0% found this document useful (0 votes)
21 views4 pages

During The Program

The document provides an overview of IT networks, discussing cultural exchange, the impact of cell phones on social movements, and various network protocols and components. It highlights the advantages of wireless connections, the role of gateways, and security measures against threats like denial of service attacks. Additionally, it compares wired and wireless networks, suggesting a hybrid approach for growing businesses.

Uploaded by

komrononon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views4 pages

During The Program

The document provides an overview of IT networks, discussing cultural exchange, the impact of cell phones on social movements, and various network protocols and components. It highlights the advantages of wireless connections, the role of gateways, and security measures against threats like denial of service attacks. Additionally, it compares wired and wireless networks, suggesting a hybrid approach for growing businesses.

Uploaded by

komrononon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

IT Networks

IT Networks
During the Program
Overview of Networks

1. a) What is meant by the term ‘cultural exchange’?


Cultural interchange is the mechanism whereby people from various cultures share their customs,
thoughts, ideals, and practices.

b) Explain the social impact of the use of cell phones in uprisings such as the recent ‘Arab spring’.
While also posing difficulties connected to state control and
surveillance, cell phones were instrumental in forming the dynamics of
the Arab Spring, enabling communication, mobilisation, and more
awareness of social concerns.

2. Name one protocol used by wireless LANs. What makes Ethernet so popular?
IEEE 802.11

3. a) What does ISP stand for?


Internet service provider

b) Name one ISP with which you are familiar.


Telstra

4. Suggest some advantages of having a privately-owned connection (dark fibre).


High capacity
Control
security

© VEA Group Pty Ltd 2012


Reproducing these support notes
You may download and print one copy of these support notes from our website or ClickView for your reference.
Further copying or printing must be reported to CAL as per the Copyright Act 1968.
IT Networks

Wireless LANs and Mobile devices

5. What are the advantages of using a wireless connection to the internet compared to a wired
network?
Mobility
Easy installation
Guest use

6. What are the three main systems the GSM network depends on? Explain how these systems are
interconnected.
 MS to BSS: Wireless connection via radio waves.
 BSS to NSS: BSC communicates with MSC to route calls.
 NSS to External Networks: MSC connects to PSTN and data networks.

Key hardware and software components

7. a) Explain the role of a gateway in a communications network.


A gateway in a communications network connects different networks, enabling them to communicate
despite using varied protocols. It handles protocol translation, data routing, and traffic management,
ensuring efficient data delivery while enhancing security.

b) What types of network protocols could be connected via a gateway?


1. TCP/IP
2. HTTP/HTTPS
3. FTP
4. SMTP

8. Compare a policeman directing traffic at an intersection with the role of a router.


Both serve as intermediaries that facilitate orderly movement, vehicles for the policeman
and data for the router, while maintaining overall system efficiency.

© VEA Group Pty Ltd 2012


Reproducing these support notes
You may download and print one copy of these support notes from our website or ClickView for your reference.
Further copying or printing must be reported to CAL as per the Copyright Act 1968.
IT Networks

9. Match the following protocol functions to the descriptions.

[Link] speed F A. Ensures data is not readable if it is intercepted

2. Compression methods E B. Can request a packet be retransmitted if it is corrupted

3. Routing information C C. Determines which direction packets are sent

4. Number and order of packets


D D. Keeps track of packets ensuring they all arrive in the right order

5. Error handling B E. Enables more packets to be sent through the same bandwidth

6. Encryption A
F. Ensures agreement on the rate at which data is transmitted

Wired and Wireless Protocols

[Link] in the blanks.


protocols
The rules of transmission are called _______________, which typically describe:

 speed
the signal _______________

 compression
_______________ methods used to pack the information into the signal.

 router
_______________ information.

 _______________ data
and order of _______________ packets. To make sure they all arrive at
number
the destination.

 Error handling in transmission.


_______________

 encryption
_______________ methods which make the data difficult to intercept by hackers.

[Link] does ISO stand for? What does ISO do?


ISO, or the International Organisation for Standardisation, develops international
standards to ensure quality, safety, and efficiency across various industries.

[Link] three of the protocols mentioned in this program. Explain one protocol in detail.
TCP/IP (Transmission Control Protocol/Internet Protocol)
HTTP (Hypertext Transfer Protocol)
FTP (File Transfer Protocol)

© VEA Group Pty Ltd 2012


Reproducing these support notes
You may download and print one copy of these support notes from our website or ClickView for your reference.
Further copying or printing must be reported to CAL as per the Copyright Act 1968.
IT Networks

Wired and wireless strengths and limitations

[Link] using a wireless connection in a cafe Jim notices that access to the internet is very slow
compared to the same location the day before. What are two possible causes of the problem
related to the normal limitations of a wireless network?
Interference from other devices or networks.
Network congestion occurs when more users share the same Wi-Fi.

[Link] you were setting up a new network for a growing business, would you choose a wired or wireless
network to meet the needs of the business, or a combination of both? Explain your reasoning, with
reference to the type of business you have assumed for your answer.
This hybrid method is suitable for a dynamic business setting needing
both performance and mobility since it combines the reliability of
wired connections with the ease of wireless access.

Security threats

[Link] measures should protect, block and alert the user of any threat to the security of the
system. Use your own knowledge to discuss how these three results (protect, block and alert) are
commonly achieved.
Methods including encryption for data security and firewalls to stop unwanted access
protect, block, and warn users. Intrusion Prevention Systems (IPS) instantly stop attacks;
Intrusion Detection Systems (IDS) provide warnings for questionable activity. This
arrangement generates a solid security infrastructure.

[Link] of service attacks have been used by people with a grievance against an organisation with
a popular website. How does a denial of service affect the website?
A denial of service (DoS) attack bombards a website with too much traffic, therefore
slowing down or crashing it. This causes lost revenue, downtime, and harm to the
reputation of the company.

© VEA Group Pty Ltd 2012


Reproducing these support notes
You may download and print one copy of these support notes from our website or ClickView for your reference.
Further copying or printing must be reported to CAL as per the Copyright Act 1968.

You might also like