0% found this document useful (0 votes)
41 views4 pages

IPT Lesson

This document discusses communication systems and protocols used for online payment systems. It describes how parents can make online fee payments to a school through a website, receiving an electronic receipt. The school administrator can generate reports from the system about paid and unpaid fees. The document then examines the communication protocols and levels involved in transferring data from the parent's device to the school's server, including TCP, IP, HTTP, and SSL. It defines the roles of IP addresses and MAC addresses and discusses error detection methods like parity checking and cyclic redundancy checks.

Uploaded by

Saad Kashif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views4 pages

IPT Lesson

This document discusses communication systems and protocols used for online payment systems. It describes how parents can make online fee payments to a school through a website, receiving an electronic receipt. The school administrator can generate reports from the system about paid and unpaid fees. The document then examines the communication protocols and levels involved in transferring data from the parent's device to the school's server, including TCP, IP, HTTP, and SSL. It defines the roles of IP addresses and MAC addresses and discusses error detection methods like parity checking and cyclic redundancy checks.

Uploaded by

Saad Kashif
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

1/5 Characteristics

Question 1.
Messaging systems can be regarded as communication systems. The framework, in which these
communication systems function, is demonstrated by the following model.

Question 2. (Q22-2010)
A local high school has introduced an internet-based online payment system for
school fees. Parents can make online payments to pay the fees and receive an
electronic receipt which includes the date of payment, fees paid and the student’s
name and ID. The school administrator is able to produce reports from the system to
list those students whose parents have paid fees, and when those payments were
made. Lists can also be produced to show those students whose parents have not
paid fees to date.
The following diagram describes the communication system.

Answers
Application Level
The parents of the local high school can logon to the website of the school or they can use their
online banking website to make payments. The parents use the web browser and HTTP request
for the school/bank’s web page. The website is displayed using the HTTPs and SSL secure
protocol to protect credit card and personal details during transmission.
Communication control and addressing level
The payment request from the parent is converted and divided by the TCP/IP protocol; into
packets/frames: containing sender/receiver address, packet number and various other
protocols. The packets take different available routes to its destination- the school’s web
server/computer. Switches use the MAC address of the packets to direct it to its destination.
Routers determine the best path for each packet.
Transmission Level
The packets are converted to the suitable media protocol (twisted pair, WAP, coaxial, fiber
optic). The frames/packets finally are reassembled in the correct order at the school server. The
school administrator launched the browser that formats and displays its content on the client
computer.

Communication Systems Page 1 of 4


1/5 Characteristics
Question 3. (Video :Home networking)
For each of the following communication systems identify the source, destination,
medium and protocols.

Delivering a message Sensing a SMS via a Ordering a pizza via


via a home cell phone(mobile) the Internet
phone(line)

source

destination

medium

Protocols

Research (Resource PowerCert Domain 2.50)


Question 4.
Describe the purpose the following communication protocols for this communication
system

a. TCP protocol
TCP is the protocols responsible for the transmission of most data
across the Internet. TCP ensures messages sent from the parents are
delivered correctly to the school’s web server.
_______________________________________________________________________

b. IP
Internet Protocol is the method used by which data from the parent is divided
into packets and send across the Internet using a unique address identifier
called the IP address.

c. FTP protocol
File Transfer Protocol. A protocol used to enable the client computer (the
parent) to log on to the server.
_______________________________________________________________________

d. SSL
SSL (Secure Sockets Layer) is the standard security protocol for establishing
an encrypted link between a web server and a browser. This link ensures that
all data such as parent payment information passed between the school web
server and browsers of the parents remain private and secure.
e. SMTP protocol
SMTP is short for Simple Mail Transfer Protocol and it is used to transfer e-
mail messages between the parents computers and the administrator of the
school

Communication Systems Page 2 of 4


1/5 Characteristics
f. HTTP protocol

HTTP is used by web browsers to communicate and retrieve web pages


from servers. The parents as the client PC will use HTTP to retrieve the
school’s webpage form the school’s server. This is an example of a
client-server connection.
_______________________________________________________________________
g. HTTPS
HTTPS is a protocol to transfer encrypted data over the Web.
_______________________________________________________________________
Question 5. Explain the difference between an IP Address and a MAC Address
An IP address is used by switches and is software based. It is used to determine
the destination of a message. MAC addresses are used by routers and is
hardwired into each device on the network, to determine the best path of a
message to its destination.

Question 6.
Discuss the necessity for protocols for communication systems.
Protocols define how information is transmitted and how the errors
are detected. Two computers must use the same protocols when they
are communicating; otherwise, the data transfer may be unsuccessful.
_______________________________________________________________________

Question 7.
What is a ‘handshake’? Why is it important in electronic communications?
Handshaking is an agreement about which protocol to use to accomplish
the exchange of information. Handshaking is needed between devices as
they may have different capabilities and may transfer data in different
ways.

Question 8.
What is bandwidth and why is it important in electronic communications?
The bandwidth is the capacity of the channel, or transmission
medium. A transmission medium with a high bandwidth can transfer
more data.
_______________________________________________________________________

Question 9.
Distinguish between bit rate (bits per second) and baud rate.
Bit rate (bps) is the maximum number of bits that can be transmitted in
one second. Baud rate is the maximum number of data symbols or
electrical signals that can be transmitted in one second.
_______________________________________________________________________
Methods of error checking
The 7-bit ASCII character 10111011 is to be sent with a parity bit.
Question 10. What is the value of the parity bit if the parity is even?
________________
h. The character was received with the ASCII character of 1010001. Do you think the
parity method or error detection would have found the error in transmission? Justify your
answer.

Communication Systems Page 3 of 4


1/5 Characteristics
The character was received with the ASCII character of 1010001. Do you think
the parity method or error detection would have found the error in
transmission? Justify your answer.
Parity checking would not have detected the error as there are two
errors in the received character, and this result in the expected even
parity.
_______________________________________________________________________
Question 11.
If parity has been set to odd, has the following frame been sent without error: 01001110?
The parity bit has been sent as even. (4 bits of 1s) The frame has been
sent with an error, the parity should have been set as 1
_______________________________________________________________________
Question 12.
Cyclic redundancy checking (CRC) is an error checking method used when transferring
files.
i. Explain how CRC works in the scenario of question 2
Cyclic redundancy check (CRC) is a method of checking for errors in data
transmission using a division process. The payment data send by the
parent is divided into predetermined lengths and divided by a fixed divisor.
The remainder of the calculation is attached and sent with the data. When
the data is received by the school administrator, the remainder is
recalculated. If the remainders do not match, an error in transmission has
occurred.
_______________________________________________________________________
j. Describe another method
Checksum is a method of checking for errors in data transmission by
counting the number of bits in a data packet. A data packet is created by
dividing the total data into smaller groups. The count of the bits in a data
packet is attached to the data packet. It is used by the receiver to check
whether all the bits have arrived successfully. If the count matches, it is
assumed that a complete transmission was received.
_______________________________________________________________________
Question 13.
Describe the advantages and disadvantages of a
Client-server architecture
ADV;
 Reduces the processing load on the clients.
 Data can be made secure from the server.
 Easier to backup files from one location(server)
 Easier to add new resources: PDA’s and IPhones
DISADV:
- If server is down the whole network is affected.
- Can become congested and overloaded with client requests

Communication Systems Page 4 of 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy