3
Netw410 week 3 i lab 3netw420
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...CSCJournals
 
Intternetworking With TCP/IP
Intternetworking With TCP/IPIntternetworking With TCP/IP
Intternetworking With TCP/IPBIT DURG
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...IJECEIAES
 
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1 COM.docx
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1  COM.docxComp6461 – Fall 2014 Theory Assignment 3 - Page 1  COM.docx
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1 COM.docxmonicafrancis71118
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Denny K
 
First hw assignment #1 --
First hw assignment #1  --First hw assignment #1  --
First hw assignment #1 --jandrewsxu
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt downloadzanetorserwaah
 

Semelhante a October november 2010 scenario 3 question 7,8(a) (20)

module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptx
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.ppt
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular Networks
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
Netw410 week 3 i lab 3
Netw410 week 3 i lab 3Netw410 week 3 i lab 3
Netw410 week 3 i lab 3
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
Intternetworking With TCP/IP
Intternetworking With TCP/IPIntternetworking With TCP/IP
Intternetworking With TCP/IP
 
Data link layer
Data link layerData link layer
Data link layer
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1 COM.docx
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1  COM.docxComp6461 – Fall 2014 Theory Assignment 3 - Page 1  COM.docx
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1 COM.docx
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
First hw assignment #1 --
First hw assignment #1  --First hw assignment #1  --
First hw assignment #1 --
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
 

Último

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Último (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

October november 2010 scenario 3 question 7,8(a)

  • 1. October/November 2011 Scenario 3 Question 7 and 8(a)
  • 2. Scenario A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications). The intranet links into the website. The data transferred is sometimes subject to corruption and must be checked. One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security.
  • 3. Question 7 (a) A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications). The intranet links into the website. Customers can access information over the internet which involves the transfer of data to and from a central server. (a) Describe the network protocols needed to transfer data in this situation. Your answer should include references to types of protocol, communication layers and give examples. [8]
  • 5. Question 7 (b) The data transferred is sometimes subject to corruption and must be checked. One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Describe the process of parity checking.[5]
  • 6. Answers Question 7 (b) Any five points from: - verifies data transmitted accurately/correctly - parity can be even or odd according to number of 1 – bits - first bit of a byte is parity bit; next 7 are packet of data - e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity 0 1 1 1 0 1 0 0 only needed a 0 since already even parity - if packet arrives at destination and parity doesn’t match up then an error in transmission has occurred - if more than one bit has been changed or bits transposed, parity check may not pick up transmission error - references to block parity to locate errors in blocks of data
  • 7. Question 8 (a) The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Discuss the advantages and disadvantages of common LAN topologies. [7]
  • 8. Answers Question 8 (a) #1 Any seven points from: Ring: - drawing/description of ring topology - advantages: - performs well if network traffic is heavy - disadvantages: - faulty connection between 2 stations can cause network crash - difficult to add a new device once network already set up
  • 9. Answers Question 8 (a) #2 Bus: - drawing/description of bus topology including terminator - advantages: - easy to add in new devices even if network already set up - one device failing doesn’t affect rest of network - no need to rely on hub or switch - less cabling needed reducing cost - disadvantages: - hard to identify problem if fault occurs - if there is a fault in spine, all stations on network fail - network topology is out-dated
  • 10. Answers Question 8 (a) #3 Star: - drawing/description of star topology - advantages: - if one device fails, rest of network is not affected - can investigate network problems while it is running - disadvantages: - if the hub breaks down the whole network crashes - requires more cabling
  • 11. Answers Question 8 (a) #4 Tree: - drawing/description of tree topology: - advantages: - brings together advantages of star and bus topologies - disadvantages: - brings together all the disadvantages of star and bus topologies - difficult network to wire up