2. Scenario
Global Conferences is a company that allows delegates from around the world to meet in a
secure digital conference room to discuss climate change. The facility offers real time video and
audio feeds and allows control of the discussion by a moderator. One of the features of this
facility is the translation software that can translate audio into any language. The servers are
held in Adelaide, South Australia and can have a maximum of 50 people attending a session.
3. a. (i)
Suggest the most appropriate communication medium to connect the Global Conference router
to the Internet, and justify your answer.
4. a. (i)
Suggest the most appropriate communication medium to connect the Global Conference router
to the Internet, and justify your answer.
Using a fibre optic connection will allow Global Conference to have a speeds of over 15Tbits/s
giving a large bandwidth to carry video, audio and data streams simultaneously.
5. b. Describe the limitations of the following transmission media and justify why Global
Conferences should not use them to make connections to delegates.
(i) Blue Tooth:
(ii) WiFi:
6. b. Describe the limitations of the following transmission media and justify why Global
Conferences should not use them to make connections to delegates.
(i) Blue Tooth:
Limited range and will require all delegates to be within 10m of the paired device. This will limit
the number of delegates and require all participants to come to the business.
(ii) WiFi:
Shared bandwidth that can not be load shared with multiple delegates connecting to the WiFi
access point. WiFi can not be limited to a room and could have potential hackers outside of the
building.
7. c. Identify and explain two factors that may cause high latency between the delegates.
8. c. Identify and explain two factors that may cause high latency between the delegates.
(i) Connection load between routers on the internet causing the packets to be routed over
extended paths. The packets can be disregarded under UDP protocols in video conferencing
when arriving outside the required processing time.
(ii) The client hardware and server infrastructure may not be optimised for video conferencing.
Global Conferences would not have control over client infrastructure.
9. d. Global Conferences offers secured transmission between delegates. Identify and explain one
method of making the data secure while it travels through the Internet.
Method:
Explanation:
10. d. Global Conferences offers secured transmission between delegates. Identify and explain one
method of making the data secure while it travels through the Internet.
Method: sHTTP protocol
Explanation: Using a Public and Private key system under the sHTTP protocol will ensure
encrypted data transfer between Global Conferences and delegates.
11. (i) Draw and label a diagram of the possible configuration of Global Conferences office network
that allows the computers to share devices and connect the boss to an interviewee in
Queensland.
12. (i) Draw and label a diagram of the possible configuration of Global Conferences office network
that allows the computers to share devices and connect the boss to an interviewee in
Queensland.
13. (ii) Describe the function of the following devices in Global Conferences office network.
Router:
Wireless access point:
14. (ii) Describe the function of the following devices in Global Conferences office network.
Router: The router connects Global Conferences to the internet by taking the packets sent from
the ISP on 23.3.61.4 range and moving them to an internal IP address such as 192.168.0.1
Wireless access point: Allows wireless devices to connect to the network and be given an IP
address to allow TCP/IP data transfer. This functionality allows clients to bring their own laptops
to Global Conferences to conduct interviews.
15. (iii) Identify and outline the role of two protocols that are necessary for the interviewee to
transfer a resume to the interviewing boss.
(i) Protocol: FTP (File Transfer Protocol)
Key role: This protocol is used by the application layer to enable a file to be transported across
the internet and ensure the integrity of the resume when all packets are received and passed
through the application layer for the boss to view.
(ii) Protocol: TCP/IP (Transmission Control Protocol/Internet Protocol)
Key role: Used by the transport layer of the OSI model to break the FTP protocol into packets to
be sent through the Local Area Network and potentially over the internet or WAN.
16. f. Explain the function of the Network Operating System (NOS) when accessing confidential
presentations on the Global Conferences network.
17. f. Explain the function of the Network Operating System (NOS) when accessing confidential
presentations on the Global Conferences network.
The NOS governs user permissions to access files and resources on the Global Conferences
network.
The NOS provides name and directory services to print, web services, back-up and replication
services.
User management and support for logon and logoff, remote access, system management,
administration and auditing tools with graphical interfaces.
The NOS will stop unauthorised users from accessing confidential presentation and close
connections to services if the user is inactive.