[go: up one dir, main page]

0% found this document useful (0 votes)
94 views74 pages

Computer Networking Essentials

The document discusses several key hardware components that support computer networking and the internet: 1. Network interface cards (NICs) allow computers to connect to networks by providing a dedicated network port. 2. Hubs connect multiple computers and allow them to share data packets, but do not examine packets. 3. Switches improve network performance over hubs by examining destination addresses and making direct connections between machines to reduce data collisions. 4. Routers intelligently direct data packets between networks by maintaining a table of network paths and their congestion levels to choose the fastest route. 5. Repeaters are used to join cable segments and boost weakening signals over long cable runs.

Uploaded by

Ilesh Dinya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views74 pages

Computer Networking Essentials

The document discusses several key hardware components that support computer networking and the internet: 1. Network interface cards (NICs) allow computers to connect to networks by providing a dedicated network port. 2. Hubs connect multiple computers and allow them to share data packets, but do not examine packets. 3. Switches improve network performance over hubs by examining destination addresses and making direct connections between machines to reduce data collisions. 4. Routers intelligently direct data packets between networks by maintaining a table of network paths and their congestion levels to choose the fastest route. 5. Repeaters are used to join cable segments and boost weakening signals over long cable runs.

Uploaded by

Ilesh Dinya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

1.2.

1 Networks
Describe the purpose and Benefits of networking computers and Devices rather
than using a number of stand-alone computers.
Describe the Drawbacks of networking computers and Devices rather than using a
number of stand-alone computers.

List the hardware needed for a network

List the software needed for a network

List the service needed for internet

(1) Explain the client-server model of networked computers


NOVEMBER 2015 PAPER 1 1

Answer

Answer
Answer

JUNE 2017 PAPER 12

Answer
SPECIMEN PAPER 2015

Answer

(2) Give examples of applications which use the client-server model


JUNE 2018 PAPER 11

Answer
Thin clients and thick clients
The client-server model offers thin clients and thick clients.
These can often refer to both hardware and software.
Thin client
A thin client is heavily dependent on having access to a server to allow
constant access to files and to allow applications to run uninterrupted.
Athin client can either be a device or software which needs to be connected
to a powerful computer or server to allow processing to take place (the
computer or server could be on the internet or could be part of a LAN/MAN/
WAN network).
The thin client will not work unless it is connected at all times to the computer or server.
A software example would be a web browser which has very limited functions unless it is
connected to a server.
Other examples include mobile phone apps which need constant access to a server to work.
A hardware example is a POS terminal at a supermarket that needs constant access to a server
to find prices, charge customers and to do any significant processing.
Thick client
A thick client can either be a device or software that can work offline or
online;
It is still able to do some processing whether it is connected to a server
or not.
A thick client can either be connected to a LAN/MAN/WAN, virtual
network, the internet or a cloud computing server.
A hardware example is a
normal PC/laptop/tablet since it would have its own storage (HDD or SSD),
RAM and operating system which means it is capable of operating effectively
online or offline.
An example of software is a computer game which can run independently on a user's computer,
but can also connect to an online server to allow gamers to play and communicate with each
other.

Table 2.1 highlights some of the pros and cons of using thick client or thin
client hardware.
(3) Describe what is meant by the World Wide Web (www) and the
internet

World Wide Web (www)

World Wide Web - a system of interlinked hypertext documents accessed via the internet

World Wide Web is not the internet, but a subset of what the internet offers.
The internet

Intranet - a private network within an organisation which may offer printer sharing, file sharing,
communication, private websites etc... which uses internet technologies such as TCP/IP and web
browsers

June 2015 p11 Q 5

Answer
June 2016 p13 Q 6

Answer

June 2018 p11 Q 5


Answer

(4) Explain how hardware is used to support the internet


(5) Networks, routers, gateways, servers
1. Network Interface cards (NIC)

Describe a network interface card (NIC).

Itis a hardware component withoutwhich a computer cannotbeconnected over a network. It is a circuit


boardinstalled in a computer thatprovides a dedicated network connection to the computer. It
isalsocalled network interface controller, network adapter or LAN adapter

Network cards are needed if the computer does not have a built-in network chip on the motherboard. A NIC
allows data packets to travel back and forth between computer and network.

Each network card / chip has an unique 48 bit identification code called its MAC address (short for 'Media
Access Control). If the network card senses that the destination address within the data packet matches its
MAC address, it allows the packet through, otherwise it just ignores it.

The MAC address is also very handy if a network manager want to only allow certain authorised machines to
connect to the network. For instance the school may own a number of laptops for use by students, each one
has its own MAC address, if any other laptop tries to plug in, it is just ignored.

A network card that uses a standard cable network socket.


Wireless Network card

This works in the same way as a standard Ethernet card, but it has the added complication of using wireless
data packets. The card may take the form of an internal adaptor card as shown below

A Wi-Fi network card with an external aerial for the signal.

or it may take the form of a 'dongle' that attaches to an USB port as shown below.

Most laptops today have the wireless circuitry built in the motherboard and so does not need any additional
devices to connect to a network.
Describe a Hub.

It is a hardware device that connects multiple computers together in a network and allows them to share data
packets.

Each computer will be connected to a single 'port' on the hub. So if you purchase an '8 port hub', you will be
able to connect up to eight computers together.

When a data packet arrives at a hub port, it transmits it to every other port. Unlike a switch it does not examine
data packets. Re-transmitting every packet to every port means that data collisions are more frequent than a
switch. Network protocol can deal with collisions but it does have the effect of slowing down throughput when
too many occur. Data security may also be an issue because every computer encounters every data packet, even
if they were not the intended recipient.

With these issues in mind, a hub is a good cheap solution for a simple, low-medium bandwidth network. But if
more sophisticated handling of data packets is needed and better performance is sought then the more expensive
switch device should be used.

You can also 'daisy chain' hubs to allow even more computers to join the network. However there is a problem
with doing this - see 'Switches' for more details.

Not all network topologies use a hub:

Star Topology

Bus Topology No hub

Ring Topology No hub


Describe a switch.

A network cable can only have one data packet in it at any instant.

So if two or more computers want to place a data packet on to the network at exactly the same time, then a
'data collision' will take place.

The network protocol is set up to deal with this. Basically it declares the collided data as unusable and forces
the two computers to re-send their data packets at a slightly different time.

This is fine for a lightly loaded network with only a few computers on-line. You will not notice the small delay
caused by data collisions.

But imagine what happens when a hundred PCs are sharing the same network and they are all wanting to
send their data packets. This will most likely result in thousands of data collisions per second - each one
costing a small amount of time. You will certainly notice the network 'slowing down'.

The clip below shows how a network SWITCH can help with this problem.

A switch has a number of ports and it stores the addresses of all devices that are directly or indirectly
connected to it on each port.

As a data packet comes into the switch, its destination address is examined and a direct connection is made
between the two machines.

This added sophistication compared to a hub means that virtual networks can be set up where only a sub-set
of connected computers can see each other. As far as these computers are concerned there are no other
machines on the network.

Describea Router.
A Router is a device that transfers data from one network to another in an intelligent way. It has the task of
forwarding data packets to their destination by the most efficient route.

In order to do this, the router has a micro computer inside it. This holds a table in memory that contains a list
of all the networks it is connected to, along with the latest information on how busy each path in the network is,
at that moment. This is called the 'routing table'.

When a data packet arrives, the router does the following:-

- Reads the data packet's destination address

- Looks up all the paths it has available to get to that address

- Checks on how busy each path is at the moment

- Sends the packet along the least congested (fastest) path

Other tasks the Router can perform:

- Exchange protocol information across networks

- Filter traffic - helps prevent unauthorised intrusion by malware

Routers are also needed to enable a computer to connect to the internet, after all, the internet is just one vast
external network.
If the data packet has a destination address outside the local networks, then the router may send it to the
internet modem and then on to the ISP's router at the other end of the line. Their router will then pass forward
the data packet towards its destination. For a computer say in the UK to connect to a web server in the USA
the data packet will pass through many routers around the world.

5. Repeater

All signals fade as they travel from one place to another.

Each type of network cable has a maximum useable length. If you go beyond that length, the signal will be too
weak to be useful.

Of course, computers on a real network can easily be more than 200 metres apart. Therefore the network
cable is split up into segments. Each segment is less than the maximum length allowed. Joining the segments
together is a device known as a 'Repeater'.

A Repeater boosts the signal back to its correct level.

Here are some typical maximum cable lengths:

• Copper cable - 100m


• Thick Ethernet - 500m
• Thin Ethernet - 185m

6. Bridge

A Bridge does just what you would expect it to do - it joins two networks together so as far as data packets are
concerned it looks like one large network

A bridge is not as capable as a Router - but it is less expensive.

Both networks have to be using the same protocol


8. Wireless Access Points

In the early days of computer networks, all local area networks were hard-wired with dedicated cable. But in
recent years an alternative has come along that does not need the client to be hard-wired into the network -
the alternative is called 'Wi-Fi'.

If the computer / laptop has wi-fi built into it, then it will search for a 'wireless access point' in order to connect
to a network.

The hardware device that allows this is called the 'Wireless Access Point' or WAP.

1. Modem

A modem converts the digital data from the computer into a continuous analogue wave-form that the telephone
system is designed to deal with (MODulation). The reason for this is that the telephone system was originally
designed for the human voice i.e. continuous signals. The modem also converts the analogue signal from the
telephone network back into digital data that the computer can understand. (DEModulation). Hence the word
MODEM.
Standard ADSL modems come in two forms. An external box that links to your computer through an USB port
or network cable, or an internal modem that is plugged directly to the motherboard inside the computer.
JUNE 2015 PAPER 1

Answer
(6) Explain how communication systems are used to support the
internet: The Public Switched Telephone Network (PSTN),
dedicated lines, cell phone network

Key terms

(1) The Public Switched Telephone Network (PSTN)/Circuit switching - method of transmission in which a

dedicated circuit/channel lasts


throughout the duration of the communication.
(2) Dedicated lines/Packet switching - method of transmission where a message is broken into packets
which can be sent along paths independently from each other.

14.2.1 The Public Switched Telephone Network (PSTN)/Circuit switching


It is a public switched telephone network (PSTN) was used to
make a phone call. Circuit switching uses a dedicated channel/circuit which
lasts throughout the connection: the communication line is effectively 'tied
up'. When sending data across a network, there are three stages:
1 First, a circuit/channel between sender and receiver must be established.
2 Data transfer then takes place (which can be analogue or digital);
transmission is usually bi-directional.
3 After the data transfer is complete, the connection is terminated.
The pros and cons of circuit switching are summarised in this table. Figure 14.;
shows an example of circuit switching.

The dedicated route from 'A' to 'B' is first of all established (shown in orange'
the diagram). The following connections are then partially implemented: A-R2,
R2-R5, R5-R8, R8-R7, R7-R10 and finally R10-B. All packets (frames) follow
this single route and communication will take place, provided 'B' is not busy.
The main uses of circuit switching include public telephone networks, private
telephone networks and private data networks.

1-4.2.2 Dedicated lines/Packet switching


Packet switching was introduced in Chapter 2 when describing VoIP, together
with a diagram to show how the individual packets are routed from client to
client.
Packet switching is a method of transmission in which a message is broken up
into a number of packets that can be sent independently to each other from
start point to end point. The data packets will need to be reassembled into
their correct order at the destination. Figure 14.8 shows an example of packet
switching.
Note that
» each packet follows its own path
≫ routing selection depends on the number of datagram packets waiting to be
processed at each node (router)
» the shortest path available is selected
» packets can reach the destination in a different order to that in which they
are sent.

As Figure 14.8 shows, the message sent by computer 'A' was split into four
packets. The original packet order was: ■■■■ and they arrived in the order:
■ ■■■ which means they need to be reassembled in the correct order at the
destination.
June 2015 p11
Answer
(3) Explain the benefits and drawbacks of using copper cable, fibre-optic
cabling, radio waves, microwaves,
satellites
Advantages Disadvantages

Can carry signals over a much longer distance


without a repeater compared to copper. The
Fibre is more expensive than copper cable
more repeaters used the more expensive it is to
set up.

Connecting fibres together ("splicing") is more


Extremely large data capacity
difficult

The complex electronics at both ends of the line


Immune to electricalinterference
tends to be more expensive

Needs specialist expertise to lay fibre and many


Immune to corrosion
installers are more familiar with copper cable

Fibre cannot carry power as it is made of glass.


Can carry many different services over the
Copper cable can carry both signal and power at
same line, TV, telephone, data transfer
the same time

Failure can be more catastrophic than a copper


Can be used in hazardous environments such cable because you may have crammed many
as petro-chemical refineries services over a single cable - they all fail
because of a single cable failure.

'Future proofs' your network to cope with the


Advantages Disadvantages

growth in data traffic - plenty of bandwidth

Excellent security as it is difficult to tap into a


glass fibre without detection

One cable carries many fibres, each fibre can


carry 10Gbps or more

Each fibre could be used for a different service


June 2018 p 11 q 1
Answer
NOVEMBER 2015 PAPER 1 1
Answer
JUNE 2016 PAPER 1 – 3 Q 6

Answer
Nov 2018 p12 Q 2

Answer

Answer
(4) Benefits and Drawbacks of wireless network

NOVEMBER 2018 PAPER 13 Q 7

Answer
Answer

(5) Show understanding of bit streaming (both real-time and on-demand)


NOVEMBER 2015 PAPER 1 1

Answer
JUNE 2016 PAPER 1 – 3 Q6
Answer

NOVEMBER 2016 PAPER 1 - 1


6 A user watches a video available on a website. The website uses on-demand bit streaming.
Describe how it is possible to watch the video without it continually pausing.
..............................................................................................................................................[4]

Answer
• User needs high-speed broadband (connection)
• Data is streamed to a buffer (in the computer)
• Buffering stops video pausing as bits streamed
• As buffer is emptied, it fills up again so that viewing is continuous
• Actual playback is (a few seconds) behind the time the data is received by computer [4]

Nov 2016 p12

2 (a) When recording a video, state what is meant by frame rate.


...................................................................................................................................................
...............................................................................................................................................[1]

(b) Video streaming can use either interlaced encoding or progressive encoding.
Describe what is meant by the following terms.
Interlaced encoding
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Progressive encoding
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]

(c) (i) Name the video terms described below:

Description Term
Pixels in two video frames have the same value
in the same location. There is duplication of data
between frames. ................................................................

A sequence of pixels in a single video frame have


the same value.
................................................................................................................................................................................
................................................................................................................................................................................
................................................................................................................................................................................
........................................................[2]

(ii) Give one file technique that could be applied when either of the two features, described
in part (c)(i), are present.
...........................................................................................................................................
.......................................................................................................................................[1]

(6) Show understanding of the importance of bit rates/broadband speed


on bit streaming

JUNE 2016 PAPER 1 - 1


JUNE 2019 PAPER 11
ANSWER

JUNE 2019 PAPER 12


ANSWER
ANSWER
ANSWER

AQA June 2012 Comp 3 question 8

Answer
Bus networks
A bus network topology uses a single central cable to which all computers and
devices are connected. It is easy to expand and requires little cabling. Data can only
travel in one direction; if data is being sent between devices then other devices
cannot transmit. Terminators are needed at each end to prevent signal reflection
{bounce}. BUS networks are typically peer-to-peer.
The disadvantages of a bus network include:
1. If the main cable fails, the whole network goes down.
2. The performance of the network deteriorates under heavy loading.
3. The network is not secure since each packet passes through every node.
The advantages of a bus network include;
Even if one node fails, the remainder of the network continues to function.

It is easy to increase the size of the network by adding additional nodes.

A Figure 2.6 Bus network topology

In bus network topology, each rode looks at each packet and determines whether
or not the address cf the recipient in the package matches the node address. If so.
the node accepts the packet; if not, the packet is ignored.
These are most suitable for situations with a small number of devices with light
traffic occurring. For example. a small company or an office environment.

Star networks

A star network topology uses a central hub/switch and each computer/device is


connected to the hub/switch. Data going from host to hast is directed through the
central hub/switch. Each computer/device has its own dedicated connection to the
central node (hub/switch) - any type of network cable can be used for the
connections {see Section 2.1-5 Wired and wireless networking). This type of
network is typically a client-server,
The disadvantages of a star network include:

1. The initial installation costs are high.


2. If the central. hub/Switch fails, then the whole network goes down,

The advantages of a stat network include:


1. Data collisions are greatly reduced due to the topology.
2. It is a more secure network since security methods can be applied to the central node and packets only
travel to nodes with the correct address.
3. It is easy to improve by simply installing an upgraded hub.
4. If one of the connections is broken it only affects one of the nodes.
How packets are handled depends on whether the central node is a switch or a hub,
if it is a hub. all the packets wilt be sent to every device/node on the star network –
if the address in the packet matches that of the node, it will be accepted; otherwise, it is ignored (this is similar
to the way packets are handled on a bus network).
If the central node is a switch, packets will only be sent to nodes where the address matches the recipient
address in the packet. The latter is clearly topology more secure, since only nodes intended to see the
packet will receive it.

Star networks are useful for evolving networks where devices are frequently added or removed, They are well suited
to applications where there is heavy data traffic.

Mesh networks
There are two types of mesh network topologies;
1. Routing
2. Flooding
Routing works by giving the nodes touting logic (in other words, they act like a router) so that data is directed to
its destination by the shortest route and can be re-routed if one of the nodes in the route has failed.

Flooding simply sends the data via all the nodes and uses no routing logic which can lead to unnecessary loading
on the network.
It is a type of peer-to-peer network, but is fundamentally different,

The disadvantages of a mesh network


1. It includes a large amount of cabling is needed, which is expensive and time
consuming,
2. Set-up and maintenance is difficult and complex.

The advantages of a mesh network include;


1. It is easy to identify where faults on the network have occurred.
2. Any broken links in the network do not affect the other nodes.
3. Goad privacy and security, since packets travel along dedicated routes.
4. The network is relatively easy to expand.

A Figure 2.8 Mesh network topology

There are a number of applications worth considering here;


The internet and WANs/MANs are typical uses of mesh networks.

» Many examples include industrial monitoring and contral where sensors are set up in mesh design and
feedback to a control system which is part of the mesh, for example

- medical monitoring of patients in a hospital

- electronics interconnectivity (for example, systems that link large screen televisions, DVDs, set top
boxes, and so on); each device will be in a location forming the mesh

- modern vehicles use wireless mesh network technology to enable the monitoring and control of
many of the components in the vehicle.

Describe the differences between these models peer-to-peer network model and mesh network model.

……………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………

Hybrid networks
A hybrid network is a mixture of two or more different topologies (bus and star, bus and so on).
The main advantages and disadvantages depend on which types of network are used to make the hybrid
network, but an additional disadvantage is that they can be very complex to install, configure and
maintain.

Advantages :
They can handle large volumes of traffic.
It is easy to identify where a network fault has occurred.

They are very well suited to the creation of larger networks

Figure 2.9 Hybrid bus and star network

Note that the handling of packets in hybrid networks will depend on which of the above topologies are used to
make up the hybrid structure.
One of the typical applications of hybrid networks is illustrated by the following example, involving three hotel
chains. Ai B and C.
Suppose hotel chain A uses a bus network, hotel chain B uses a star network and hotel chairi C uses a mesh
network,
At some point, all three hotel chains are taken over by another company- ay using hybrid network.
technology, all three hotel chains can be connected together even though they are each using a different
type of network. The system can also be expanded easily without affecting any of the existing hotels using
the network.
There are many other examples; you might want to explore the various applications for each type of network
topology.

2.1.4 Public and private cloud computing

What is cloud Storage ?


It is a method of data storage where data is stored on offsite servers –
The physical storage covers hundreds of servers in many locations
The same data is stored an more than one server in case of maintenance or repair, allowing clients to access
data at any time.
This is known as data redundancy. The physical environment is owned and managed by a hosting company.

List the different types of cloud.

There are three common systems,


1. public cloud.
2. private cloud and
3. hybrid cloud.
4.
Public cloud
It is a storage environment where the customer/client and cloud storage provider are different companies.
Private cloud
It is storage provided by a dedicated environment behind a company firewall.
Customer/client and cloud storage provider are integrated and operate as a single entity.

Hybrid cloud
It is a combination of private and public clouds. Some data resides in the private cloud and Less sensitive/less
commercial data can be accessed from a public cloud storage providen

Instead of saving data on a local hard disk or other storage device, a user can save their data 'in the cloud'.
What are the pros and cons of using cloud storage ?

Pros of using cloud storage Cons of using cloud storage

• customer/client files stored on the cloud can bc if the customer/client has a slow or unstable internet
connection, they would have problems accessing or
T at any time from any device anywhere in the
accessed
world provided internet access is available downloading their data/files costs can be high if large
a
storage capacity is required expensive to oas for high
• no need for a customer/client ta carry an external
b download/upload data transfer limits with the
l storage device with them. 0T use the same computer to customer/client internet service provider (ISP}
e store and retrieve information potential failure of the cloud storage company is
•2 provides the user with remote back-up of data to aid possible - this poses a risk Of J,OSS Of all back-up data
data loss and disaster recovery
.
•3 recovers data if a customer/client has a hard disk or
back-up device failure

•Su offers almost unlimited storage capacity


m
mary of pros and cons of using cloud storage

Data security when using cloud storage

Companies that transfer vast amounts of confidential data farm their own systems to a cloud service provider are
effectively relinquishing control of their own data security.
This raises a number of questions:
Problem and Risk with companies providing cloud storage
1. » What physical security exists regarding the building where the data is housed?
2. » How good is the cloud service provider*s resistance to natural disasters or power cuts?
3. » What safeguards exist regarding personnel who work for the cloud service company? Can they use their
authorisation codes to access confidential data for monetary purposes?

What are the potential data loss when using cloud storage ?

There is a risk that important and irreplaceable data could be lost from the cloud storage facilities.
Actions from hackers (gaining access to accounts or pharming attacks, for example} could lead to loss or corruption of
data.
What safeguards exist to overcome these risks.
The following breaches of security involving some of the largest cloud service providers suggest why some people are
nervous of using cloud storage for important files:
Computer Educator : MR RADHA ANIL +230-57595907

The XEN security threat, which forced several cloud operators to reboot all their cloud
servers, was caused by a problem in the XEN hypervisor (a hypervisor is a piece of
computer software. firmware or hardware that creates and runs virtual machines),
» A large cloud service provider permanently lost data during a routine back-up procedure.
» The celebrity photos caused hacking scandal, in which more than too private photos of
celebrities were leaked. Hackers had gained access to a number of cloud accounts,
which then enabled them to publish the photos on social networks and sell them to
publishing companies,
In 2016, the National Electoral Institute of Mexico suffered a cloud security breach in
which 93 million voter registrations, stored on a central database. were compromised and
became publicly available to everyone. To make matters worse, much of the information
on this database was also linked to an Amazon cloud server outside Mexico.
What is Cloud software ?

Cloud storage is, of course, only one aspect of cloud computing. Other areas covered
by cloud computing include databases, networking, software and analytical services
using the internet.

cloud software –
databases and analytical services are provided by cloud computing services.
Software applications can he delivered to a user's computer on demand using cloud
computing services.
The cloud provider will both host and manage software applications - this will include
maintenance, software upgrades and security for a monthly fee,
A user will simply connect to the internet (using their web browser on a computer or
tablet or mobile phone) and contact their cloud services supplier.
The cloud services supplier will connect them ta the software application they require.
The main advantages
Cloud software will be fully tested and it does not need to reside on the user's device.

However; the user can still use the software even if the internet connection is lost. Oata
will simply be stored on the local device and then data will be uploaded or downloaded
once the internet connection vs restored.

Cloud-based applications

They can, therefore, perform tasks on a local device, This makes them fundamentally
different to web-based apps which need an internet connection at all times,

104
Computer Educator : MR RADHA ANIL +230-57595907

2.1.4 Public and private cloud computing

What is Cloud Storage?


Cloud storage is a method of data storage where data is stored on offsite
servers – the physical storage covers hundreds of servers in many locations.

Describe Different type of cloud


There are three common systems, public cloud, private cloud and hybrid cloud.

Public cloud is a storage environment where the customer/client and cloud


storage provider are different companies.

Private cloud is storage provided by a dedicated environment behind a


company firewall. Customer/client and cloud storage provider are integrated
and operate as a single entity.

Hybrid cloud is a combination of private and public clouds. Some data resides
in the private cloud and less sensitive/less commercial data can be accessed
from a public cloud storage provider.

105
Computer Educator : MR RADHA ANIL +230-57595907

AQA June 12 comp 3

Answer

106
Computer Educator : MR RADHA ANIL +230-57595907

107
Computer Educator : MR RADHA ANIL +230-57595907

108

You might also like