SlideShare ist ein Scribd-Unternehmen logo
1 von 11
October/November 2011 Scenario 3 Question 7 and 8(a)
Scenario A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications).  The intranet links into the website.  The data transferred is sometimes subject to corruption and must be checked.  One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security.
Question 7 (a) A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications).  The intranet links into the website.  Customers can access information over the internet which involves the transfer of data to and from a central server. (a) Describe the network protocols needed to transfer data in this situation. Your answer should include references to types of protocol, communication layers and give examples. [8]
Answers Question 7 (a)
Question 7 (b) The data transferred is sometimes subject to corruption and must be checked.  One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Describe the process of parity checking.[5]
Answers Question 7 (b) Any five points from: - verifies data transmitted accurately/correctly - parity can be even or odd according to number of 1 – bits - first bit of a byte is parity bit; next 7 are packet of data - e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity 0 1 1 1 0 1 0 0 only needed a 0 since already even parity - if packet arrives at destination and parity doesn’t match up then an error in transmission has occurred - if more than one bit has been changed or bits transposed, parity check may not pick up transmission error - references to block parity to locate errors in blocks of data
Question 8 (a) The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Discuss the advantages and disadvantages of common LAN topologies. [7]
Answers Question 8 (a) #1 Any seven points from: Ring: - drawing/description of ring topology - advantages: - performs well if network traffic is heavy - disadvantages: - faulty connection between 2 stations can cause network crash - difficult to add a new device once network already set up
Answers Question 8 (a) #2 Bus: - drawing/description of bus topology including terminator - advantages: - easy to add in new devices even if network already set up - one device failing doesn’t affect rest of network - no need to rely on hub or switch - less cabling needed reducing cost - disadvantages: - hard to identify problem if fault occurs - if there is a fault in spine, all stations on network fail - network topology is out-dated
Answers Question 8 (a) #3 Star: - drawing/description of star topology - advantages: - if one device fails, rest of network is not affected - can investigate network problems while it is running - disadvantages: - if the hub breaks down the whole network crashes - requires more cabling
Answers Question 8 (a) #4 Tree: - drawing/description of tree topology: - advantages: - brings together advantages of star and bus topologies - disadvantages: - brings together all the disadvantages of star and bus topologies - difficult network to wire up

Weitere ähnliche Inhalte

Was ist angesagt? (6)

Opnet final year project in ludhiana
Opnet final year project in ludhianaOpnet final year project in ludhiana
Opnet final year project in ludhiana
 
PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006PACE-IT: Introduction to Routing Protocols - N10 006
PACE-IT: Introduction to Routing Protocols - N10 006
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
 
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless StandardsPACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless Standards
 
PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006 PACE-IT: Introduction to IPv4 (part 2) - N10 006
PACE-IT: Introduction to IPv4 (part 2) - N10 006
 
Pace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport LayerPace IT - Introduction to the Transport Layer
Pace IT - Introduction to the Transport Layer
 

Andere mochten auch

A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesMatthew Wolff
 
Dragons Den Template3
Dragons Den Template3Dragons Den Template3
Dragons Den Template3iarthur
 
«реалії та кроки до якісної освіти»
«реалії та кроки до якісної освіти»«реалії та кроки до якісної освіти»
«реалії та кроки до якісної освіти»jekah
 
Digipak design ideas
Digipak design ideasDigipak design ideas
Digipak design ideasabby149
 
Văn phòng thoải mái như ở nhà của hãng walmart
Văn phòng thoải mái như ở nhà của hãng walmartVăn phòng thoải mái như ở nhà của hãng walmart
Văn phòng thoải mái như ở nhà của hãng walmartThi công sơn giá rẻ
 
Ester scribd 2
Ester scribd 2Ester scribd 2
Ester scribd 2stermaciel
 
Rubric for presentations
Rubric for presentationsRubric for presentations
Rubric for presentationsLisa Schmidt
 
Guion tecnico para_video_-_ejemplo
Guion tecnico para_video_-_ejemploGuion tecnico para_video_-_ejemplo
Guion tecnico para_video_-_ejemplokathe2496
 
Robbins eob9 inst_ppt_10
Robbins eob9 inst_ppt_10Robbins eob9 inst_ppt_10
Robbins eob9 inst_ppt_10leng81287
 
Barreres tecnològiques de la e-factura en la caib
Barreres tecnològiques de la e-factura en la caibBarreres tecnològiques de la e-factura en la caib
Barreres tecnològiques de la e-factura en la caibAinona_68
 
Patrons tàctics i la seva eficàcia en l’esgrima d’elit
Patrons tàctics i la seva eficàcia en l’esgrima d’elitPatrons tàctics i la seva eficàcia en l’esgrima d’elit
Patrons tàctics i la seva eficàcia en l’esgrima d’elitINEF_Catalunya
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lessonMukalele Rogers
 

Andere mochten auch (15)

A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network Topologies
 
Dragons Den Template3
Dragons Den Template3Dragons Den Template3
Dragons Den Template3
 
Unit 5
Unit 5Unit 5
Unit 5
 
«реалії та кроки до якісної освіти»
«реалії та кроки до якісної освіти»«реалії та кроки до якісної освіти»
«реалії та кроки до якісної освіти»
 
Digipak design ideas
Digipak design ideasDigipak design ideas
Digipak design ideas
 
EXECyL octubre 2016
EXECyL octubre 2016EXECyL octubre 2016
EXECyL octubre 2016
 
Văn phòng thoải mái như ở nhà của hãng walmart
Văn phòng thoải mái như ở nhà của hãng walmartVăn phòng thoải mái như ở nhà của hãng walmart
Văn phòng thoải mái như ở nhà của hãng walmart
 
Ester scribd 2
Ester scribd 2Ester scribd 2
Ester scribd 2
 
Rubric for presentations
Rubric for presentationsRubric for presentations
Rubric for presentations
 
Guion tecnico para_video_-_ejemplo
Guion tecnico para_video_-_ejemploGuion tecnico para_video_-_ejemplo
Guion tecnico para_video_-_ejemplo
 
Robbins eob9 inst_ppt_10
Robbins eob9 inst_ppt_10Robbins eob9 inst_ppt_10
Robbins eob9 inst_ppt_10
 
Barreres tecnològiques de la e-factura en la caib
Barreres tecnològiques de la e-factura en la caibBarreres tecnològiques de la e-factura en la caib
Barreres tecnològiques de la e-factura en la caib
 
Patrons tàctics i la seva eficàcia en l’esgrima d’elit
Patrons tàctics i la seva eficàcia en l’esgrima d’elitPatrons tàctics i la seva eficàcia en l’esgrima d’elit
Patrons tàctics i la seva eficàcia en l’esgrima d’elit
 
Over view of internet computer studies lesson
Over view of internet  computer studies lessonOver view of internet  computer studies lesson
Over view of internet computer studies lesson
 
Intranet 47
Intranet 47Intranet 47
Intranet 47
 

Ähnlich wie October november 2010 scenario 3 question 7,8(a)

module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptxDrPreethiD1
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptkekeuwoe
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksEswar Publications
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inalRaja pirian
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docxdohertyjoetta
 
Netw410 week 3 i lab 3
Netw410 week 3 i lab 3Netw410 week 3 i lab 3
Netw410 week 3 i lab 3netw420
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...CSCJournals
 
Intternetworking With TCP/IP
Intternetworking With TCP/IPIntternetworking With TCP/IP
Intternetworking With TCP/IPBIT DURG
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...IJECEIAES
 
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1 COM.docx
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1  COM.docxComp6461 – Fall 2014 Theory Assignment 3 - Page 1  COM.docx
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1 COM.docxmonicafrancis71118
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Denny K
 
First hw assignment #1 --
First hw assignment #1  --First hw assignment #1  --
First hw assignment #1 --jandrewsxu
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt downloadzanetorserwaah
 

Ähnlich wie October november 2010 scenario 3 question 7,8(a) (20)

module 2 cn new.pptx
module 2 cn new.pptxmodule 2 cn new.pptx
module 2 cn new.pptx
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Computers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.pptComputers network Chapter 3 The data link layer.ppt
Computers network Chapter 3 The data link layer.ppt
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular Networks
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
 
19 20 cn q bf inal
19 20 cn q bf inal19 20 cn q bf inal
19 20 cn q bf inal
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
Netw410 week 3 i lab 3
Netw410 week 3 i lab 3Netw410 week 3 i lab 3
Netw410 week 3 i lab 3
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
 
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
Intternetworking With TCP/IP
Intternetworking With TCP/IPIntternetworking With TCP/IP
Intternetworking With TCP/IP
 
Data link layer
Data link layerData link layer
Data link layer
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1 COM.docx
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1  COM.docxComp6461 – Fall 2014 Theory Assignment 3 - Page 1  COM.docx
Comp6461 – Fall 2014 Theory Assignment 3 - Page 1 COM.docx
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
First hw assignment #1 --
First hw assignment #1  --First hw assignment #1  --
First hw assignment #1 --
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

October november 2010 scenario 3 question 7,8(a)

  • 1. October/November 2011 Scenario 3 Question 7 and 8(a)
  • 2. Scenario A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications). The intranet links into the website. The data transferred is sometimes subject to corruption and must be checked. One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security.
  • 3. Question 7 (a) A passport office has an intranet to enable internal communications. They also have a website where customers can get information and also fill out forms (e.g. passport applications). The intranet links into the website. Customers can access information over the internet which involves the transfer of data to and from a central server. (a) Describe the network protocols needed to transfer data in this situation. Your answer should include references to types of protocol, communication layers and give examples. [8]
  • 5. Question 7 (b) The data transferred is sometimes subject to corruption and must be checked. One method which is used by the passport office is parity checking. The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Describe the process of parity checking.[5]
  • 6. Answers Question 7 (b) Any five points from: - verifies data transmitted accurately/correctly - parity can be even or odd according to number of 1 – bits - first bit of a byte is parity bit; next 7 are packet of data - e.g. 1 0 1 1 0 1 0 0 needed a 1-bit to give even parity 0 1 1 1 0 1 0 0 only needed a 0 since already even parity - if packet arrives at destination and parity doesn’t match up then an error in transmission has occurred - if more than one bit has been changed or bits transposed, parity check may not pick up transmission error - references to block parity to locate errors in blocks of data
  • 7. Question 8 (a) The passport office has invested in the latest technology to allow reliable customer services and ensure good network security. Discuss the advantages and disadvantages of common LAN topologies. [7]
  • 8. Answers Question 8 (a) #1 Any seven points from: Ring: - drawing/description of ring topology - advantages: - performs well if network traffic is heavy - disadvantages: - faulty connection between 2 stations can cause network crash - difficult to add a new device once network already set up
  • 9. Answers Question 8 (a) #2 Bus: - drawing/description of bus topology including terminator - advantages: - easy to add in new devices even if network already set up - one device failing doesn’t affect rest of network - no need to rely on hub or switch - less cabling needed reducing cost - disadvantages: - hard to identify problem if fault occurs - if there is a fault in spine, all stations on network fail - network topology is out-dated
  • 10. Answers Question 8 (a) #3 Star: - drawing/description of star topology - advantages: - if one device fails, rest of network is not affected - can investigate network problems while it is running - disadvantages: - if the hub breaks down the whole network crashes - requires more cabling
  • 11. Answers Question 8 (a) #4 Tree: - drawing/description of tree topology: - advantages: - brings together advantages of star and bus topologies - disadvantages: - brings together all the disadvantages of star and bus topologies - difficult network to wire up