| | |
> | An explanation of data integrity will include; |
| a) | Causes of errors on transmission media: |
| - | attenuation and distortion |
| - | methods of improving line quality |
|
| b) | Error detection/correction: |
| - | error detection methods including parity, block sum check (BCC) and cyclic redundancy check (CRC) |
| - | error correction methods including Forward Error Control (FEC); |
| | (eg. Hamming, and backward error control, including echo and Automatic Repeat Request (ARQ)) |
|
> | An explanation of security will include: |
| - | data encryption methods; e.g. Data Encryption Standard (DES) |
| | - multi-user system dial-back |
| | - security e.g. 128 bit |
|
> | Data compression methods will include Huffman coding and current modem techniques; eg. V.42bis and MNP. |
|
> | Investigation of these techniques will require monitoring network activity, identification of potential problems, including complete loss of the network, and documenting procedures for recovering a networked system. |
|
| | |
> | Typical public data network protocols will include the following higher level data link control (HDLC) methods; LAPB and LAPD associated with X.25 (PSN), Frame Relay systems and ISDN. |
|
> | Data link control protocol details will include; frame formats, transparency, error handling and retransmissions, implementation details and frame analysis. |
|
> | Network layer protocol details will include; packet formats, routing methods, implementation details and packet analysis. |
|
> | Investigation of the layered architecture of ATM, will include the lower layers unique to this high-speed transport technology.
|