2015 U2 Q5

Introduction

This question tested the following topics/items:

  • Client/Server Network Architecture
  • Peer-to-Peer (P2P) Network Architecture
  • Advantages and Disadvantages of Network Types
  • Network Security
  • Firewalls
  • Firewall Configuration and Maintenance
  • Security Patches and Updates
  • Network Protocols
  • Fiber Distributed Data Interface (FDDI)
  • Ethernet Protocol
  • Network Topologies (Token Ring, Star)
  • Physical Media in Networking (Fiber Optics, Copper Cables)
  • Open Systems Interconnection (OSI) Model
  • Transport Layer Responsibilities
  • Network Layer Responsibilities
  • Data Segmentation and Reassembly
  • End-to-End Communication
  • Error Detection and Correction
  • Data Flow Control
  • Packet Routing and Forwarding
  • IP Addressing
  • Wireless Networks
  • Advantages of Wireless Connectivity
  • Wireless Router Setup and Configuration
  • Mobile Data Communication
  • General Packet Radio Service (GPRS)
  • Cellular Network Technology
  • Applications of GPRS (e.g., POS Systems, MMS, Tracking)
  • Network Performance and Efficiency Considerations
  1. Introduction
  2. Part a)
  3. Part b) i)
  4. Part b) ii)
  5. Part c)
  6. Part d)
  7. Part e)
  8. Part f) i)
  9. Part f) ii)

Part a)

A client server network has one or more computer nodes providing all the services needed by all other client computers.  E.g web server, ftp server etc.

Hardware and resources are easily configured.

Servers can be administered to allow connection only to authorized computers on the network thus benefit from better security.

The sever can easily undergo regular backups easily since all data is centralized.

For P2P each computer on the network can act as a server for all others on the network.

Each node on the P2P is not guaranteed to be powerful, and mostly have the average power as clients.

This configuration is difficult to keep secure, additional third party software is usually required to implement security.

P2P networks add strain on the network as more peers are added to the network since sometimes one node would be responsible for routing a lot of traffic to all others. It is impractical to attempt backup on this network configuration.

Part b) i)

A firewall is a hardware and/or software security measure which protects against external network threats in the form of unauthorized connections or attacks. It also filters connections within the network to prevent malicious activity.

Part b) ii)

New computer threats emerge every day, and thus the firewall must apply frequent updates which protect against new computer threats.

Part c)

Fddi uses fibre optic cables , and transfers data using token ring topology, and can be much faster over long distances (200 Km). The ring technology includes additional rings in the event that one ring fails, another exists to carry on data communication.

Ethernet mainly uses copper wires, and transfers data using packet switching (Star Topology), over shorter distances (100 m) and is slower than FDDI. Ethernet does not typically have backup lines to help prevent network failure.

Part d)

The Transport layer is responsible for segmenting packets and reliable communications across the transport layer by implementing end to end communication with error checking and data flow control (speed changes between networks)

The network layer is responsible for efficiently routing data from network to network by choosing the best paths using IP protocol which gives each node on the network a unique IP address.

Part e)

  • It is convenient, the wireless signals penetrate walls and floors in all directions. Cable installation from floor to floor is not required.
  • It allows for additional mobility within the range oof connection
  • Overall, It is cheaper, since wired cables are not needed to be used.

Part f) i)

It is designed to provide wireless network connectivity over a cellular network so that traditional network tasks, e.g. connecting to the internet, can be facilitated. It was developed for wireless POS systems, MMS, tracking and navigation , wireless electricity meters , etc.

Part f) ii)

  • Allowing for wireless POS payments over the cell network when purchasing groceries without needing a phone line.
  • Allowing the electric company to carry out wireless meter readings without having to perform a physical house visit to read the meter.

© 2023  Vedesh Kungebeharry. All rights reserved. 

Leave a comment