Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
-
Upload
kevin-shen -
Category
Documents
-
view
218 -
download
0
Transcript of Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 1/28
Bryan Ye, Mr Simmonds, Year 9 IPT 1
2011 Communications Assessment Task
1. Describe in detail the operation of a web server and mail server.
A server is an electronic computer used to serve requests of other entities which are clients.
They are dedicated to running services for their clients which are other users in the same
network. They are designed to have a decent amount of storage and require other hardware
such as a router, network card etc. Software that includes an operating system, application
software and device drivers are also needed in ability to connect to their clients and carry
out their services. There are many types of servers that are used for many different
purposes which include web servers and mail servers which are both very common in theinformation age.
A mail server is a storage device which acts as a rendezvous for the user to send data to the
recipient. It is generally dedicated to help the user send electronic emails to the recipient. It
is also used to store e-mails and help the recipient receive emails. To be able to do this, a
mail server requires internet connection and a storage device. As stated before, the storage
device acts as a rendezvous for the user to send data to the recipient. This happens by the
user sending an e-mail to the mail server which then sends the data to the recipient. This is
the reason the user does not need to be connected to the recipient in order to receive data;
both parties are connected to the mail server via internet connection.
Mail servers also use SMTP (Simple Mail Transfer Protocol) which does various things to
help the e-mail reach the recipient. When an e-mail is being sent, all e-mails contain two
broad components, an envelope and a contents component. The envelope, which contains
the address and other information required to get to the recipient is read and thoroughly
checked by SMTP. The contents component contains the actual message with other header
fields that are needed to tell SMTP the sender, receiver, date/time, subject and the
relationship of the message to other related messages. When an e-mail is sent, it is
transmitted to an SMTP server where SMTP checks the envelope and the contents
components of the e-mail. After examining thoroughly and finding the destination, it is then
sent to the recipient’s SMTP server.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 2/28
Bryan Ye, Mr Simmonds, Year 9 IPT 2
Along with SMTP, another application level protocol is also needed to be used. This will
either be POP (Post Office Protocol) or IMAP (Internet Message Access Protocol). The POP or
IMAP server only does the delivery and organisation part of the transmission. After the
message is sent to an SMTP server, the message is then given to a POP or IMAP server which
places the mail into the recipient’s inbox, much like the delivery guy placing a mail inside
your mailbox after the post office has given you the mail. POP or IMAP also asks for
authentication details when the user attempts to view his/her e-mails. This is where the e-
mails are sent from the POP or IMAP server to the recipient.
Transmission of data between a user and the recipient of a mail server
A web server is a server that helps transmit data that can be accessed through the internet
such as web pages. The most common use of web servers is to host websites although they
are also used by businesses for other purposes such as enterprise software. Web servers
require a decent amount of storage space to store web pages, data, information and other
important hardware required to carry out its purpose such as a router. This means that the
web server requires internet connection. One of the main reasons for this is that a web
server needs to upload data or else nobody else can view it. Software is also required for the
server to run and process data.
For a client to view a web page, they require a web browser or web crawler which begins
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 3/28
Bryan Ye, Mr Simmonds, Year 9 IPT 3
the operation of requesting HTML documents. The HTML documents are then retrieved
using the HTTP GET command and URL (Universal Resource Locater) to retrieve entire
documents. The URL is simply an address which tells HTTP GET where to retrieve data from.
Inside the HTML documents there may be images, videos or any other types of files that can
be retrieved. Users may also use HTTP HEAD to simply retrieve the header of the HTTP
documents or HTTP POST to send data to the web server.
2. Outline the operation of a home wireless network (include all Information
Technology and protocols used). Discuss the advantages and disadvantages, giving
examples of each to justify your answer.
A home wireless network is a LAN (Local Area Network) which is enclosed in a way that you
require to be in vicinity of the network to use. Most home wireless networks have a physical
star network topology where there is one central node and other nodes that connect to the
central node. Other details are also needed to use a home wireless network such as
authentication and an electronic device which can detect the digital signals from the
network. They all come in different data rates, frequencies and bandwidths depending on
your Internet Service Provider, internet plan, location, router and other factors. Home
wireless networks are used for communication between electronic devices such as
computers, iPods, scanners etc.
The most common use for home wireless networks is connecting personal computers to the
internet although they are not limited to this. Having a home wireless network means that
the devices on the same network can communicate quickly without any problems. Having a
home wireless network means that you can have protected internet which does not require
wires and as a result of this new level of technology, they are expensive, fragile and you may
offer some of your internet speed. They are also easily played around with especially by
professional hackers who can easily bypass the authentication details. It is easy to find out
who is usually your internet though, because people are only allowed to use your network if
they are in vicinity. They typically connect electronic devices using point to point links.
A home wireless network requires a lot of mandatory hardware unlike computers where
you can throw away an SSD and replace it with a hard drive, or throw away a few USB ports
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 4/28
Bryan Ye, Mr Simmonds, Year 9 IPT 4
and it will still be fine. A home wireless network is not like this. It requires electricity and
stable internet connection such as ADSL. Dial up will not work very well with a wireless
network. Another piece of mandatory hardware is a WAP (Wireless access point) and
wireless adapter or NIC (Network interface card). These two pieces of hardware are used to
connect your personal device to the internet.
The WAP is typically located on the router. It is used as the central node of a wireless
network to broadcast to other wireless nodes in vicinity (located on the wireless adapter or
NIC). Because the WAP is a central access point for anything within vicinity, it is quite easy to
tamper with it. This is why the protocols WEP (Wired Equivalent Privacy), WPA (Wi-Fi
Protected Access) and WPA2 (Wi-Fi Protected Access 2) were created. WEP was a protocol
that only offered password protection. These protocols can easily counter unpolished
strategies to gain unauthorised access. WEP was the first protocol introduced to defend
wireless network but only introduced password protection. WPA and WPA2 were then later
created. These showed much stronger protection because they encrypted as well as used
password protection.
The wireless adapter or NIC act as modems to constantly modulate and demodulate data
when needed. When connecting to other wireless devices within the network, the analogue
that the wireless adapter or NIC has transmitted is detected by the router and redirected to
the other wireless device. Because of the fast communication between the central node and
other nodes, full duplex communication is achieved.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 5/28
Bryan Ye, Mr Simmonds, Year 9 IPT 5
Transmission of data from central node to other wireless nodes showing devices which
contain the nodes
Home wireless networks operate within the Ethernet protocol which is at the IPT
transmission level including OSI data link layer 2 and OSI physical layer 1. A MAC (Media
Access Controller) address of both the sender and recipient is required for the nodes to
understand the destination. The wireless adapter, NIC and WAP all have a unique 6 byte
MAC address. MAC addresses act as envelopes which tell the nodes where the Ethernet
packets are going. A typical MAC address would look like this 00-00-E2-66-E3-CC. A final 4-
byte CRC (Cyclic Redundancy Check) is also used at the end of transmission to check for any
errors in transmission. It is possible for two nodes to transmit a frame at the same time but
only if they are on different physical transmission line. If they share the physical
transmission line then a data collision will definitely occur and both frames will be
corrupted. A system called CSMA/CD (Carrier Sense Multiple Access with Collision
Detection) is used to deal with these collisions. This is only the case for hubs though as
modern day Ethernet networks use switches where two nodes exist on each physical line.
There are many advantages to home wireless networks and also many disadvantages.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 6/28
Bryan Ye, Mr Simmonds, Year 9 IPT 6
Ultimately, the advantages easily outweigh the disadvantages.
Advantages
Ease of access
No wires that cause tripping hazards
Allows devices such as iPods who cannot connect to the internet using an Ethernet
cable to access the internet
Multiple connections to the internet can be achieved at the same time without
spending time setting it up
Implementation is cheaper
Unreachable areas (across a river, mountains, rural areas) may still access internet
Easier to set up (ideal for temporary networks)
Disadvantages
Changing nature of work
Speed is lowered by a tiny bit
Networks can be interrupted [walls (blocking), microwave oven (interference), far
distance (attenuation)]
Less secure
More complex to configure
As you can see, it is a good trade-off between the advantages and disadvantages as you will
almost never encounter any of the disadvantages in the modern day.
3. With reference to Question 2, describe in detail the communication between your
Wireless laptop at home and the STHS intranet.
While using the STHS intranet with your wireless laptop within the school vicinity, the STHS
intranet will be acting as an intranet. However, if you are using the intranet from home,
which is outside the vicinity of the school, it will be acting an extranet. An intranet is
basically a private network that is maintained by an organisation and in this case, Sydney
Technical High School. An extranet is basically using an intranet outside the organisation.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 7/28
Bryan Ye, Mr Simmonds, Year 9 IPT 7
The Sydney Technical High School intranet has dedicated leased lines for traffic which
means that there will be high-speed
For a user to enter the STHS intranet, they will need to enter authentication details. These
details are given by the school to students, teachers and parents. Of course each of these
classes will have different authorities to the school network. If the credentials are incorrect
or invalid, an error message will pop up and say 401 – Unauthorized: Access is denied due to
invalid credentials. This means that you are forbidden to access the school network and that
you will either need to either reset your password because it has expired or ask the TSO
(Technical Support Officer) to help reset your password.
Error message if credentials are incorrect multiple times
Once you are inside the school intranet, you will be entering a VPN (Virtual Private
Network). A VPN is a network that requires a public telecommunication infrastructure andin STHS’ case, it’s the internet. The internet is used to communicate from the central
organizational network to clients that are connected to it. This network has a physical star
topology and a logical ring topology while using the intranet via the school vicinity but if you
are using the STHS intranet as an extranet, it will simply be a physical star topology. The
advantage of this is that people are able to connect to the STHS intranet and disconnect
without disturbing any of the other users.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 8/28
Bryan Ye, Mr Simmonds, Year 9 IPT 8
Relationship between clients and servers in a Virtual Private Network
TCP/IP (Transmission Control Protocol and Internet Protocol) is also extremely important to
using the extranet. If a user wants to receive files from the STHS intranet, these 2 protocols
are vital and they are automatically installed into the routing software of every router. TCP
(Transmission Control Protocol) is the main delivery system of transmission. A user would
first request a file such as a textbook from the school intranet. The school intranet would
use TCP as a delivery system to send the stream of bytes to the user. IP (Internet Protocol) is
then used to direct the stream of bytes that TCP are sending to the user using the IP Address
which is the address that every computer has. An IP address is typically a numerical label
applied to each computer and is a 32-bit number. They would typically look like this
172.16.254.1. In a physical form, TCP would be the delivery guy, IP would be a map and the
IP address would be the address located on the mail.
4. Communications have greatly changed the nature of the work place. In relation to
the following headings, briefly describe using examples on each as to how the
nature of work has changed.
a) Power and control
As technology is being introduced, power and control in the workplace has changed and will
continue to change. The way a worker communicates with his employer is one vast change
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 9/28
Bryan Ye, Mr Simmonds, Year 9 IPT 9
in the working community. In the past, to contact your employer you could not directly
contact the employer because that would mean physically walking into his/her room.
Having every employee physically walking into his/her room would hinder his work. The way
communication worked was the worker would give his message to someone who had more
privileges then him/her and then they would pass the message on so someone who had
more privileges than them and so on. This means if there was something personal, there
would be no privacy. In the current day, you can contact your employer by sending a private
message that they will respond to after an appropriate amount of time. The most common
way for this to occur is e-mailing.
b) Ethics
Ethics is a big issue as technology is advancing especially with the internet. The internet
gives us a wide choice of information and how you can obtain that information. Different
people will have different levels of access. It is common for humans to get greedy and want
to obtain that information when they don’t have access to it.
The internet is full of scams used to obtain money and details. Internet fraud comes in many
different forms. It is common for bots to send e-mails in attempt for an uninformed person’s
credit card or banking details. This is an extremely serious crime much like stealing except
that internet fraud is extremely common. This is one of the ways people can get
unauthorised access, by preying on people who are beginning to use the internet and
manipulating them.
Another ethical issue is piracy. This is also extremely common and serious. People can gain
software or media which costs money by simply downloading a crack or key generator.
Many people also commit piracy without knowing what they are doing. For example,
downloading a simple song is committing piracy.
While on the internet, people are inconsiderate and because it is almost untraceable and
that there are so many people abusing the loopholes in the internet, it cannot be dealt with
as of now. If someone was to physically steal a movie from a shop, they can be easily caught
but if there were hundreds of thousands of people stealing movies, it won’t be possible to
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 10/28
Bryan Ye, Mr Simmonds, Year 9 IPT 10
stop them. This is the case because of the high bandwidth.
c) Interpersonal relationships
When you hear relationships, you will typically think about face to face communication. This
may have been the only way of communication a few hundred years ago. This has been
changing through fax, telephones and finally we are at the information age where we have
instant messaging, e-mailing, calling, etc. In the past people would attempt to keep close by
face to face communication where they can interact freely.
The nature of this has changed as people have learnt that there is no need to preserve a
relationship by face to face communication and that you can easily keep a relationship from
a long distance. As technology has advanced, it has made it easier and easier for us to keep
up to date, communicate with relatives across the globe and ultimately has made face to
face communication more and more unneeded.
Instead of physically giving invitations for a party, you would text, e-mail, call or make a
status on a social networking website such as Facebook. Although for your everyday needs
these forms communications can satisfy your needs, it definitely is not a healthy way of
communication if it is repeated. Face to face communication and physical contact with
other humans is still needed because of how our minds work. It is also much harder to
interpret information online especially sarcasm or puns. This is because body language and
facial expressions are not included.
Businesses have also set themselves to other communication systems such as
teleconferencing. This brings in many advantages such as cost reduction with travel and
accommodation and the fact that it is easy to setup and schedule. It is also much easier to
communicate regularly with everybody. However, there are also disadvantages to this
information system as it is much harder to develop interpersonal relationships since you are
not physically present. Maintaining concentration during extended phone calls is also
extremely difficult and as listed before, body language and facial expressions are not
present.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 11/28
Bryan Ye, Mr Simmonds, Year 9 IPT 11
d) Work and employment issues
Communications has affected employment in many ways. In the past you would have to
physically show up to work and do your job as the cycle repeats. If you were sick, you could
skip work. In the modern day, it is easy to communicate and work from home meaning that
even if you were sick, you would still have to work. Because being able to work from home
is so easy, people who aren’t able to physically attend the workplace can work from home.
It is also much easier to monitor your employees to make sure that they are doing their
work. There is so much you can record and check for example, telephone calls, e-mails,
internet history. This may sound like a good idea at first where the employer can completely
see what the employer is doing so that he is doing the right but that is not the case. This can
easily lead to a violation of privacy and can also create bad relationships between the
worker and employer. The worker will also be under a lot of stress knowing that the
employer will know exactly what he is doing.
There is also a variety of different types of data in the information age. In the past you
would have to send a paper resume and physically go to an interview. IN the modern day
world you don’t have to. There is more data than just words; you could easily make a video
resume which contains a high amount of propaganda using special effects etc. to get
yourself a job without even having an interview.
e) Current and Emerging Trends in Communication
In the past everything was done by paper and recorded on paper. This is definitely not the
case in the modern day world. The trend of doing everything digitally is emerging. This is
evidently happening in Sydney Technical High School as books are being scrapped and
laptops are being introduced. Textbooks are even being scrapped and placed inside laptops.
This current trend can affect us in different ways. It is much easier to type than write every
letter on a paper and using OneNote to organise your work is much easier than using a
book. However, laptops definitely result in distraction and can also lead to poor eyesight.
Communication has lead us to go from writing, to pressing keys and finally to touching a
screen. Devices which have touch screens are becoming more and trendier as we speak.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 12/28
Bryan Ye, Mr Simmonds, Year 9 IPT 12
People of all ages are starting to use touch screens, especially teenagers. It is easy to say
that 80% of all teenagers have some sort of device with a multi touch system. These touch
screen devices also include other special features which are also emerging trends. iPhones
for example include a camera, wireless technology, music player and a phone system. It is
also a small device that can fit inside your pockets, which is also an emerging trend. Big old
telephones becoming small mobile phones are one example of this.
The way people acquire information has also changed. In the past libraries were much more
common than today. They were the resource to all information. Today all we need to do is
type something in a search engine and we would have what we need. Google, the most
popular search engine is the 3rd
most popular website in the World Wide Web.
Social networking is also an extremely popular hobby for teenagers as communications
using the internet has been introduced. There are hundreds of social networking websites
that people regularly use such as Facebook, twitter, blogger and formspring. The most
popular website in the world is Facebook which evidently shows that it is a current trend
although it is extremely recent. Facebook has climbed its popularity extremely quickly
5. Australians have the reputation of taking up new technology very quickly; the use
of Smartphones is one such example. Explain the technology behind that allows
Smartphones to carry out a multitude of functions.
Smartphones are a current and emerging trend in the information age. They are a high-end
mobile phone which has a high amount of features. It is also built on a mobile computing
platform which means that it includes features that mobiles and computers have. These
features include high resolution screen, internet browsing, portable media playing, digital
camera and a GPS navigation unit and other applications such as mail, weather, calendar
etc. One of the most significant features that a smartphone has and other phones don’t
have is a multi-touch system. They are also very popular because of their neat design and
their portability. Smartphones use more advanced mobile operating systems than regular
mobiles. Some common ones are Apple’s iOS, Google’s Android and Microsoft’s Windows
Mobile.
The high resolution of smartphones compared to other phones is one of the several
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 13/28
Bryan Ye, Mr Simmonds, Year 9 IPT 13
significant advantages that they have. One of the main reasons that a smartphone has high
resolution is because they have an LCD screen. LCD screens have a number of advantages
including reduced radiation, cost effective, energy efficient, lighter weight, fewer harmful
chemicals and most important of all, higher resolution. Because of their high resolution,
smartphones are allowed to have increased detail in videos and photos which is a huge
advantage for phones. Imagine watching a YouTube video on a regular old phone. It would
not be very pleasing. There is also a reduction in video noise when you watch a video. The
noise of a video can increase the file size and at the same time decreasing the quality which
is definitely something that you want. This also allows for the user to play games that
require good graphics without losing any of the quality. However, there are disadvantages
of having high resolution. The smartphone would need higher processing requirements and
larger disk requirements to hold all of the files that the phone can record or take.
Internet browsing is another feature that smartphones have. The technology behind
internet browsing is simply having a wireless adapter. A wireless adapter allows
smartphones to connect to a WAP (Wireless Access Point) of a router and access the
internet. Internet browsing is an extremely efficient feature especially in this current age
where social networking is the most popular hobby among young people. Internet browsingalso opens up many other advantages such as RSS feeds which allows you to keep up with
news or specifically, interesting news. You can also use the internet for researching which is
one of the most significant advantages of internet browsing. There is no need to physically
go to a library and borrow a book when you can simply touch the screen.
Portable media playing is another feature that all smartphones are capable of. There are
several technologies behind being able to carry this out for example, storage devices. A
smartphone would need a decent amount of storage to be able to hold all the songs as they
are around 5 megabytes each. Also, along with songs they must also be able to play videos,
store pictures and be able to include applications. Most smartphones will have around 20-
40 gigabytes to be able to hold the files. For example, Apple iPhones come in 16 gigabytes,
32 gigabytes and 64 gigabytes. A 40 gigabyte hard disk will generally allow you to play up to
160 hours of video, up to 10,000 songs and hundreds of thousands of pictures. The
operating system of a smartphone is also a significant factor for playing and viewing these
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 14/28
Bryan Ye, Mr Simmonds, Year 9 IPT 14
files. There are many different file types that can be played on smartphones. The main types
of files that are viewed and played on smartphones are typically wmv, jpeg, mpeg, mp3, avi
and dvr-ms. The operating system is the key to being able to play these files. It organises
and controls the hardware and software so that it is able to behave in a certain way which is
able to decode these files.
There is also a digital camera installed into each smartphone. It is a remarkable feature that
was not installed into compact devices until recently. Digital cameras, like CDs, DVDs, MP3s
and other electronics are built around changing analogue data into digital data. Digital
cameras focus the light from what is in front of it onto a semiconductor and creates a digital
image. The digital image is then saved onto the hard disk that is inside the digital camera.
Digital cameras are much better and work differently than their predecessor, conventional
cameras. Conventional cameras depend entirely on mechanical and chemical processes and
have no connection with digital data, not even electricity. They also store data differently
from digital data. There is also a great improvement in megapixels from conventional
cameras into digital cameras.
A GPS (Global Position System) navigational device is a useful tool that is installed into
smartphones. It is able to pinpoint the location of where you are on the Earth from
anywhere on the Earth. The main technology that a GPS uses is the 27 satellites that orbit
the Earth. These satellites are extremely significant to the GPS and without them there
would be no that they could operate. 24 satellites are always operating and there are 3
extra satellites in case of a failure. These satellites were made by the military but were soon
opened up for everybody else. The GPS is a simple device that acts using a mathematical
technique used in geometry called trilateration. It basically locates four or more of the
satellites and then measures the distance from you to each of the satellites. However, it is
common for up to 8 satellites to be within range of the GPS at any time. It calculates the
distance by measuring the time it takes for each signal to reach the device. This is only able
to be calculated because the satellites send signals at constant speed.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 15/28
Bryan Ye, Mr Simmonds, Year 9 IPT 15
Smartphones are also able to install third party software called applications. These
applications can be used for many different reasons such as entertainment, business or
personal benefits. There are many applications that can be downloaded and installed by
the user in each of these categories. Such as for entertainment there would be games,
for business there would be stocks and for personal benefit there could be a converter.
6. Other than E-mail and Social networking applications, discuss how other
applications/appliances have changed the way we communicate socially and
conduct business?
E-mails have been a great new trend in the 21st
century ever since they were introduced along with
other social networking applications such as Windows Live Messenger. However, these are not the
only communications technologies that have affected our lives greatly. There has been a great deal
of different communications ranging from Fax all the way to E-commerce that has made our life
easier and faster. Not only have these communications affected our personal social lives but it has
also affected the way businesses are conducted.
Fax (short for facsimile) is an extremely old way of communication that was invented in 1843 and is
still used in the modern day although not as much. Fax is a quick and efficient way to send scanned
text and images via PSTN. Fax works by scanning a printed document, converting it into a bitmap file
and sends it via PSTN using a telephone number which is connected to an output device as electrical
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 16/28
Bryan Ye, Mr Simmonds, Year 9 IPT 16
signals. The recipient’s fax machine then prints a paper copy. Fax has changed businesses in many
ways. Imagine running a business but being unable to send any documents to your client. Fax saves
enormous amounts of times in the business and allows them to be more flexible with their time and
costs. As an addition to Fax’s utilities, the recipient also is not required to do any work except. This
saves a lot of time as you can imagine walking to a collection box or being physically handed the
paperwork instead of having the paper come out of a machine. Fax has also gained more utilities
when internet fax was invented. These advantages include unneeded hardware and software, no
extra telephone line, paperless communication, simultaneous sending and receiving, reduction in
phone costs and the ability to send faxes from anywhere with internet connection. As you can see,
these advantages show a clear advantage in cutting costs and a decent advantage in utilities.
Telephones have changed our lives socially and in the business. Keeping in touch with friends and
colleagues have been much easier ever since telephone has been introduced. The requirement of
physical contact to keep in touch was discarded ever since telephones came out. It is not easy to
keep in touch with your friends simply by calling them over the phone. This full duplex
communication system has also affected business in many ways. New ways of business are opened
such as advertising via telemarketing and calling up clients for work (such as architects). Telephones
also bring in a half-duplex form of communication that is used around the workplace called voice
mail. This is used because full duplex communication while in the work place is very distracting. Fax
would be used for this purpose in the past but tone could not be provided via fax. This is why voice
mail has a clear advantage over fax. Telephones then introduced mobile phones, a smaller version of
a telephone that you could fit in your pocket. This is an extremely versatile that can be used for
many different purposes in the modern day. They include many utilities such as camera, multi-touch,
voice-mail, text, wireless internet and calling.
E-commerce has also been opened up as technology has progressed where we are moving to the
stage where everywhere you go to shop you will be paying electronically. Internet shopping has also
been created by E-commerce. There are various applications used for Internet shopping such as
EFTPOS (Electronic funds transfer at point of sales) and PayPal. Other utilities that are not for
internet shopping include credit cards and debit cards. These applications and utilities have made
shopping much easier as there is no need to carry out high amounts of cash when you can simply
keep it in a virtual account or a card. Transactions are also much faster because there is no need to
count cash and transferring money is also much easier as you can transfer billions of dollars in a few
seconds. Although this makes business much easier, it has also made people more wary of security
and how important it is. This is because these electronic appliances have created hackers who greed
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 17/28
Bryan Ye, Mr Simmonds, Year 9 IPT 17
from people who are uninformed and attempt to get their banking details. There are also
disadvantages to internet shopping such as vegetables and clothes not being in their physical form
for you to see. This can be a problem if you get a bag of tomatoes that have a few rotten or clothes
that do not fit you. Internet shopping has also opened up new ways for businesses to run. For
example, a game company can create virtual cash that you can buy via PayPal using real cash and a
more common phenomenon, companies selling their products online.
As you can see, communications has changed the way we communicate socially and the way we
conduct business in many different ways. It has become much easier to socialize as time has
progressed going from physical communication to fax, to telephones, to e-mails and so on. Multi-
touch devices that have been introduced are also quite popular with people of all ages because they
are easy to use and have many great utilities. Businesses are also are more relief because
communicating with each other during work could never be easier and when it couldn’t have been
better, more business options have been opened.
7. Encryption is often used when transferring data to keep it secure, explain how the
encryption process is carried out.
The internet has opened up many communication channels in a new era with a new world.
These communication channels let us communicate with people who we do not know all
and also open up transmission channels where we can send and receive data to anyone and
from anyone. Because people can easily tamper what happens before, during and after
transmission, security systems must be introduced. Hiding your information is definitely not
enough in this world and nor was passwords. This is why encryption was introduced, a new
way to protect data and information. Encryption is the physical version of coding all your
work and giving the code to the receiver so that he can decode it. It can benefit you in many
ways such as if confidential files are stolen during transmission, the information cannot be
decoded and will be completely useless. Only the receiver, who is able to decode the files is
able to make use of the encrypted file. There are typically two types of encryption:
Symmetric key encryption (private)
Asymmetric key encryption (public)
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 18/28
Bryan Ye, Mr Simmonds, Year 9 IPT 18
Symmetric key encryption, as stated above is a private way of encryption where only the
sender and receiver know the code and are able to decode it. It generally means that the
same key is used for encrypting and decrypting the data. The first symmetric key encryption
was DES (Data Encryption Standard) which featured a 56-bit key. This was eventually
scrapped as it is much too weak for modern day standards when the Electronic Frontier
Foundation publicly broke the key in 22 hours and 15 minutes. This was then succeeded by
AES (Advanced Encryption Standard) which is able to feature a 256-bit key. This is the
current encryption method used worldwide as of 2011.
Private key encryption
Unlike symmetric key encryption which uses the same key for both encrypting and
decrypting, asymmetric key encryption has 2 keys that are used for encryption and
decryption, a public key and a private key. A public key is published to everyone who has a
secure connection with the transmission of the file and a private key is only known by the
receiver.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 19/28
Bryan Ye, Mr Simmonds, Year 9 IPT 19
Public key encryption
8. Outline the roles of a Network Administrator of a company for a computer
Network consisting of a file server, a proxy server, 120 workstations and 900
users, and is part of WAN of 100 similar companies.
Network administrators are extremely important within a network. They are the physical
equivalent of a government within a network. Without one, everything would be jumbled
up and all over the place. They are responsible for many things such as maintenance of the
hardware and software which would mean that they must have knowledge on how to install
and fix all types of hardware and software including routers, switches and hubs. Along with
this, they are also responsible for monitoring and providing help to users and clients by
controlling privileges and taking care of the network in general. Because they have to take
care of the network, it is compulsory to be able to keep up with technology.
A network administrator has the highest access rights in a network. They have complete
control of everything which means that the job of a network administrator is very tough.
They must be trustworthy enough to be able to gain these privileges and have a high
amount of work to do. One of the main tasks of a network administrator is to manage the
users. In this case, there are 900 users in this network. They must add and remove users
from the network and give different privileges to the users depending on the type of group
that they belong in. In every network there will be different classes of people with different
privileges such as in the Sydney Technical High School network, students, parents and
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 20/28
Bryan Ye, Mr Simmonds, Year 9 IPT 20
teachers are all assigned different privileges. People will be placed into different groups and
will be assigned these privileges by the operating system’s ACL (Access Control List). These
privileges will include such authorisations such as:
Read – Users are able to read the content of files and be able to see the directory
contents
Write – Users are able to change the content of files in 4 ways; adding, creating,
deleting or renaming.
Execute – Users are able to run programs and access them
Authentication details will then need to be assigned to the users where they will be able to
change their passwords at their will. These accounts have a personal profile that is saved
onto the server. There must also be other small things to consider for example, if a user is
removed from the network, their account must be terminated. Also, if a user’s account has
reached a certain time of inactivity their password will either need to be reset or their
account will be terminated.
The 120 workstations must also be managed by the network administrator. The network
administrator must be able to ensure that each of the 120 workstations are ready to use.This may sound like an easy task but in reality it is difficult. Each of the workstations must
have a specific operating system so that if there is a problem with one of them, the problem
can be recorded and fixed. Each of the workstations must also have a security system which
will most likely include a virus scanner and a firewall which is reliable. If the security is
unreliable, the workstations could be hacked and personal information can be taken from
the users. Internet must also be ensured to all of the workstations if necessary which means
connecting each of them to a router and setting up switches. The network administrator
must also license appropriate software for each of the workstations which is taking in a high
amount of responsibility as well as considering finance.
This brings the network administrators to be able to manage the WAN (Wide Area
Network). The network administrator must ensure that their network is connected to the
WAN of the other 100 networks and the internet. The only way to communicate with the
100 other networks is via the internet. The internet is also required for the users to be able
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 21/28
Bryan Ye, Mr Simmonds, Year 9 IPT 21
to use the workstations more efficiently and productively. To be able to do this, a suitable
router that is able to connect 120 workstations and is able to connect to 100 other routers
in the same WAN must be installed. This means that he must choose a suitable price and
capability of a router and connect to the 120 workstations. The network administrator must
also set up switches to enable the internet usually via Ethernet. As stated before, security is
an important issue for workstations. It is also an important issue for the router. The router
will need to be able to fend of malicious content and stop unwanted clients from accessing
the router. There are 3 protocols that can be used for this, WEP, WPA or WPA2 as stated in
question 2. The WPA2 will be used in the modern day world because it is more efficient with
encryption. Filters and censors should also be placed onto the router so that the users are
unable to access websites that are not suitable for work or contain malicious content
(Blocked sites in STHS).
The file server must also be managed by the network administrator. This means that he
must keep it safe and working at all times which means protecting it from malicious content,
preventing data collisions etc. The file server must have security on it at all times as it has
lots of confidential information which the users may need in the present or future. This also
means that the file server must be scanned regularly so ensure that nothing malicious hasentered. Data collisions must also be managed. Typically CSMA/CD (Carrier Sense Multiple
Access with Collision Detection) should be managed and checked regularly. A regular backup
with the file server should also be done in preparation of the worst.
Keeping up with technology is another thing that the network administrator must do. If
there is a virus outbreak then he must be there to ensure that the file server is not affected.
The 120 workstations should be upgraded every few years so that the system performance
does not drop drastically and that they are kept up to date. He must also ensure that the
operating systems of these workstations are being updated regularly by monitoring them.
9. The Client-server architecture is used on most networks. With the aid of two
examples explain why this type of architecture is so important.
Client-server architecture is exactly what it literally says. It is the relationship between a
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 22/28
Bryan Ye, Mr Simmonds, Year 9 IPT 22
client and a server. The server is usually a large network and the client is usually a personal
computer but not limited to this. A computer can easily act as a server although it is not as
reliable to a large network. The server provides processing resources and services to the
clients. For example, a web server retrieves and transmits web pages and clients receive it
(browsing the internet).
There are many types of types of servers, web servers, file servers, mail servers which each
carry out a specific role on the internet but there are only 2 types of clients; fat clients and
thin clients. Fat clients are clients that are able to process data, request information, run
applications etc. by themselves as thin clients rely heavily on the server to fulfil what a fat
client can do independently.
A client-server relationship is extremely common in the modern day and is the most used
type of network currently used. As said before, a computer can be either a client or a server.
On the internet, a personal computer will most likely be a client. The reason for this is
because a server needs to be extremely strong and expensive for it to be able to receive
information and transmit information simultaneously to many different clients. The
relationship on the internet between personal computers and servers (web servers and file
servers particularly) are where personal computers can upload onto a server. A server hosts
and stores the files and processes requests by other clients and transmits data to them. An
example of this is where a client wants to share data with other clients whom they are only
connected to via the internet. Because of a personal computer’s slow speeds, it is much
faster to upload the data to a server and let the recipient download it then send it directly. A
client would upload their data onto a file server and the recipient (other client) will then
visit the server using a URL (Universal Resource Locater) and download the file.
Client-server architecture is extremely important for speed and security. Although a server
costs much more than a personal computer, it has many more benefits as a central node of
transmission. A server has much more security of the files and will prevent unauthorised
access but a personal computer has a high risk of unauthorised access, lower speeds and
lack of security. If a client-server relationship did not exist, files would be transferred from a
fat-client to another fat-client which would result in extremely slow speeds. Backing up and
error checking is also much easier because all the files are stored in one place. If a personal
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 23/28
Bryan Ye, Mr Simmonds, Year 9 IPT 23
computer was to be the server, the files would be very messy and unorganised.
The relationship between a server to a client
10. Explain the operation of a packet switching network? Give an example where
packet switching is used.
A packet switching network is a network that is able to split data upon transmission into
more suitable sized blocks called “packets”. These packets are generally small and easy to
manage as they are around 1000 bytes. The purpose of packet switching is to make
transmission more efficient by allowing simultaneous and fast transmission as well as
reducing the amount of errors occurring. It was also made to utilize the channel capacity of
a network more efficiently to reduce the latency.
The software for packet switching first divides the data into a reasonable amount of blocks
and assigns an envelope which includes the destination and the instructions of how the file
will be put back together at the end of the transmission. The file then goes off to
transmission as the network places the little packets into different paths which all reach the
same destination. These paths are decided on depending on the channel capacity of each
path. At the end of the path, the envelope will be read by the routing software and put back
together into the large file that was intended to be received regardless of the order they
were sent in. This is an extremely useful technique because if an error had occurred, one
single packet would simply need to be resent but if you were downloading a large file and
an error had occurred, the whole file would have been needed to be resent which is an
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 24/28
Bryan Ye, Mr Simmonds, Year 9 IPT 24
extreme disadvantage especially if you have slow internet.
An example of where packet switching is used is when a student is attempting to download
a textbook from the Sydney Technical High School website. The student would first request
the HTML webpage and will be asked for authentication details. After authentication details
are entered, the student locates the resource where the textbook is found and attempt to
download it. The textbook will go through Sydney Technical High School’s routing software
and be divided into a reasonable amount of packets upon transmission. The routing
software will then place an envelope on each of the packets in order for the student’s
routing software to understand how to put it back together. The file will then be
transmitted to the student via the internet with a little help from the TCP (Transmission
Control Protocol) protocol acting as a delivery system. The packets will then go through an
error checking system of either parity, checksum or CRC (Cyclic Redundancy Check). If they
contain no errors the packets will then move on to the next step. If there are errors then
one of the packets will be resent. The routing software from the student will then put the
packets into one big file in advance to sending it to the student. The IP (Internet Protocol)
protocol then directs the file to the student.
Packet switching is an extremely useful technology that has changed the way files are
transmitted by making it faster and more efficient. It is the modern way that files are
transmitted and current provides satisfaction to users.
11. Evaluate the different forms of broadband Internet connection (ISDN, ADSL,
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 25/28
Bryan Ye, Mr Simmonds, Year 9 IPT 25
ADSL2 and Cable) for use in a small online business of eight employees.
A small business online of eight employees, as for any business online will require stable
broadband connection will instantly rules out dial-up. The internet must be able to upload
and download significant amounts of data but do not need to be too intensive to download
100s of gigabytes. The four different types of broadband connection which can be used for a
small online business are ISDN (Integrated Services Digital Network), ADSL (Asymmetric
Digital Subscriber Line), ADSL 2 (Asymmetric Digital Subscriber Line 2) and Cable. They are
all unique and have their ups and downs.
ISDN is one of the first types of broadband made. It was defined in 1988 and is now
currently out-dated. ISDN is a type of broadband that connects to the internet via PSTN and
sends digital transmission signals of various types of data over PSTN. It is a symmetrical type
of network which means that download speeds and upload speeds are very similar. This is
particularly useful for businesses that need to transmit data to their clients. When it was
created, the world was currently using analogue modems (dial-up) instead of digital
modems which were much slower. ISDN would be permanently connected to the network
while other analogue modems would need to dial up to connect to the internet. This made
ISDN the more efficient network by far. However, it was also must more expensive. At the
time, your everyday home would not have ISDN because it would be too much to afford and
the internet did not have many users or data at the time because of the unreliable speeds of
analogue modems. Along with speed and utility, ISDN would also offer extra features such
as being able to be on the phone and on the internet at the same time which analogue
modems could just not. As you can see, with all the efficiency of ISDN, the features would
have definitely been needed during the 1980s to the 2000s but in the modern day, there are
much better choices than ISDN.
ADSL is an asymmetric network which means that the upload speeds and download speeds
differ greatly. The download speeds of ADSL can go up to 256kb/s but the upload speeds of
ADSL can only go up to 64kb/s. As you can see, this is a huge difference which makes it
optimal for personal use but for businesses it is extremely situational. ADSL uses a copper
wire to transmit their data which is digital and do not convert them into analogue signals.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 26/28
Bryan Ye, Mr Simmonds, Year 9 IPT 26
The hardware and software for ADSL is very vital. An ADSL modem and an ADSL filter would
be needed and there would be device drivers and routing software to make ADSL work. It is
also recommended to have software that will protect you (Firewall, virus scanner) from
malicious files.
ADSL’s speeds are the extremely fast compared to ISDN. This is probably one of the main
advantages that ADSL have over ISDN. ADSL also shares many of the features that ISDN
already have such as being able to use the phone and internet at the same time which is an
extremely vital part of a business. Imagine running a business and not being able to use the
phone and internet at the same time. It would be very on and off and will ultimately fail.
ADSL is also always on meaning that you will not have to dial up every time you want to use
the internet which could take a lot of time. As stated before, ADSL is situational for
businesses because of the difference in upload and download speeds. Another reason for
this is because of location. The business would need to be very close to an ADSL exchange to
maximize their potential especially if there are 8 employees all using the same internet.
ADSL also provides a high amount of utility to the users. The reason for this is because you
can simultaneously access the net as long as you are connected to the same copper
telephone line. It is also generally easy to set up and fix if there are any problems. This may
not sound like a big deal but having the internet fixed as soon as there are problems is
surprisingly vital. If a business must shut down for a week or two, it would affect the
businesses income and reputation greatly especially because they are only a small business,
people may forget about them and never visit them again. ADSL is recommended for
businesses that are close to ADSL exchanges and do not require a high amount of upload
speed, optimal for a small business because if there are 8 employees, there would most
likely be a low amount of items that are needed to be uploaded.
After ADSL, another type of broadband was introduced which succeeded ADSL with its extra
features and boosts, ADSL2. ADSL2 has all of ADSL’s features but more. There are many
different improvements such as a higher range of capability over long distances. This is a
huge disadvantage to DSL if they are not close to the ADSL exchange but luckily ADSL2 has
almost fixed this problem. Some of the other features that it provides are improvements in
data rate, dynamic data rate adaption, stronger resistance to noise, diagnostics (very useful
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 27/28
Bryan Ye, Mr Simmonds, Year 9 IPT 27
to users who are new) and a stand-by mode to save power. It has also reduced the start-up
time from ADSL’s 10 seconds to less than 3 seconds. It also adds support for new
applications and services.
Unlike the other types of broadband, Cable is a broadband internet connection which does
not use a copper telephone line but uses a coaxial cable. These cables deliver data to the
user the same way it delivers data to a TV. The peak speeds of cable are unrealistically fast
and go up to 50 megabits/s (not to be confused with megabytes) for downloading and 20
megabits/s for uploading. These speeds will definitely benefit a large business but for a
small business of 8 people, they will not need high speeds like this. However, cable
networks have extreme disadvantage. The more people that are using the network, the
slower the internet will be.
Cable network will most likely never be at its maximum performance during work hours
because it is a shared network and is shared with other users among the same network. This
will definitely happen during work hours or as they say, peak hours where people will all be
using the internet at once meaning that it will be a great disadvantage for the business.
Another big disadvantage for this network is the high installation cost which of the small
business of 8 people will most likely be unwilling to pay for the small amount of features
that they will be receiving.
In conclusion, I recommend ADSL2 for this small business for a number of reasons. First of
all, in terms of speed ADSL2 will satisfy their needs pretty well as well as giving them some
extra space. The extra speed from a Cable network which is ultimately unreliable is not
needed because they are only just beginning and they will not be transmitting or receiving a
high amount of data. Features are also another reason. ADSL2 contains all the features that
ISDN and ADSL has as well as more features such as power saving. The only vital features
that this business needs are pretty much being able to use the phone and internet at the
same time. The third and final reasons are because it is extremely cost efficient. It is cheap
to install and manage as well as easy and cheap to fix. Additionally, using the extra money to
buy a Cable network for nothing more that they need is irrelevant. ADSL2 is a reliable, fast
and efficient network for a small online business of 8 employees and will satisfy them.
8/2/2019 Bryan Ye, Year 9 IPT, Mr Simmonds, 2011 Communications Assessment Task
http://slidepdf.com/reader/full/bryan-ye-year-9-ipt-mr-simmonds-2011-communications-assessment-task 28/28
Bibliography
Books
Samuel Davis, 2007, Information Process and Technology, Parramatta Education Centre Pty.
Ltd PO Box 26, Douglas Park NSW 2569
Websites
http://www.google.com/
http://www.google.com/imghp?hl=en&tab=wi
http://www.wikipedia.org/
http://www.howstuffworks.com/
http://www.wisegeek.com
http://www.webdevelopersnotes.com
http://www.tcpipguide.com
http://reviews.cnet.com
http://compnetworking.about.com
http://broadband.gov